Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
2aFb7hE00o.exe

Overview

General Information

Sample name:2aFb7hE00o.exe
renamed because original name is a hash value
Original sample name:a7e106df2ca7b17bd39ec582d19522a0.exe
Analysis ID:1447010
MD5:a7e106df2ca7b17bd39ec582d19522a0
SHA1:45f693deef24825c496315d3e71ed6500532c30b
SHA256:75cd3d0756f7378ee32e18a6ab93046be2a095829806867086b373c40b91b24f
Tags:32exetrojan
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • 2aFb7hE00o.exe (PID: 3996 cmdline: "C:\Users\user\Desktop\2aFb7hE00o.exe" MD5: A7E106DF2CA7B17BD39EC582D19522A0)
    • RegSvcs.exe (PID: 6496 cmdline: "C:\Users\user\Desktop\2aFb7hE00o.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.midhcodistribuciones.com", "Username": "v3doo@midhcodistribuciones.com", "Password": ",A7}+JV4KExQ"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2000596760.00000000018B0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000000.00000002.2000596760.00000000018B0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      00000000.00000002.2000596760.00000000018B0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.2000596760.00000000018B0000.00000004.00001000.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
        • 0x33a3b:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
        • 0x33aad:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
        • 0x33b37:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
        • 0x33bc9:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
        • 0x33c33:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
        • 0x33ca5:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
        • 0x33d3b:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
        • 0x33dcb:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
        00000000.00000002.2000596760.00000000018B0000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
        • 0x30ca6:$s2: GetPrivateProfileString
        • 0x3033c:$s3: get_OSFullName
        • 0x3197d:$s5: remove_Key
        • 0x31af3:$s5: remove_Key
        • 0x32a22:$s6: FtpWebRequest
        • 0x33a1d:$s7: logins
        • 0x33f8f:$s7: logins
        • 0x36d08:$s7: logins
        • 0x36d52:$s7: logins
        • 0x38651:$s7: logins
        • 0x378ec:$s9: 1.85 (Hash, version 2, native byte-order)
        Click to see the 8 entries
        SourceRuleDescriptionAuthorStrings
        2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
            2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.2aFb7hE00o.exe.18b0000.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                0.2.2aFb7hE00o.exe.18b0000.1.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                  Click to see the 9 entries
                  No Sigma rule has matched
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 2.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.midhcodistribuciones.com", "Username": "v3doo@midhcodistribuciones.com", "Password": ",A7}+JV4KExQ"}
                  Source: 2aFb7hE00o.exeReversingLabs: Detection: 42%
                  Source: 2aFb7hE00o.exeVirustotal: Detection: 43%Perma Link
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.0% probability
                  Source: 2aFb7hE00o.exeJoe Sandbox ML: detected
                  Source: 2aFb7hE00o.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: Binary string: wntdll.pdbUGP source: 2aFb7hE00o.exe, 00000000.00000003.1999675798.00000000037A0000.00000004.00001000.00020000.00000000.sdmp, 2aFb7hE00o.exe, 00000000.00000003.1998713066.0000000003600000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: 2aFb7hE00o.exe, 00000000.00000003.1999675798.00000000037A0000.00000004.00001000.00020000.00000000.sdmp, 2aFb7hE00o.exe, 00000000.00000003.1998713066.0000000003600000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B44696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00B44696
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B4C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00B4C9C7
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B4C93C FindFirstFileW,FindClose,0_2_00B4C93C
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B4F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B4F200
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B4F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B4F35D
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B4F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00B4F65E
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B43A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00B43A2B
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B43D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00B43D4E
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B4BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00B4BF27

                  Networking

                  barindex
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.2aFb7hE00o.exe.18b0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.2000596760.00000000018B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                  Source: Joe Sandbox ViewASN Name: TUT-ASUS TUT-ASUS
                  Source: unknownDNS query: name: ip-api.com
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B525E2 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00B525E2
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: ip-api.com
                  Source: RegSvcs.exe, 00000002.00000002.3236838574.0000000003501000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3236838574.0000000003421000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3236838574.00000000034E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                  Source: 2aFb7hE00o.exe, 00000000.00000002.2000596760.00000000018B0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3236838574.0000000003421000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3236838574.00000000034E6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3235173900.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                  Source: RegSvcs.exe, 00000002.00000002.3236838574.0000000003421000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3236838574.00000000034E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: 2aFb7hE00o.exe, 00000000.00000002.2000596760.00000000018B0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3235173900.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: 0.2.2aFb7hE00o.exe.18b0000.1.raw.unpack, FaJzHLniypp.cs.Net Code: UZ6rXXVq3Ow
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B5425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00B5425A
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B54458 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00B54458
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B5425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00B5425A
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B40219 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00B40219
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B6CDAC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00B6CDAC

                  System Summary

                  barindex
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.2.2aFb7hE00o.exe.18b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.2aFb7hE00o.exe.18b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.2.2aFb7hE00o.exe.18b0000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.2aFb7hE00o.exe.18b0000.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 00000000.00000002.2000596760.00000000018B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 00000000.00000002.2000596760.00000000018B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: This is a third-party compiled AutoIt script.0_2_00AE3B4C
                  Source: 2aFb7hE00o.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                  Source: 2aFb7hE00o.exe, 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_e39451b9-f
                  Source: 2aFb7hE00o.exe, 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_340cb9b8-0
                  Source: 2aFb7hE00o.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_04f5f357-1
                  Source: 2aFb7hE00o.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_2a431280-c
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B440B1: CreateFileW,_memset,DeviceIoControl,CloseHandle,0_2_00B440B1
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B38858 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00B38858
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B4545F ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00B4545F
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00AEE8000_2_00AEE800
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B0DBB50_2_00B0DBB5
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00AEE0600_2_00AEE060
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B6804A0_2_00B6804A
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00AF41400_2_00AF4140
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B024050_2_00B02405
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B165220_2_00B16522
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B1267E0_2_00B1267E
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B606650_2_00B60665
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B0283A0_2_00B0283A
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00AF68430_2_00AF6843
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B189DF0_2_00B189DF
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B16A940_2_00B16A94
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B60AE20_2_00B60AE2
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00AF8A0E0_2_00AF8A0E
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B48B130_2_00B48B13
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B3EB070_2_00B3EB07
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B0CD610_2_00B0CD61
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B170060_2_00B17006
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00AF31900_2_00AF3190
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00AF710E0_2_00AF710E
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00AE12870_2_00AE1287
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B033C70_2_00B033C7
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B0F4190_2_00B0F419
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00AF56800_2_00AF5680
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B016C40_2_00B016C4
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B078D30_2_00B078D3
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00AF58C00_2_00AF58C0
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B01BB80_2_00B01BB8
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B19D050_2_00B19D05
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00AEFE400_2_00AEFE40
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B0BFE60_2_00B0BFE6
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B01FD00_2_00B01FD0
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00C136800_2_00C13680
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_016EA5F02_2_016EA5F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_016ED8702_2_016ED870
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_016E4A802_2_016E4A80
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_016E3E682_2_016E3E68
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_016E41B02_2_016E41B0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06A025C82_2_06A025C8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06A014182_2_06A01418
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06A03D602_2_06A03D60
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06A036782_2_06A03678
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: String function: 00B00D27 appears 70 times
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: String function: 00AE7F41 appears 35 times
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: String function: 00B08B40 appears 42 times
                  Source: 2aFb7hE00o.exe, 00000000.00000003.1999568220.0000000003723000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 2aFb7hE00o.exe
                  Source: 2aFb7hE00o.exe, 00000000.00000003.1997619062.00000000038CD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 2aFb7hE00o.exe
                  Source: 2aFb7hE00o.exe, 00000000.00000002.2000596760.00000000018B0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameed6d94e2-6208-4795-9a94-d4ceaf934adf.exe4 vs 2aFb7hE00o.exe
                  Source: 2aFb7hE00o.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.2.2aFb7hE00o.exe.18b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.2aFb7hE00o.exe.18b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.2.2aFb7hE00o.exe.18b0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.2aFb7hE00o.exe.18b0000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 00000000.00000002.2000596760.00000000018B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 00000000.00000002.2000596760.00000000018B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.2.2aFb7hE00o.exe.18b0000.1.raw.unpack, Tk7F6W0v.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.2aFb7hE00o.exe.18b0000.1.raw.unpack, Tk7F6W0v.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.2aFb7hE00o.exe.18b0000.1.raw.unpack, Tk7F6W0v.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.2aFb7hE00o.exe.18b0000.1.raw.unpack, Tk7F6W0v.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.2aFb7hE00o.exe.18b0000.1.raw.unpack, ivMw3WGb8.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.2aFb7hE00o.exe.18b0000.1.raw.unpack, ivMw3WGb8.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 0.2.2aFb7hE00o.exe.18b0000.1.raw.unpack, cdw.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.2aFb7hE00o.exe.18b0000.1.raw.unpack, cdw.csCryptographic APIs: 'TransformFinalBlock'
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@1/1
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B4A2D5 GetLastError,FormatMessageW,0_2_00B4A2D5
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B38713 AdjustTokenPrivileges,CloseHandle,0_2_00B38713
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B38CC3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00B38CC3
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B4B59E SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00B4B59E
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B5F121 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00B5F121
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B586D0 CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_00B586D0
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00AE4FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00AE4FE9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeFile created: C:\Users\user\AppData\Local\Temp\aut4A8E.tmpJump to behavior
                  Source: 2aFb7hE00o.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: RegSvcs.exe, 00000002.00000002.3236838574.0000000003531000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3236838574.000000000351E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: 2aFb7hE00o.exeReversingLabs: Detection: 42%
                  Source: 2aFb7hE00o.exeVirustotal: Detection: 43%
                  Source: unknownProcess created: C:\Users\user\Desktop\2aFb7hE00o.exe "C:\Users\user\Desktop\2aFb7hE00o.exe"
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\2aFb7hE00o.exe"
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\2aFb7hE00o.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                  Source: 2aFb7hE00o.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: 2aFb7hE00o.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: 2aFb7hE00o.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: 2aFb7hE00o.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: 2aFb7hE00o.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: 2aFb7hE00o.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: 2aFb7hE00o.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: wntdll.pdbUGP source: 2aFb7hE00o.exe, 00000000.00000003.1999675798.00000000037A0000.00000004.00001000.00020000.00000000.sdmp, 2aFb7hE00o.exe, 00000000.00000003.1998713066.0000000003600000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: 2aFb7hE00o.exe, 00000000.00000003.1999675798.00000000037A0000.00000004.00001000.00020000.00000000.sdmp, 2aFb7hE00o.exe, 00000000.00000003.1998713066.0000000003600000.00000004.00001000.00020000.00000000.sdmp
                  Source: 2aFb7hE00o.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: 2aFb7hE00o.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: 2aFb7hE00o.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: 2aFb7hE00o.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: 2aFb7hE00o.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B5C304 LoadLibraryA,GetProcAddress,0_2_00B5C304
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B08B85 push ecx; ret 0_2_00B08B98
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00AE4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00AE4A35
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B655FD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00B655FD
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B033C7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00B033C7
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: 2aFb7hE00o.exe PID: 3996, type: MEMORYSTR
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                  Source: 2aFb7hE00o.exe, 00000000.00000002.2000596760.00000000018B0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3236838574.0000000003501000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3236838574.0000000003455000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3235173900.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-99771
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeAPI coverage: 4.7 %
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B44696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00B44696
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B4C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00B4C9C7
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B4C93C FindFirstFileW,FindClose,0_2_00B4C93C
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B4F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B4F200
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B4F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B4F35D
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B4F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00B4F65E
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B43A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00B43A2B
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B43D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00B43D4E
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B4BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00B4BF27
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00AE4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00AE4AFE
                  Source: RegSvcs.exe, 00000002.00000002.3236838574.0000000003455000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                  Source: RegSvcs.exe, 00000002.00000002.3235173900.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: vmware
                  Source: RegSvcs.exe, 00000002.00000002.3235173900.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: VMwareVBoxESelect * from Win32_ComputerSystem
                  Source: RegSvcs.exe, 00000002.00000002.3237534788.00000000065EA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllf
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeAPI call chain: ExitProcess graph end nodegraph_0-99134
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeAPI call chain: ExitProcess graph end nodegraph_0-98705

                  Anti Debugging

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_016E7060 CheckRemoteDebuggerPresent,2_2_016E7060
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B541FD BlockInput,0_2_00B541FD
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00AE3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00AE3B4C
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B15CCC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00B15CCC
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B5C304 LoadLibraryA,GetProcAddress,0_2_00B5C304
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00C13570 mov eax, dword ptr fs:[00000030h]0_2_00C13570
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00C13510 mov eax, dword ptr fs:[00000030h]0_2_00C13510
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00C11ED0 mov eax, dword ptr fs:[00000030h]0_2_00C11ED0
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B381F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00B381F7
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B0A395 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00B0A395
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B0A364 SetUnhandledExceptionFilter,0_2_00B0A364
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 103B008Jump to behavior
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B38C93 LogonUserW,0_2_00B38C93
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00AE3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00AE3B4C
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00AE4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00AE4A35
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B44EF5 mouse_event,0_2_00B44EF5
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\2aFb7hE00o.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B381F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00B381F7
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B44C03 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00B44C03
                  Source: 2aFb7hE00o.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                  Source: 2aFb7hE00o.exeBinary or memory string: Shell_TrayWnd
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B0886B cpuid 0_2_00B0886B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B150D7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00B150D7
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B22230 GetUserNameW,0_2_00B22230
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B1418A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00B1418A
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00AE4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00AE4AFE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.2aFb7hE00o.exe.18b0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.2aFb7hE00o.exe.18b0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.2000596760.00000000018B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3235173900.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: 2aFb7hE00o.exe PID: 3996, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6496, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: 2aFb7hE00o.exeBinary or memory string: WIN_81
                  Source: 2aFb7hE00o.exeBinary or memory string: WIN_XP
                  Source: 2aFb7hE00o.exeBinary or memory string: WIN_XPe
                  Source: 2aFb7hE00o.exeBinary or memory string: WIN_VISTA
                  Source: 2aFb7hE00o.exeBinary or memory string: WIN_7
                  Source: 2aFb7hE00o.exeBinary or memory string: WIN_8
                  Source: 2aFb7hE00o.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 5USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.2aFb7hE00o.exe.18b0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.2aFb7hE00o.exe.18b0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.2000596760.00000000018B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3236838574.0000000003455000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3235173900.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: 2aFb7hE00o.exe PID: 3996, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6496, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.2aFb7hE00o.exe.18b0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.2aFb7hE00o.exe.18b0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.2000596760.00000000018B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3235173900.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: 2aFb7hE00o.exe PID: 3996, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6496, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B56596 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00B56596
                  Source: C:\Users\user\Desktop\2aFb7hE00o.exeCode function: 0_2_00B56A5A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00B56A5A
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure2
                  Valid Accounts
                  221
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  2
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts2
                  Native API
                  2
                  Valid Accounts
                  1
                  DLL Side-Loading
                  11
                  Deobfuscate/Decode Files or Information
                  121
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  1
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                  Valid Accounts
                  2
                  Obfuscated Files or Information
                  Security Account Manager2
                  File and Directory Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                  Access Token Manipulation
                  1
                  DLL Side-Loading
                  NTDS38
                  System Information Discovery
                  Distributed Component Object Model121
                  Input Capture
                  2
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                  Process Injection
                  2
                  Valid Accounts
                  LSA Secrets551
                  Security Software Discovery
                  SSH3
                  Clipboard Data
                  Fallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts22
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials22
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                  Access Token Manipulation
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                  Process Injection
                  Proc Filesystem1
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                  System Network Configuration Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  2aFb7hE00o.exe42%ReversingLabsWin32.Trojan.Nymeria
                  2aFb7hE00o.exe43%VirustotalBrowse
                  2aFb7hE00o.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  ip-api.com0%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  https://account.dyn.com/0%URL Reputationsafe
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                  http://ip-api.com/line/?fields=hosting0%URL Reputationsafe
                  http://ip-api.com/line/?fields=hosting0%URL Reputationsafe
                  http://ip-api.com0%URL Reputationsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  ip-api.com
                  208.95.112.1
                  truetrueunknown
                  NameMaliciousAntivirus DetectionReputation
                  http://ip-api.com/line/?fields=hostingfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://account.dyn.com/2aFb7hE00o.exe, 00000000.00000002.2000596760.00000000018B0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3235173900.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.3236838574.0000000003421000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3236838574.00000000034E6000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://ip-api.comRegSvcs.exe, 00000002.00000002.3236838574.0000000003501000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3236838574.0000000003421000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3236838574.00000000034E6000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  208.95.112.1
                  ip-api.comUnited States
                  53334TUT-ASUStrue
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1447010
                  Start date and time:2024-05-24 08:27:11 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 5m 55s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:6
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:2aFb7hE00o.exe
                  renamed because original name is a hash value
                  Original Sample Name:a7e106df2ca7b17bd39ec582d19522a0.exe
                  Detection:MAL
                  Classification:mal100.troj.spyw.evad.winEXE@3/4@1/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 58
                  • Number of non-executed functions: 270
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Report size exceeded maximum capacity and may have missing disassembly code.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  No simulations
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  208.95.112.1documentos.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                  • ip-api.com/line/?fields=hosting
                  6743.pdf.exeGet hashmaliciousAgentTeslaBrowse
                  • ip-api.com/line/?fields=hosting
                  W0Gtjt6n6J.exeGet hashmaliciousAgentTeslaBrowse
                  • ip-api.com/line/?fields=hosting
                  VwjpUyPk2S.exeGet hashmaliciousPython Stealer, Monster StealerBrowse
                  • ip-api.com/json
                  QUOTATION_MAYQTRA031244#U00faPDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                  • ip-api.com/line/?fields=hosting
                  HSBCR22022121218457670.exeGet hashmaliciousAgentTeslaBrowse
                  • ip-api.com/line/?fields=hosting
                  Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeGet hashmaliciousAgentTeslaBrowse
                  • ip-api.com/line/?fields=hosting
                  nv6mqExGOo.exeGet hashmaliciousAsyncRAT, XWormBrowse
                  • ip-api.com/line/?fields=hosting
                  y9vR6M5sU6.exeGet hashmaliciousAsyncRAT, XWormBrowse
                  • ip-api.com/line/?fields=hosting
                  doc023571961504.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                  • ip-api.com/line/?fields=hosting
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  ip-api.comdocumentos.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  6743.pdf.exeGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  W0Gtjt6n6J.exeGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  VwjpUyPk2S.exeGet hashmaliciousPython Stealer, Monster StealerBrowse
                  • 208.95.112.1
                  QUOTATION_MAYQTRA031244#U00faPDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                  • 208.95.112.1
                  HSBCR22022121218457670.exeGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  nv6mqExGOo.exeGet hashmaliciousAsyncRAT, XWormBrowse
                  • 208.95.112.1
                  y9vR6M5sU6.exeGet hashmaliciousAsyncRAT, XWormBrowse
                  • 208.95.112.1
                  doc023571961504.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                  • 208.95.112.1
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  TUT-ASUSdocumentos.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  6743.pdf.exeGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  W0Gtjt6n6J.exeGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  VwjpUyPk2S.exeGet hashmaliciousPython Stealer, Monster StealerBrowse
                  • 208.95.112.1
                  QUOTATION_MAYQTRA031244#U00faPDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                  • 208.95.112.1
                  HSBCR22022121218457670.exeGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  nv6mqExGOo.exeGet hashmaliciousAsyncRAT, XWormBrowse
                  • 208.95.112.1
                  y9vR6M5sU6.exeGet hashmaliciousAsyncRAT, XWormBrowse
                  • 208.95.112.1
                  doc023571961504.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                  • 208.95.112.1
                  No context
                  No context
                  Process:C:\Users\user\Desktop\2aFb7hE00o.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):141506
                  Entropy (8bit):7.8862324288743375
                  Encrypted:false
                  SSDEEP:3072:ba8AKVr9hu20l5Di11SMoj05Wx7RZ7ifvZRzp6h+fHYdYnfXoP:28Amrn07lRleZRz8hTqnAP
                  MD5:2C38067BB11E3DA658CD5A9AFD7FAC0E
                  SHA1:0FD25A39303105450288AC54D4E64EF0B0DF78A9
                  SHA-256:5C30D586210659096B0A42C5FD375719D9D7DA18F4C1ACA6F921F2EC168E9C99
                  SHA-512:C4CB8BA0156358E3E9AC276D8AA45B9A6EC6BF3F5E430C76F2E9B6D2F9031FBE079BDBA159D0FBACCCC37AAB4AE857EE27494791C3C65EE205B8A1B524F255DF
                  Malicious:false
                  Reputation:low
                  Preview:EA06.......3..b.J..5-..I..g ...my.Rh.Md.;3...r..N.8:.'.A.^13..f.a.T$6...M>..&.IMR.W..l.e.L.]$u...;...d..^.Y.D@....Nk..\.m..Y. .Z..u:...I...&.... ....sx.~:....I..@..D.m=.....kVze&.3......R)4......jT....(..........s...c.@..{R...~...4ZsR...vcr.....]....h.q..M.......+@....5.E......8..@?3A..33.....X.B.tJ..M$.Rj..P.qP..<.....31..*>8/..A.Rb ..Z.0.ixt.<..X....i.R......>....q.@gWj..m.l..I.{.Z.~&.{..3A..[]...E.u......3..*YZE....L;.\.~...S'._;..[%S.<.u..Y..<...a.q.4&.....T?/..K.m....F...a..}.o.u..c1.."......bE9..l.~s&..&.:......_...AP.@..ZUZ_..K#..7[?}..#.-.[+*..+........i. ."L.pM.8....8C.[1J.......h.8\..3.U...^.GF..B.gGyh.I..]|7wp..2.zF.U..........Z.e....D`..............T.Bb....{].Sf3Y.....l1...r.O..g..-....=..=.i.u2]Y...H.3`..m.5...A.....E'.1...e.......;;..b.$.U*.{L.Oi..)Sy.......{D.W^...b.K.S)....s+.Dh4.=...[..Jw.F.tQf..6BM..MfQ....4.Lg5..boH.T.4...p._+3Y..K.....W..Mf.I.&.L...t)x.....)S..&.5.........`.~=f...G.w.}..C..*.H...8.m..(..9.W.@x.Z...S..
                  Process:C:\Users\user\Desktop\2aFb7hE00o.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):9860
                  Entropy (8bit):7.601040192017558
                  Encrypted:false
                  SSDEEP:192:0yaFcK6f01Ehm0qek9Gh0q9bfiEwLeKETeYZeCJCvJWLIhnd63fi:WF76Mkm7ek9y0e2EwLeKueOJCvJvB8fi
                  MD5:100C44B1B7E50E18CC385C1550A6AA9F
                  SHA1:2F87F0AABB4D9EBFDA72EAF42421F2095137EDB6
                  SHA-256:6E3C0374CD29B993BA7CEB3AF80A58CDDCE4359FD91446F4EEF6F1C23D57C00D
                  SHA-512:4B2C04294073643E18CD1CE86555FDB9E7F3028583ED7013C4B1F02AD96C0718A8D6425CE9B8C07D145B4890B5908B93AB3A163564EB1FDED71B026329EB2BBA
                  Malicious:false
                  Reputation:low
                  Preview:EA06..t..L&.I..A.L&....qb.....-..c.L.....m5...k..c0.M....k8.X.3i...l..%.o2....A8.6,.........3k....e.N&s0.oNf.)...k.K$.eb....5..f.........6.0.o.p....l39....V0...S..$.if...6....f.I...@.....i8........X@.4.1..........$.P...0z.5..$}3Y.....=5..`d....!d..V...7f.[$..8...|.I..W.d...|vI..W.d...|vK..W.d...|vK(.W.e...|vY..W,.O...k.`..X@..9..^.8..F.6.z..G......`......i..G../Z...zqd...l.;.........|......7...}3{(........;^..l =..p.........3p.o....,.......x.....H<.lX.:...b.....,. ...2...f.[...K.)....b..i|v F......X......`....,.9....5...._..l......>K.....ir.e....[4..d..f.y.....,.....S >..p...........s9.... !..Y....f...ja4....ea.h,.p.....,.a8.,..3........f.....f ....,j.0..&...J......f ....6K%.ke..f....L..;2.X...4.Y.V@.Fn.....f@....l..05.....!;3.X...c )D.g6... ...'&`....,f.6..&....r...Brh.....l...i2...B....@.......d.L.`!.....P...@X5d..lSK...9...!;5.X...cVY......'.B...,vl.!..>.a..l...M..@...X...b.M&.X..B.a.Q...sp..X..9..o5..f.!...,vn......d........#.......2.rXl.pGr....Bnp......f
                  Process:C:\Users\user\Desktop\2aFb7hE00o.exe
                  File Type:ASCII text, with very long lines (29708), with no line terminators
                  Category:dropped
                  Size (bytes):29708
                  Entropy (8bit):3.5400796178467355
                  Encrypted:false
                  SSDEEP:768:6iTZ+2QoioGRk6ZklputwjpjBkCiw2RuJ3nXKUrvzjsNbQE+I+h6584vfF3if6gO:6iTZ+2QoioGRk6ZklputwjpjBkCiw2Rf
                  MD5:CD404CAE7EDCF747FF3A69B93599D00A
                  SHA1:39373E45CE9F275049452977CCFDBCFBBE416BD4
                  SHA-256:CF10E1ABFC7392C74071ED6CA7AA4E5F924699369B143850448A38F4F76BFE1A
                  SHA-512:4D9E75038F75182ACBCED59929FA27C171BE2E866406C808A2E8F203CB860A7A814479D8C67298C12EA2828FB5257AE3E7CDE72C2D2579970E31B09FE894549A
                  Malicious:false
                  Reputation:low
                  Preview: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
                  Process:C:\Users\user\Desktop\2aFb7hE00o.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):241664
                  Entropy (8bit):6.565466777864786
                  Encrypted:false
                  SSDEEP:6144:zQbctFkG8dLp80p/f3jQrnvsdDvqCxWBecAcLC:7kGo8UPjQT0dLqCOAb
                  MD5:E11602CF6F070C418808F25D7C5766E6
                  SHA1:9E57AF9CBB19429D2364A7A8E431EA1A382A1350
                  SHA-256:D04111D1FEE0B9A19884CDEDFB8E45895E82B528F2174CA44659B8D6522BCBBD
                  SHA-512:214D3351C550496C2DD72396D1C196CD68BC7BC27F9EC7D66D732477DF21C1274EA5A2F54DBBEA30A8168F422D0C0B0CC9B330EA1EC13DE2CC3008A68559B345
                  Malicious:false
                  Reputation:low
                  Preview:...1:XTJ169R..HI.19XTJ56yRIGHIY19XTJ569RIGHIY19XTJ569RIGHIY1.XTJ;).\I.A.x.8..ka^P!i7:&>CX5t)TXW==g*,yCL6t#[.}..g%&=T.UY@.69RIGHI.t9X.K66..f!HIY19XTJ.6;SBFCIY.:XTB569RIG..Z19xTJ5.:RIG.IY.9XTH56=RIGHIY1=XTJ569RIgLIY39XTJ56;R..HII19HTJ56)RIWHIY19XDJ569RIGHIY1.WJz69RI.KI.49XTJ569RIGHIY19XTJ56=REGHIY19XTJ569RIGHIY19XTJ569RIGHIY19XTJ569RIGHIY19XTJ5.9RAGHIY19XTJ561rIG.IY19XTJ569Rg3-1-19X..669rIGH.Z19ZTJ569RIGHIY19XtJ5V. :5+IY1.]TJ5.:RIAHIY.:XTJ569RIGHIY1yXT..D\>&$HIU19XTJ169PIGH.Z19XTJ569RIGHI.19.TJ569RIGHIY19XTJ..:RIGHI.19XVJ06..KG({X1:XTJ469TIGHIY19XTJ569RIGHIY19XTJ569RIGHIY19XTJ569RIGHIY1$....ql.:vC;6.~.-.5..Z..0.~6.A.N"....E....s?3.pR.Hx...0...C.ZL>I....l*>G7:.0gF8.$......&...O7.C...K..<Oc.`...~w...u]=....E..7%X.X"9+-g.P_9&#.4.SIGHI........P*..eJV/.J,....}U0...*J56]RIG:IY1XXTJr69R&GHI719X*J56GRIG.IY1yXTJ.69RlGHI419XpJ56GRIG.4V>..#F..RIGHIl.h.'.....p...H.*.W..#...k<..E].N.....W..3.."dRTj..NX7=]VM155oG.....;\PO71=QEzF....y.l.....9...j".6569RIG.IY.9XT.6.RIG.I.1..TJ5..R.G.I..X
                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):6.932527836979604
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:2aFb7hE00o.exe
                  File size:1'035'264 bytes
                  MD5:a7e106df2ca7b17bd39ec582d19522a0
                  SHA1:45f693deef24825c496315d3e71ed6500532c30b
                  SHA256:75cd3d0756f7378ee32e18a6ab93046be2a095829806867086b373c40b91b24f
                  SHA512:76c80302fe7b64217f8713f771ca369a7eb3725a0d7d2c0160d35422e52883c553f61f4e1b5c677077308a0ec26532b48f789f78572d7c22b4011ebba185fc18
                  SSDEEP:24576:GAHnh+eWsN3skA4RV1Hom2KXMmHas7XpzREq05:hh+ZkldoPK8YasxGB
                  TLSH:05259D0273D1C036FFABA2739B6AF20556BD79254123852F13981DB9BD701B2263E763
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P.....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r.............#.S..._@'.S...R.k.S.....".S...RichR..
                  Icon Hash:aaf3e3e3938382a0
                  Entrypoint:0x42800a
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                  Time Stamp:0x664F6F80 [Thu May 23 16:32:00 2024 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:5
                  OS Version Minor:1
                  File Version Major:5
                  File Version Minor:1
                  Subsystem Version Major:5
                  Subsystem Version Minor:1
                  Import Hash:afcdf79be1557326c854b6e20cb900a7
                  Instruction
                  call 00007F06E8BBD41Dh
                  jmp 00007F06E8BB01D4h
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  push edi
                  push esi
                  mov esi, dword ptr [esp+10h]
                  mov ecx, dword ptr [esp+14h]
                  mov edi, dword ptr [esp+0Ch]
                  mov eax, ecx
                  mov edx, ecx
                  add eax, esi
                  cmp edi, esi
                  jbe 00007F06E8BB035Ah
                  cmp edi, eax
                  jc 00007F06E8BB06BEh
                  bt dword ptr [004C41FCh], 01h
                  jnc 00007F06E8BB0359h
                  rep movsb
                  jmp 00007F06E8BB066Ch
                  cmp ecx, 00000080h
                  jc 00007F06E8BB0524h
                  mov eax, edi
                  xor eax, esi
                  test eax, 0000000Fh
                  jne 00007F06E8BB0360h
                  bt dword ptr [004BF324h], 01h
                  jc 00007F06E8BB0830h
                  bt dword ptr [004C41FCh], 00000000h
                  jnc 00007F06E8BB04FDh
                  test edi, 00000003h
                  jne 00007F06E8BB050Eh
                  test esi, 00000003h
                  jne 00007F06E8BB04EDh
                  bt edi, 02h
                  jnc 00007F06E8BB035Fh
                  mov eax, dword ptr [esi]
                  sub ecx, 04h
                  lea esi, dword ptr [esi+04h]
                  mov dword ptr [edi], eax
                  lea edi, dword ptr [edi+04h]
                  bt edi, 03h
                  jnc 00007F06E8BB0363h
                  movq xmm1, qword ptr [esi]
                  sub ecx, 08h
                  lea esi, dword ptr [esi+08h]
                  movq qword ptr [edi], xmm1
                  lea edi, dword ptr [edi+08h]
                  test esi, 00000007h
                  je 00007F06E8BB03B5h
                  bt esi, 03h
                  Programming Language:
                  • [ASM] VS2013 build 21005
                  • [ C ] VS2013 build 21005
                  • [C++] VS2013 build 21005
                  • [ C ] VS2008 SP1 build 30729
                  • [IMP] VS2008 SP1 build 30729
                  • [ASM] VS2013 UPD5 build 40629
                  • [RES] VS2013 build 21005
                  • [LNK] VS2013 UPD5 build 40629
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0xbc0cc0x17c.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x325dc.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xfb0000x7134.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa4b500x40.rdata
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x8dfdd0x8e000310e36668512d53489c005622bb1b4a9False0.5735602580325704data6.675248351711057IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rdata0x8f0000x2fd8e0x2fe00748cf1ab2605ce1fd72d53d912abb68fFalse0.32828818537859006data5.763244005758284IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0xbf0000x8f740x5200aae9601d920f07080bdfadf43dfeff12False0.1017530487804878data1.1963819235530628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0xc80000x325dc0x326000b40ef1c04cdaa9f219878efb1f1acd5False0.8702407723325062data7.745575371869262IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0xfb0000x71340x7200f04128ad0f87f42830e4a6cdbc38c719False0.7617530153508771data6.783955557128661IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_ICON0xc85a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                  RT_ICON0xc86d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                  RT_ICON0xc87f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                  RT_ICON0xc89200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                  RT_ICON0xc8c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                  RT_ICON0xc8d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                  RT_ICON0xc9bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                  RT_ICON0xca4800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                  RT_ICON0xca9e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                  RT_ICON0xccf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                  RT_ICON0xce0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                  RT_MENU0xce4a00x50dataEnglishGreat Britain0.9
                  RT_STRING0xce4f00x594dataEnglishGreat Britain0.3333333333333333
                  RT_STRING0xcea840x68adataEnglishGreat Britain0.2747909199522103
                  RT_STRING0xcf1100x490dataEnglishGreat Britain0.3715753424657534
                  RT_STRING0xcf5a00x5fcdataEnglishGreat Britain0.3087467362924282
                  RT_STRING0xcfb9c0x65cdataEnglishGreat Britain0.34336609336609336
                  RT_STRING0xd01f80x466dataEnglishGreat Britain0.3605683836589698
                  RT_STRING0xd06600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                  RT_RCDATA0xd07b80x29872data1.0003586167973757
                  RT_GROUP_ICON0xfa02c0x76dataEnglishGreat Britain0.6610169491525424
                  RT_GROUP_ICON0xfa0a40x14dataEnglishGreat Britain1.25
                  RT_GROUP_ICON0xfa0b80x14dataEnglishGreat Britain1.15
                  RT_GROUP_ICON0xfa0cc0x14dataEnglishGreat Britain1.25
                  RT_VERSION0xfa0e00x10cdataEnglishGreat Britain0.5932835820895522
                  RT_MANIFEST0xfa1ec0x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                  DLLImport
                  WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                  VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                  WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                  COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                  MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                  WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                  PSAPI.DLLGetProcessMemoryInfo
                  IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                  USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                  UxTheme.dllIsThemeActive
                  KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                  USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                  GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                  COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                  ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                  SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                  ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                  OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                  Language of compilation systemCountry where language is spokenMap
                  EnglishGreat Britain
                  TimestampSource PortDest PortSource IPDest IP
                  May 24, 2024 08:27:58.954981089 CEST4970480192.168.2.5208.95.112.1
                  May 24, 2024 08:27:58.964413881 CEST8049704208.95.112.1192.168.2.5
                  May 24, 2024 08:27:58.964513063 CEST4970480192.168.2.5208.95.112.1
                  May 24, 2024 08:27:58.965600967 CEST4970480192.168.2.5208.95.112.1
                  May 24, 2024 08:27:58.996179104 CEST8049704208.95.112.1192.168.2.5
                  May 24, 2024 08:27:59.467958927 CEST8049704208.95.112.1192.168.2.5
                  May 24, 2024 08:27:59.509497881 CEST4970480192.168.2.5208.95.112.1
                  May 24, 2024 08:29:07.384751081 CEST8049704208.95.112.1192.168.2.5
                  May 24, 2024 08:29:07.384886980 CEST4970480192.168.2.5208.95.112.1
                  May 24, 2024 08:29:39.479649067 CEST4970480192.168.2.5208.95.112.1
                  May 24, 2024 08:29:39.486295938 CEST8049704208.95.112.1192.168.2.5
                  TimestampSource PortDest PortSource IPDest IP
                  May 24, 2024 08:27:58.931977987 CEST5887453192.168.2.51.1.1.1
                  May 24, 2024 08:27:58.948666096 CEST53588741.1.1.1192.168.2.5
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  May 24, 2024 08:27:58.931977987 CEST192.168.2.51.1.1.10xd76fStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  May 24, 2024 08:27:58.948666096 CEST1.1.1.1192.168.2.50xd76fNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                  • ip-api.com
                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  0192.168.2.549704208.95.112.1806496C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  TimestampBytes transferredDirectionData
                  May 24, 2024 08:27:58.965600967 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                  Host: ip-api.com
                  Connection: Keep-Alive
                  May 24, 2024 08:27:59.467958927 CEST175INHTTP/1.1 200 OK
                  Date: Fri, 24 May 2024 06:27:59 GMT
                  Content-Type: text/plain; charset=utf-8
                  Content-Length: 6
                  Access-Control-Allow-Origin: *
                  X-Ttl: 60
                  X-Rl: 44
                  Data Raw: 66 61 6c 73 65 0a
                  Data Ascii: false


                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:02:27:56
                  Start date:24/05/2024
                  Path:C:\Users\user\Desktop\2aFb7hE00o.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\2aFb7hE00o.exe"
                  Imagebase:0xae0000
                  File size:1'035'264 bytes
                  MD5 hash:A7E106DF2CA7B17BD39EC582D19522A0
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2000596760.00000000018B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.2000596760.00000000018B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2000596760.00000000018B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.2000596760.00000000018B0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                  • Rule: MALWARE_Win_AgentTeslaV2, Description: AgenetTesla Type 2 Keylogger payload, Source: 00000000.00000002.2000596760.00000000018B0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                  Reputation:low
                  Has exited:true

                  Target ID:2
                  Start time:02:27:57
                  Start date:24/05/2024
                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\2aFb7hE00o.exe"
                  Imagebase:0xe60000
                  File size:45'984 bytes
                  MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3236838574.0000000003455000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3235173900.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3235173900.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                  Reputation:high
                  Has exited:false

                  Reset < >

                    Execution Graph

                    Execution Coverage:3.9%
                    Dynamic/Decrypted Code Coverage:0.4%
                    Signature Coverage:6.1%
                    Total number of Nodes:2000
                    Total number of Limit Nodes:191
                    execution_graph 98492 c12410 98506 c10000 98492->98506 98494 c124e1 98509 c12300 98494->98509 98512 c13510 GetPEB 98506->98512 98508 c1068b 98508->98494 98510 c12309 Sleep 98509->98510 98511 c12317 98510->98511 98513 c1353a 98512->98513 98513->98508 98514 b07e93 98515 b07e9f __wsopen_helper 98514->98515 98551 b0a048 GetStartupInfoW 98515->98551 98517 b07ea4 98553 b08dbc GetProcessHeap 98517->98553 98519 b07efc 98520 b07f07 98519->98520 98636 b07fe3 58 API calls 3 library calls 98519->98636 98554 b09d26 98520->98554 98523 b07f0d 98524 b07f18 __RTC_Initialize 98523->98524 98637 b07fe3 58 API calls 3 library calls 98523->98637 98575 b0d812 98524->98575 98527 b07f27 98528 b07f33 GetCommandLineW 98527->98528 98638 b07fe3 58 API calls 3 library calls 98527->98638 98594 b15173 GetEnvironmentStringsW 98528->98594 98532 b07f32 98532->98528 98534 b07f4d 98535 b07f58 98534->98535 98639 b032f5 58 API calls 3 library calls 98534->98639 98604 b14fa8 98535->98604 98538 b07f5e 98539 b07f69 98538->98539 98640 b032f5 58 API calls 3 library calls 98538->98640 98618 b0332f 98539->98618 98542 b07f71 98543 b07f7c __wwincmdln 98542->98543 98641 b032f5 58 API calls 3 library calls 98542->98641 98624 ae492e 98543->98624 98546 b07f90 98547 b07f9f 98546->98547 98642 b03598 58 API calls _doexit 98546->98642 98643 b03320 58 API calls _doexit 98547->98643 98550 b07fa4 __wsopen_helper 98552 b0a05e 98551->98552 98552->98517 98553->98519 98644 b033c7 36 API calls 2 library calls 98554->98644 98556 b09d2b 98645 b09f7c InitializeCriticalSectionAndSpinCount __ioinit 98556->98645 98558 b09d30 98559 b09d34 98558->98559 98647 b09fca TlsAlloc 98558->98647 98646 b09d9c 61 API calls 2 library calls 98559->98646 98562 b09d39 98562->98523 98563 b09d46 98563->98559 98564 b09d51 98563->98564 98648 b08a15 98564->98648 98567 b09d93 98656 b09d9c 61 API calls 2 library calls 98567->98656 98570 b09d72 98570->98567 98572 b09d78 98570->98572 98571 b09d98 98571->98523 98655 b09c73 58 API calls 4 library calls 98572->98655 98574 b09d80 GetCurrentThreadId 98574->98523 98576 b0d81e __wsopen_helper 98575->98576 98668 b09e4b 98576->98668 98578 b0d825 98579 b08a15 __calloc_crt 58 API calls 98578->98579 98580 b0d836 98579->98580 98581 b0d8a1 GetStartupInfoW 98580->98581 98582 b0d841 __wsopen_helper @_EH4_CallFilterFunc@8 98580->98582 98588 b0d8b6 98581->98588 98591 b0d9e5 98581->98591 98582->98527 98583 b0daad 98677 b0dabd LeaveCriticalSection _doexit 98583->98677 98585 b08a15 __calloc_crt 58 API calls 98585->98588 98586 b0da32 GetStdHandle 98586->98591 98587 b0da45 GetFileType 98587->98591 98588->98585 98589 b0d904 98588->98589 98588->98591 98590 b0d938 GetFileType 98589->98590 98589->98591 98675 b0a06b InitializeCriticalSectionAndSpinCount 98589->98675 98590->98589 98591->98583 98591->98586 98591->98587 98676 b0a06b InitializeCriticalSectionAndSpinCount 98591->98676 98595 b07f43 98594->98595 98596 b15184 98594->98596 98600 b14d6b GetModuleFileNameW 98595->98600 98717 b08a5d 58 API calls 2 library calls 98596->98717 98598 b151aa _memmove 98599 b151c0 FreeEnvironmentStringsW 98598->98599 98599->98595 98601 b14d9f _wparse_cmdline 98600->98601 98603 b14ddf _wparse_cmdline 98601->98603 98718 b08a5d 58 API calls 2 library calls 98601->98718 98603->98534 98605 b14fb9 98604->98605 98606 b14fc1 __wsetenvp 98604->98606 98605->98538 98607 b08a15 __calloc_crt 58 API calls 98606->98607 98614 b14fea __wsetenvp 98607->98614 98608 b15041 98609 b02f95 _free 58 API calls 98608->98609 98609->98605 98610 b08a15 __calloc_crt 58 API calls 98610->98614 98611 b15066 98612 b02f95 _free 58 API calls 98611->98612 98612->98605 98614->98605 98614->98608 98614->98610 98614->98611 98615 b1507d 98614->98615 98719 b14857 58 API calls __woutput_l 98614->98719 98720 b09006 IsProcessorFeaturePresent 98615->98720 98617 b15089 98617->98538 98619 b0333b __IsNonwritableInCurrentImage 98618->98619 98743 b0a711 98619->98743 98621 b03359 __initterm_e 98623 b03378 __cinit __IsNonwritableInCurrentImage 98621->98623 98746 b02f80 98621->98746 98623->98542 98625 ae4948 98624->98625 98635 ae49e7 98624->98635 98626 ae4982 IsThemeActive 98625->98626 98781 b035ac 98626->98781 98630 ae49ae 98793 ae4a5b SystemParametersInfoW SystemParametersInfoW 98630->98793 98632 ae49ba 98794 ae3b4c 98632->98794 98634 ae49c2 SystemParametersInfoW 98634->98635 98635->98546 98636->98520 98637->98524 98638->98532 98642->98547 98643->98550 98644->98556 98645->98558 98646->98562 98647->98563 98649 b08a1c 98648->98649 98651 b08a57 98649->98651 98653 b08a3a 98649->98653 98657 b15446 98649->98657 98651->98567 98654 b0a026 TlsSetValue 98651->98654 98653->98649 98653->98651 98665 b0a372 Sleep 98653->98665 98654->98570 98655->98574 98656->98571 98658 b15451 98657->98658 98664 b1546c 98657->98664 98659 b1545d 98658->98659 98658->98664 98666 b08d68 58 API calls __getptd_noexit 98659->98666 98660 b1547c RtlAllocateHeap 98662 b15462 98660->98662 98660->98664 98662->98649 98664->98660 98664->98662 98667 b035e1 DecodePointer 98664->98667 98665->98653 98666->98662 98667->98664 98669 b09e5c 98668->98669 98670 b09e6f EnterCriticalSection 98668->98670 98678 b09ed3 98669->98678 98670->98578 98672 b09e62 98672->98670 98702 b032f5 58 API calls 3 library calls 98672->98702 98675->98589 98676->98591 98677->98582 98679 b09edf __wsopen_helper 98678->98679 98680 b09f00 98679->98680 98681 b09ee8 98679->98681 98694 b09f21 __wsopen_helper 98680->98694 98706 b08a5d 58 API calls 2 library calls 98680->98706 98703 b0a3ab 58 API calls 2 library calls 98681->98703 98683 b09eed 98704 b0a408 58 API calls 8 library calls 98683->98704 98686 b09f15 98688 b09f2b 98686->98688 98689 b09f1c 98686->98689 98687 b09ef4 98705 b032df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 98687->98705 98692 b09e4b __lock 58 API calls 98688->98692 98707 b08d68 58 API calls __getptd_noexit 98689->98707 98695 b09f32 98692->98695 98694->98672 98696 b09f57 98695->98696 98697 b09f3f 98695->98697 98709 b02f95 98696->98709 98708 b0a06b InitializeCriticalSectionAndSpinCount 98697->98708 98700 b09f4b 98715 b09f73 LeaveCriticalSection _doexit 98700->98715 98703->98683 98704->98687 98706->98686 98707->98694 98708->98700 98710 b02fc7 _free 98709->98710 98711 b02f9e RtlFreeHeap 98709->98711 98710->98700 98711->98710 98712 b02fb3 98711->98712 98716 b08d68 58 API calls __getptd_noexit 98712->98716 98714 b02fb9 GetLastError 98714->98710 98715->98694 98716->98714 98717->98598 98718->98603 98719->98614 98721 b09011 98720->98721 98726 b08e99 98721->98726 98725 b0902c 98725->98617 98727 b08eb3 _memset __call_reportfault 98726->98727 98728 b08ed3 IsDebuggerPresent 98727->98728 98734 b0a395 SetUnhandledExceptionFilter UnhandledExceptionFilter 98728->98734 98731 b08f97 __call_reportfault 98735 b0c836 98731->98735 98732 b08fba 98733 b0a380 GetCurrentProcess TerminateProcess 98732->98733 98733->98725 98734->98731 98736 b0c840 IsProcessorFeaturePresent 98735->98736 98737 b0c83e 98735->98737 98739 b15b5a 98736->98739 98737->98732 98742 b15b09 5 API calls 2 library calls 98739->98742 98741 b15c3d 98741->98732 98742->98741 98744 b0a714 EncodePointer 98743->98744 98744->98744 98745 b0a72e 98744->98745 98745->98621 98749 b02e84 98746->98749 98748 b02f8b 98748->98623 98750 b02e90 __wsopen_helper 98749->98750 98757 b03457 98750->98757 98756 b02eb7 __wsopen_helper 98756->98748 98758 b09e4b __lock 58 API calls 98757->98758 98759 b02e99 98758->98759 98760 b02ec8 DecodePointer DecodePointer 98759->98760 98761 b02ef5 98760->98761 98762 b02ea5 98760->98762 98761->98762 98774 b089e4 59 API calls __woutput_l 98761->98774 98771 b02ec2 98762->98771 98764 b02f58 EncodePointer EncodePointer 98764->98762 98765 b02f2c 98765->98762 98769 b02f46 EncodePointer 98765->98769 98776 b08aa4 61 API calls __realloc_crt 98765->98776 98766 b02f07 98766->98764 98766->98765 98775 b08aa4 61 API calls __realloc_crt 98766->98775 98769->98764 98770 b02f40 98770->98762 98770->98769 98777 b03460 98771->98777 98774->98766 98775->98765 98776->98770 98780 b09fb5 LeaveCriticalSection 98777->98780 98779 b02ec7 98779->98756 98780->98779 98782 b09e4b __lock 58 API calls 98781->98782 98783 b035b7 DecodePointer EncodePointer 98782->98783 98846 b09fb5 LeaveCriticalSection 98783->98846 98785 ae49a7 98786 b03614 98785->98786 98787 b03638 98786->98787 98788 b0361e 98786->98788 98787->98630 98788->98787 98847 b08d68 58 API calls __getptd_noexit 98788->98847 98790 b03628 98848 b08ff6 9 API calls __woutput_l 98790->98848 98792 b03633 98792->98630 98793->98632 98795 ae3b59 __ftell_nolock 98794->98795 98849 ae77c7 98795->98849 98799 ae3b8c IsDebuggerPresent 98800 ae3b9a 98799->98800 98801 b1d4ad MessageBoxA 98799->98801 98803 b1d4c7 98800->98803 98804 ae3bb7 98800->98804 98833 ae3c73 98800->98833 98801->98803 98802 ae3c7a SetCurrentDirectoryW 98805 ae3c87 Mailbox 98802->98805 99073 ae7373 59 API calls Mailbox 98803->99073 98935 ae73e5 98804->98935 98805->98634 98808 b1d4d7 98814 b1d4ed SetCurrentDirectoryW 98808->98814 98810 ae3bd5 GetFullPathNameW 98951 ae7d2c 98810->98951 98812 ae3c10 98960 af0a8d 98812->98960 98814->98805 98816 ae3c2e 98817 ae3c38 98816->98817 99074 b44c03 AllocateAndInitializeSid CheckTokenMembership FreeSid 98816->99074 98976 ae3a58 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 98817->98976 98820 b1d50a 98820->98817 98823 b1d51b 98820->98823 99075 ae4864 98823->99075 98824 ae3c42 98826 ae3c55 98824->98826 98984 ae43db 98824->98984 98995 af0b30 98826->98995 98827 b1d523 99082 ae7f41 98827->99082 98833->98802 98846->98785 98847->98790 98848->98792 99102 b00ff6 98849->99102 98851 ae77e8 98852 b00ff6 Mailbox 59 API calls 98851->98852 98853 ae3b63 GetCurrentDirectoryW 98852->98853 98854 ae3778 98853->98854 98855 ae77c7 59 API calls 98854->98855 98856 ae378e 98855->98856 99140 ae3d43 98856->99140 98858 ae37ac 98859 ae4864 61 API calls 98858->98859 98860 ae37c0 98859->98860 98861 ae7f41 59 API calls 98860->98861 98862 ae37cd 98861->98862 99154 ae4f3d 98862->99154 98865 ae37ee Mailbox 99178 ae81a7 98865->99178 98866 b1d3ae 99225 b497e5 98866->99225 98870 b1d3cd 98871 b02f95 _free 58 API calls 98870->98871 98874 b1d3da 98871->98874 98876 ae4faa 84 API calls 98874->98876 98878 b1d3e3 98876->98878 98882 ae3ee2 59 API calls 98878->98882 98879 ae7f41 59 API calls 98880 ae381a 98879->98880 99185 ae8620 98880->99185 98884 b1d3fe 98882->98884 98883 ae382c Mailbox 98885 ae7f41 59 API calls 98883->98885 98886 ae3ee2 59 API calls 98884->98886 98887 ae3852 98885->98887 98888 b1d41a 98886->98888 98889 ae8620 69 API calls 98887->98889 98890 ae4864 61 API calls 98888->98890 98892 ae3861 Mailbox 98889->98892 98891 b1d43f 98890->98891 98893 ae3ee2 59 API calls 98891->98893 98895 ae77c7 59 API calls 98892->98895 98894 b1d44b 98893->98894 98896 ae81a7 59 API calls 98894->98896 98897 ae387f 98895->98897 98898 b1d459 98896->98898 99189 ae3ee2 98897->99189 98900 ae3ee2 59 API calls 98898->98900 98902 b1d468 98900->98902 98908 ae81a7 59 API calls 98902->98908 98904 ae3899 98904->98878 98905 ae38a3 98904->98905 98906 b0313d _W_store_winword 60 API calls 98905->98906 98907 ae38ae 98906->98907 98907->98884 98909 ae38b8 98907->98909 98910 b1d48a 98908->98910 98911 b0313d _W_store_winword 60 API calls 98909->98911 98913 ae3ee2 59 API calls 98910->98913 98912 ae38c3 98911->98912 98912->98888 98915 ae38cd 98912->98915 98914 b1d497 98913->98914 98914->98914 98916 b0313d _W_store_winword 60 API calls 98915->98916 98917 ae38d8 98916->98917 98917->98902 98918 ae3919 98917->98918 98920 ae3ee2 59 API calls 98917->98920 98918->98902 98919 ae3926 98918->98919 99205 ae942e 98919->99205 98921 ae38fc 98920->98921 98923 ae81a7 59 API calls 98921->98923 98926 ae390a 98923->98926 98928 ae3ee2 59 API calls 98926->98928 98928->98918 98930 ae93ea 59 API calls 98932 ae3961 98930->98932 98931 ae9040 60 API calls 98931->98932 98932->98930 98932->98931 98933 ae3ee2 59 API calls 98932->98933 98934 ae39a7 Mailbox 98932->98934 98933->98932 98934->98799 98936 ae73f2 __ftell_nolock 98935->98936 98937 ae740b 98936->98937 98938 b1ee4b _memset 98936->98938 100095 ae48ae 98937->100095 98940 b1ee67 GetOpenFileNameW 98938->98940 98942 b1eeb6 98940->98942 98944 ae7d2c 59 API calls 98942->98944 98946 b1eecb 98944->98946 98946->98946 98948 ae7429 100123 ae69ca 98948->100123 98952 ae7da5 98951->98952 98954 ae7d38 __wsetenvp 98951->98954 98953 ae7e8c 59 API calls 98952->98953 98959 ae7d56 _memmove 98953->98959 98955 ae7d4e 98954->98955 98956 ae7d73 98954->98956 98957 ae8087 59 API calls 98955->98957 98958 ae8189 59 API calls 98956->98958 98957->98959 98958->98959 98959->98812 98961 af0a9a __ftell_nolock 98960->98961 100450 ae6ee0 98961->100450 98963 af0a9f 98964 ae3c26 98963->98964 100461 af12fe 89 API calls 98963->100461 98964->98808 98964->98816 98966 af0aac 98966->98964 100462 af4047 91 API calls Mailbox 98966->100462 98968 af0ab5 98968->98964 98969 af0ab9 GetFullPathNameW 98968->98969 98970 ae7d2c 59 API calls 98969->98970 98971 af0ae5 98970->98971 98972 ae7d2c 59 API calls 98971->98972 98973 af0af2 98972->98973 98974 b250d5 _wcscat 98973->98974 98975 ae7d2c 59 API calls 98973->98975 98975->98964 98977 ae3ac2 LoadImageW RegisterClassExW 98976->98977 98978 b1d49c 98976->98978 100501 ae3041 7 API calls 98977->100501 100502 ae48fe LoadImageW EnumResourceNamesW 98978->100502 98981 ae3b46 98983 ae39e7 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 98981->98983 98982 b1d4a5 98983->98824 98985 ae4406 _memset 98984->98985 100503 ae4213 98985->100503 98988 ae448b 98996 b250ed 98995->98996 99008 af0b55 98995->99008 100586 b4a0b5 89 API calls 4 library calls 98996->100586 99071 af0b65 Mailbox 99008->99071 100587 ae9fbd 60 API calls 99008->100587 100588 b368bf 341 API calls 99008->100588 99009 b252ab Sleep 99009->99071 99014 af0fbf TranslateMessage DispatchMessageW 99015 af0fa3 PeekMessageW 99014->99015 99015->99071 99016 b2517a TranslateAcceleratorW 99016->99015 99016->99071 99017 b25c49 WaitForSingleObject 99017->99071 99019 b00ff6 59 API calls Mailbox 99019->99071 99020 af0e73 timeGetTime 99020->99071 99021 af0fdd Sleep 99071->99009 99071->99014 99071->99015 99071->99016 99071->99017 99071->99019 99071->99020 99071->99021 99073->98808 99074->98820 99076 b11b90 __ftell_nolock 99075->99076 99077 ae4871 GetModuleFileNameW 99076->99077 99078 ae7f41 59 API calls 99077->99078 99079 ae4897 99078->99079 99080 ae48ae 60 API calls 99079->99080 99081 ae48a1 Mailbox 99080->99081 99081->98827 99105 b00ffe 99102->99105 99104 b01018 99104->98851 99105->99104 99107 b0101c std::exception::exception 99105->99107 99112 b0594c 99105->99112 99129 b035e1 DecodePointer 99105->99129 99130 b087db RaiseException 99107->99130 99109 b01046 99131 b08711 58 API calls _free 99109->99131 99111 b01058 99111->98851 99113 b059c7 99112->99113 99122 b05958 99112->99122 99138 b035e1 DecodePointer 99113->99138 99115 b059cd 99139 b08d68 58 API calls __getptd_noexit 99115->99139 99118 b0598b RtlAllocateHeap 99119 b059bf 99118->99119 99118->99122 99119->99105 99121 b059b3 99136 b08d68 58 API calls __getptd_noexit 99121->99136 99122->99118 99122->99121 99123 b05963 99122->99123 99127 b059b1 99122->99127 99135 b035e1 DecodePointer 99122->99135 99123->99122 99132 b0a3ab 58 API calls 2 library calls 99123->99132 99133 b0a408 58 API calls 8 library calls 99123->99133 99134 b032df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 99123->99134 99137 b08d68 58 API calls __getptd_noexit 99127->99137 99129->99105 99130->99109 99131->99111 99132->99123 99133->99123 99135->99122 99136->99127 99137->99119 99138->99115 99139->99119 99141 ae3d50 __ftell_nolock 99140->99141 99142 ae7d2c 59 API calls 99141->99142 99148 ae3eb6 Mailbox 99141->99148 99144 ae3d82 99142->99144 99153 ae3db8 Mailbox 99144->99153 99266 ae7b52 99144->99266 99145 ae7b52 59 API calls 99145->99153 99146 ae3e89 99147 ae7f41 59 API calls 99146->99147 99146->99148 99150 ae3eaa 99147->99150 99148->98858 99149 ae7f41 59 API calls 99149->99153 99151 ae3f84 59 API calls 99150->99151 99151->99148 99153->99145 99153->99146 99153->99148 99153->99149 99269 ae3f84 99153->99269 99279 ae4d13 99154->99279 99159 ae4f68 LoadLibraryExW 99289 ae4cc8 99159->99289 99160 b1dd0f 99162 ae4faa 84 API calls 99160->99162 99164 b1dd16 99162->99164 99166 ae4cc8 3 API calls 99164->99166 99168 b1dd1e 99166->99168 99167 ae4f8f 99167->99168 99169 ae4f9b 99167->99169 99315 ae506b 99168->99315 99170 ae4faa 84 API calls 99169->99170 99173 ae37e6 99170->99173 99173->98865 99173->98866 99175 b1dd45 99323 ae5027 99175->99323 99177 b1dd52 99179 ae3801 99178->99179 99180 ae81b2 99178->99180 99182 ae93ea 99179->99182 99753 ae80d7 59 API calls 2 library calls 99180->99753 99183 b00ff6 Mailbox 59 API calls 99182->99183 99184 ae380d 99183->99184 99184->98879 99186 ae862b 99185->99186 99188 ae8652 99186->99188 99754 ae8b13 69 API calls Mailbox 99186->99754 99188->98883 99190 ae3eec 99189->99190 99191 ae3f05 99189->99191 99192 ae81a7 59 API calls 99190->99192 99193 ae7d2c 59 API calls 99191->99193 99194 ae388b 99192->99194 99193->99194 99195 b0313d 99194->99195 99196 b03149 99195->99196 99197 b031be 99195->99197 99204 b0316e 99196->99204 99755 b08d68 58 API calls __getptd_noexit 99196->99755 99757 b031d0 60 API calls 3 library calls 99197->99757 99200 b031cb 99200->98904 99201 b03155 99756 b08ff6 9 API calls __woutput_l 99201->99756 99203 b03160 99203->98904 99204->98904 99206 ae9436 99205->99206 99207 b00ff6 Mailbox 59 API calls 99206->99207 99208 ae9444 99207->99208 99209 ae3936 99208->99209 99758 ae935c 59 API calls Mailbox 99208->99758 99211 ae91b0 99209->99211 99759 ae92c0 99211->99759 99213 ae91bf 99214 b00ff6 Mailbox 59 API calls 99213->99214 99215 ae3944 99213->99215 99214->99215 99216 ae9040 99215->99216 99217 b1f5a5 99216->99217 99221 ae9057 99216->99221 99217->99221 99769 ae8d3b 59 API calls Mailbox 99217->99769 99219 ae9158 99222 b00ff6 Mailbox 59 API calls 99219->99222 99220 ae91a0 99768 ae9e9c 60 API calls Mailbox 99220->99768 99221->99219 99221->99220 99224 ae915f 99221->99224 99222->99224 99224->98932 99226 ae5045 85 API calls 99225->99226 99227 b49854 99226->99227 99770 b499be 99227->99770 99230 ae506b 74 API calls 99231 b49881 99230->99231 99232 ae506b 74 API calls 99231->99232 99233 b49891 99232->99233 99234 ae506b 74 API calls 99233->99234 99235 b498ac 99234->99235 99236 ae506b 74 API calls 99235->99236 99237 b498c7 99236->99237 99238 ae5045 85 API calls 99237->99238 99239 b498de 99238->99239 99240 b0594c _W_store_winword 58 API calls 99239->99240 99241 b498e5 99240->99241 99242 b0594c _W_store_winword 58 API calls 99241->99242 99243 b498ef 99242->99243 99244 ae506b 74 API calls 99243->99244 99245 b49903 99244->99245 99246 b49393 GetSystemTimeAsFileTime 99245->99246 99247 b49916 99246->99247 99248 b49940 99247->99248 99249 b4992b 99247->99249 99250 b499a5 99248->99250 99251 b49946 99248->99251 99252 b02f95 _free 58 API calls 99249->99252 99254 b02f95 _free 58 API calls 99250->99254 99776 b48d90 99251->99776 99255 b49931 99252->99255 99257 b1d3c1 99254->99257 99258 b02f95 _free 58 API calls 99255->99258 99257->98870 99260 ae4faa 99257->99260 99258->99257 99259 b02f95 _free 58 API calls 99259->99257 99261 ae4fb4 99260->99261 99265 ae4fbb 99260->99265 99262 b055d6 __fcloseall 83 API calls 99261->99262 99262->99265 99263 ae4fca 99263->98870 99264 ae4fdb FreeLibrary 99264->99263 99265->99263 99265->99264 99275 ae7faf 99266->99275 99268 ae7b5d 99268->99144 99270 ae3f92 99269->99270 99274 ae3fb4 _memmove 99269->99274 99273 b00ff6 Mailbox 59 API calls 99270->99273 99271 b00ff6 Mailbox 59 API calls 99272 ae3fc8 99271->99272 99272->99153 99273->99274 99274->99271 99276 ae7fc2 99275->99276 99278 ae7fbf _memmove 99275->99278 99277 b00ff6 Mailbox 59 API calls 99276->99277 99277->99278 99278->99268 99328 ae4d61 99279->99328 99282 ae4d61 2 API calls 99285 ae4d3a 99282->99285 99283 ae4d4a FreeLibrary 99284 ae4d53 99283->99284 99286 b0548b 99284->99286 99285->99283 99285->99284 99332 b054a0 99286->99332 99288 ae4f5c 99288->99159 99288->99160 99490 ae4d94 99289->99490 99292 ae4ced 99294 ae4cff FreeLibrary 99292->99294 99295 ae4d08 99292->99295 99293 ae4d94 2 API calls 99293->99292 99294->99295 99296 ae4dd0 99295->99296 99297 b00ff6 Mailbox 59 API calls 99296->99297 99298 ae4de5 99297->99298 99494 ae538e 99298->99494 99300 ae4df1 _memmove 99301 ae4e2c 99300->99301 99303 ae4ee9 99300->99303 99304 ae4f21 99300->99304 99302 ae5027 69 API calls 99301->99302 99312 ae4e35 99302->99312 99497 ae4fe9 CreateStreamOnHGlobal 99303->99497 99508 b49ba5 95 API calls 99304->99508 99307 ae506b 74 API calls 99307->99312 99309 ae4ec9 99309->99167 99310 b1dcd0 99311 ae5045 85 API calls 99310->99311 99313 b1dce4 99311->99313 99312->99307 99312->99309 99312->99310 99503 ae5045 99312->99503 99314 ae506b 74 API calls 99313->99314 99314->99309 99316 ae507d 99315->99316 99317 b1ddf6 99315->99317 99532 b05812 99316->99532 99320 b49393 99730 b491e9 99320->99730 99322 b493a9 99322->99175 99324 b1ddb9 99323->99324 99325 ae5036 99323->99325 99735 b05e90 99325->99735 99327 ae503e 99327->99177 99329 ae4d2e 99328->99329 99330 ae4d6a LoadLibraryA 99328->99330 99329->99282 99329->99285 99330->99329 99331 ae4d7b GetProcAddress 99330->99331 99331->99329 99335 b054ac __wsopen_helper 99332->99335 99333 b054bf 99381 b08d68 58 API calls __getptd_noexit 99333->99381 99335->99333 99337 b054f0 99335->99337 99336 b054c4 99382 b08ff6 9 API calls __woutput_l 99336->99382 99351 b10738 99337->99351 99340 b054f5 99341 b0550b 99340->99341 99342 b054fe 99340->99342 99344 b05535 99341->99344 99345 b05515 99341->99345 99383 b08d68 58 API calls __getptd_noexit 99342->99383 99366 b10857 99344->99366 99384 b08d68 58 API calls __getptd_noexit 99345->99384 99347 b054cf __wsopen_helper @_EH4_CallFilterFunc@8 99347->99288 99352 b10744 __wsopen_helper 99351->99352 99353 b09e4b __lock 58 API calls 99352->99353 99363 b10752 99353->99363 99354 b107cd 99391 b08a5d 58 API calls 2 library calls 99354->99391 99357 b107d4 99364 b107c6 99357->99364 99392 b0a06b InitializeCriticalSectionAndSpinCount 99357->99392 99358 b10843 __wsopen_helper 99358->99340 99360 b09ed3 __mtinitlocknum 58 API calls 99360->99363 99362 b107fa EnterCriticalSection 99362->99364 99363->99354 99363->99360 99363->99364 99389 b06e8d 59 API calls __lock 99363->99389 99390 b06ef7 LeaveCriticalSection LeaveCriticalSection _doexit 99363->99390 99386 b1084e 99364->99386 99374 b10877 __wopenfile 99366->99374 99367 b10891 99397 b08d68 58 API calls __getptd_noexit 99367->99397 99369 b10896 99398 b08ff6 9 API calls __woutput_l 99369->99398 99371 b05540 99385 b05562 LeaveCriticalSection LeaveCriticalSection __wfsopen 99371->99385 99372 b10aaf 99394 b187f1 99372->99394 99374->99367 99380 b10a4c 99374->99380 99399 b03a0b 60 API calls 2 library calls 99374->99399 99376 b10a45 99376->99380 99400 b03a0b 60 API calls 2 library calls 99376->99400 99378 b10a64 99378->99380 99401 b03a0b 60 API calls 2 library calls 99378->99401 99380->99367 99380->99372 99381->99336 99382->99347 99383->99347 99384->99347 99385->99347 99393 b09fb5 LeaveCriticalSection 99386->99393 99388 b10855 99388->99358 99389->99363 99390->99363 99391->99357 99392->99362 99393->99388 99402 b17fd5 99394->99402 99396 b1880a 99396->99371 99397->99369 99398->99371 99399->99376 99400->99378 99401->99380 99403 b17fe1 __wsopen_helper 99402->99403 99404 b17ff7 99403->99404 99406 b1802d 99403->99406 99487 b08d68 58 API calls __getptd_noexit 99404->99487 99413 b1809e 99406->99413 99407 b17ffc 99488 b08ff6 9 API calls __woutput_l 99407->99488 99410 b18049 99489 b18072 LeaveCriticalSection __unlock_fhandle 99410->99489 99412 b18006 __wsopen_helper 99412->99396 99414 b180be 99413->99414 99415 b0471a __wsopen_nolock 58 API calls 99414->99415 99418 b180da 99415->99418 99416 b09006 __invoke_watson 8 API calls 99417 b187f0 99416->99417 99419 b17fd5 __wsopen_helper 103 API calls 99417->99419 99420 b18114 99418->99420 99427 b18137 99418->99427 99486 b18211 99418->99486 99421 b1880a 99419->99421 99422 b08d34 __write 58 API calls 99420->99422 99421->99410 99423 b18119 99422->99423 99424 b08d68 __woutput_l 58 API calls 99423->99424 99425 b18126 99424->99425 99428 b08ff6 __woutput_l 9 API calls 99425->99428 99426 b181f5 99429 b08d34 __write 58 API calls 99426->99429 99427->99426 99435 b181d3 99427->99435 99430 b18130 99428->99430 99431 b181fa 99429->99431 99430->99410 99432 b08d68 __woutput_l 58 API calls 99431->99432 99433 b18207 99432->99433 99434 b08ff6 __woutput_l 9 API calls 99433->99434 99434->99486 99436 b0d4d4 __alloc_osfhnd 61 API calls 99435->99436 99437 b182a1 99436->99437 99438 b182ab 99437->99438 99439 b182ce 99437->99439 99441 b08d34 __write 58 API calls 99438->99441 99440 b17f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 99439->99440 99451 b182f0 99440->99451 99442 b182b0 99441->99442 99443 b08d68 __woutput_l 58 API calls 99442->99443 99445 b182ba 99443->99445 99444 b1836e GetFileType 99446 b18379 GetLastError 99444->99446 99447 b183bb 99444->99447 99449 b08d68 __woutput_l 58 API calls 99445->99449 99450 b08d47 __dosmaperr 58 API calls 99446->99450 99458 b0d76a __set_osfhnd 59 API calls 99447->99458 99448 b1833c GetLastError 99452 b08d47 __dosmaperr 58 API calls 99448->99452 99449->99430 99453 b183a0 CloseHandle 99450->99453 99451->99444 99451->99448 99454 b17f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 99451->99454 99455 b18361 99452->99455 99453->99455 99456 b183ae 99453->99456 99457 b18331 99454->99457 99459 b08d68 __woutput_l 58 API calls 99455->99459 99460 b08d68 __woutput_l 58 API calls 99456->99460 99457->99444 99457->99448 99462 b183d9 99458->99462 99459->99486 99461 b183b3 99460->99461 99461->99455 99463 b18594 99462->99463 99464 b11b11 __lseeki64_nolock 60 API calls 99462->99464 99482 b1845a 99462->99482 99465 b18767 CloseHandle 99463->99465 99463->99486 99466 b18443 99464->99466 99467 b17f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 99465->99467 99469 b08d34 __write 58 API calls 99466->99469 99466->99482 99468 b1878e 99467->99468 99471 b18796 GetLastError 99468->99471 99472 b187c2 99468->99472 99469->99482 99470 b110ab 70 API calls __read_nolock 99470->99482 99473 b08d47 __dosmaperr 58 API calls 99471->99473 99472->99486 99475 b187a2 99473->99475 99474 b1848c 99477 b199f2 __chsize_nolock 82 API calls 99474->99477 99474->99482 99478 b0d67d __free_osfhnd 59 API calls 99475->99478 99476 b10d2d __close_nolock 61 API calls 99476->99482 99477->99474 99478->99472 99479 b0dac6 __write 78 API calls 99479->99482 99480 b18611 99481 b10d2d __close_nolock 61 API calls 99480->99481 99483 b18618 99481->99483 99482->99463 99482->99470 99482->99474 99482->99476 99482->99479 99482->99480 99484 b11b11 60 API calls __lseeki64_nolock 99482->99484 99485 b08d68 __woutput_l 58 API calls 99483->99485 99484->99482 99485->99486 99486->99416 99487->99407 99488->99412 99489->99412 99491 ae4ce1 99490->99491 99492 ae4d9d LoadLibraryA 99490->99492 99491->99292 99491->99293 99492->99491 99493 ae4dae GetProcAddress 99492->99493 99493->99491 99495 b00ff6 Mailbox 59 API calls 99494->99495 99496 ae53a0 99495->99496 99496->99300 99498 ae5003 FindResourceExW 99497->99498 99499 ae5020 99497->99499 99498->99499 99500 b1dd5c LoadResource 99498->99500 99499->99301 99500->99499 99501 b1dd71 SizeofResource 99500->99501 99501->99499 99502 b1dd85 LockResource 99501->99502 99502->99499 99504 ae5054 99503->99504 99507 b1ddd4 99503->99507 99509 b05a7d 99504->99509 99506 ae5062 99506->99312 99508->99301 99510 b05a89 __wsopen_helper 99509->99510 99511 b05a9b 99510->99511 99513 b05ac1 99510->99513 99522 b08d68 58 API calls __getptd_noexit 99511->99522 99524 b06e4e 99513->99524 99514 b05aa0 99523 b08ff6 9 API calls __woutput_l 99514->99523 99517 b05ac7 99530 b059ee 83 API calls 5 library calls 99517->99530 99519 b05ad6 99531 b05af8 LeaveCriticalSection LeaveCriticalSection __wfsopen 99519->99531 99521 b05aab __wsopen_helper 99521->99506 99522->99514 99523->99521 99525 b06e80 EnterCriticalSection 99524->99525 99526 b06e5e 99524->99526 99528 b06e76 99525->99528 99526->99525 99527 b06e66 99526->99527 99529 b09e4b __lock 58 API calls 99527->99529 99528->99517 99529->99528 99530->99519 99531->99521 99535 b0582d 99532->99535 99534 ae508e 99534->99320 99536 b05839 __wsopen_helper 99535->99536 99537 b0587c 99536->99537 99538 b0584f _memset 99536->99538 99539 b05874 __wsopen_helper 99536->99539 99540 b06e4e __lock_file 59 API calls 99537->99540 99562 b08d68 58 API calls __getptd_noexit 99538->99562 99539->99534 99542 b05882 99540->99542 99548 b0564d 99542->99548 99543 b05869 99563 b08ff6 9 API calls __woutput_l 99543->99563 99549 b05683 99548->99549 99553 b05668 _memset 99548->99553 99564 b058b6 LeaveCriticalSection LeaveCriticalSection __wfsopen 99549->99564 99550 b05673 99660 b08d68 58 API calls __getptd_noexit 99550->99660 99552 b056c3 99552->99549 99556 b057d4 _memset 99552->99556 99565 b04916 99552->99565 99572 b110ab 99552->99572 99640 b10df7 99552->99640 99662 b10f18 58 API calls 3 library calls 99552->99662 99553->99549 99553->99550 99553->99552 99663 b08d68 58 API calls __getptd_noexit 99556->99663 99561 b05678 99661 b08ff6 9 API calls __woutput_l 99561->99661 99562->99543 99563->99539 99564->99539 99566 b04920 99565->99566 99567 b04935 99565->99567 99664 b08d68 58 API calls __getptd_noexit 99566->99664 99567->99552 99569 b04925 99665 b08ff6 9 API calls __woutput_l 99569->99665 99571 b04930 99571->99552 99573 b110e3 99572->99573 99574 b110cc 99572->99574 99576 b1181b 99573->99576 99581 b1111d 99573->99581 99675 b08d34 58 API calls __getptd_noexit 99574->99675 99691 b08d34 58 API calls __getptd_noexit 99576->99691 99578 b110d1 99676 b08d68 58 API calls __getptd_noexit 99578->99676 99579 b11820 99692 b08d68 58 API calls __getptd_noexit 99579->99692 99583 b11125 99581->99583 99587 b1113c 99581->99587 99677 b08d34 58 API calls __getptd_noexit 99583->99677 99585 b1112a 99678 b08d68 58 API calls __getptd_noexit 99585->99678 99586 b11131 99693 b08ff6 9 API calls __woutput_l 99586->99693 99589 b11151 99587->99589 99592 b1116b 99587->99592 99593 b11189 99587->99593 99621 b110d8 99587->99621 99679 b08d34 58 API calls __getptd_noexit 99589->99679 99592->99589 99597 b11176 99592->99597 99680 b08a5d 58 API calls 2 library calls 99593->99680 99595 b11199 99598 b111a1 99595->99598 99599 b111bc 99595->99599 99666 b15ebb 99597->99666 99681 b08d68 58 API calls __getptd_noexit 99598->99681 99683 b11b11 60 API calls 3 library calls 99599->99683 99600 b1128a 99602 b11303 ReadFile 99600->99602 99607 b112a0 GetConsoleMode 99600->99607 99605 b117e3 GetLastError 99602->99605 99606 b11325 99602->99606 99604 b111a6 99682 b08d34 58 API calls __getptd_noexit 99604->99682 99609 b117f0 99605->99609 99610 b112e3 99605->99610 99606->99605 99614 b112f5 99606->99614 99611 b11300 99607->99611 99612 b112b4 99607->99612 99689 b08d68 58 API calls __getptd_noexit 99609->99689 99622 b112e9 99610->99622 99684 b08d47 58 API calls 3 library calls 99610->99684 99611->99602 99612->99611 99615 b112ba ReadConsoleW 99612->99615 99614->99622 99623 b1135a 99614->99623 99624 b115c7 99614->99624 99615->99614 99618 b112dd GetLastError 99615->99618 99617 b117f5 99690 b08d34 58 API calls __getptd_noexit 99617->99690 99618->99610 99620 b02f95 _free 58 API calls 99620->99621 99621->99552 99622->99620 99622->99621 99626 b113c6 ReadFile 99623->99626 99632 b11447 99623->99632 99624->99622 99630 b116cd ReadFile 99624->99630 99627 b113e7 GetLastError 99626->99627 99636 b113f1 99626->99636 99627->99636 99628 b11504 99634 b114b4 MultiByteToWideChar 99628->99634 99687 b11b11 60 API calls 3 library calls 99628->99687 99629 b114f4 99686 b08d68 58 API calls __getptd_noexit 99629->99686 99631 b116f0 GetLastError 99630->99631 99639 b116fe 99630->99639 99631->99639 99632->99622 99632->99628 99632->99629 99632->99634 99634->99618 99634->99622 99636->99623 99685 b11b11 60 API calls 3 library calls 99636->99685 99639->99624 99688 b11b11 60 API calls 3 library calls 99639->99688 99641 b10e02 99640->99641 99645 b10e17 99640->99645 99727 b08d68 58 API calls __getptd_noexit 99641->99727 99643 b10e07 99728 b08ff6 9 API calls __woutput_l 99643->99728 99646 b10e4c 99645->99646 99651 b10e12 99645->99651 99729 b16234 58 API calls __malloc_crt 99645->99729 99648 b04916 __fclose_nolock 58 API calls 99646->99648 99649 b10e60 99648->99649 99694 b10f97 99649->99694 99651->99552 99652 b10e67 99652->99651 99653 b04916 __fclose_nolock 58 API calls 99652->99653 99654 b10e8a 99653->99654 99654->99651 99655 b04916 __fclose_nolock 58 API calls 99654->99655 99656 b10e96 99655->99656 99656->99651 99657 b04916 __fclose_nolock 58 API calls 99656->99657 99658 b10ea3 99657->99658 99659 b04916 __fclose_nolock 58 API calls 99658->99659 99659->99651 99660->99561 99661->99549 99662->99552 99663->99561 99664->99569 99665->99571 99667 b15ed3 99666->99667 99668 b15ec6 99666->99668 99670 b15edf 99667->99670 99671 b08d68 __woutput_l 58 API calls 99667->99671 99669 b08d68 __woutput_l 58 API calls 99668->99669 99672 b15ecb 99669->99672 99670->99600 99673 b15f00 99671->99673 99672->99600 99674 b08ff6 __woutput_l 9 API calls 99673->99674 99674->99672 99675->99578 99676->99621 99677->99585 99678->99586 99679->99585 99680->99595 99681->99604 99682->99621 99683->99597 99684->99622 99685->99636 99686->99622 99687->99634 99688->99639 99689->99617 99690->99622 99691->99579 99692->99586 99693->99621 99695 b10fa3 __wsopen_helper 99694->99695 99696 b10fb0 99695->99696 99697 b10fc7 99695->99697 99698 b08d34 __write 58 API calls 99696->99698 99699 b1108b 99697->99699 99702 b10fdb 99697->99702 99701 b10fb5 99698->99701 99700 b08d34 __write 58 API calls 99699->99700 99703 b10ffe 99700->99703 99704 b08d68 __woutput_l 58 API calls 99701->99704 99705 b11006 99702->99705 99706 b10ff9 99702->99706 99712 b08d68 __woutput_l 58 API calls 99703->99712 99707 b10fbc __wsopen_helper 99704->99707 99709 b11013 99705->99709 99710 b11028 99705->99710 99708 b08d34 __write 58 API calls 99706->99708 99707->99652 99708->99703 99713 b08d34 __write 58 API calls 99709->99713 99711 b0d446 ___lock_fhandle 59 API calls 99710->99711 99714 b1102e 99711->99714 99715 b11020 99712->99715 99716 b11018 99713->99716 99718 b11041 99714->99718 99719 b11054 99714->99719 99721 b08ff6 __woutput_l 9 API calls 99715->99721 99717 b08d68 __woutput_l 58 API calls 99716->99717 99717->99715 99720 b110ab __read_nolock 70 API calls 99718->99720 99722 b08d68 __woutput_l 58 API calls 99719->99722 99723 b1104d 99720->99723 99721->99707 99724 b11059 99722->99724 99726 b11083 __read LeaveCriticalSection 99723->99726 99725 b08d34 __write 58 API calls 99724->99725 99725->99723 99726->99707 99727->99643 99728->99651 99729->99646 99733 b0543a GetSystemTimeAsFileTime 99730->99733 99732 b491f8 99732->99322 99734 b05468 __aulldiv 99733->99734 99734->99732 99736 b05e9c __wsopen_helper 99735->99736 99737 b05ec3 99736->99737 99738 b05eae 99736->99738 99740 b06e4e __lock_file 59 API calls 99737->99740 99749 b08d68 58 API calls __getptd_noexit 99738->99749 99742 b05ec9 99740->99742 99741 b05eb3 99750 b08ff6 9 API calls __woutput_l 99741->99750 99751 b05b00 67 API calls 5 library calls 99742->99751 99745 b05ed4 99752 b05ef4 LeaveCriticalSection LeaveCriticalSection __wfsopen 99745->99752 99747 b05ebe __wsopen_helper 99747->99327 99748 b05ee6 99748->99747 99749->99741 99750->99747 99751->99745 99752->99748 99753->99179 99754->99188 99755->99201 99756->99203 99757->99200 99758->99209 99760 ae92c9 Mailbox 99759->99760 99761 b1f5c8 99760->99761 99766 ae92d3 99760->99766 99762 b00ff6 Mailbox 59 API calls 99761->99762 99764 b1f5d4 99762->99764 99763 ae92da 99763->99213 99766->99763 99767 ae9df0 59 API calls Mailbox 99766->99767 99767->99766 99768->99224 99769->99221 99774 b499d2 __tzset_nolock _wcscmp 99770->99774 99771 b49393 GetSystemTimeAsFileTime 99771->99774 99772 b49866 99772->99230 99772->99257 99773 ae506b 74 API calls 99773->99774 99774->99771 99774->99772 99774->99773 99775 ae5045 85 API calls 99774->99775 99775->99774 99777 b48da9 99776->99777 99778 b48d9b 99776->99778 99780 b48dee 99777->99780 99781 b0548b 115 API calls 99777->99781 99806 b48db2 99777->99806 99779 b0548b 115 API calls 99778->99779 99779->99777 99807 b4901b 99780->99807 99782 b48dd3 99781->99782 99782->99780 99784 b48ddc 99782->99784 99788 b055d6 __fcloseall 83 API calls 99784->99788 99784->99806 99785 b48e32 99786 b48e36 99785->99786 99787 b48e57 99785->99787 99790 b48e43 99786->99790 99792 b055d6 __fcloseall 83 API calls 99786->99792 99811 b48c33 99787->99811 99788->99806 99793 b055d6 __fcloseall 83 API calls 99790->99793 99790->99806 99792->99790 99793->99806 99794 b48e85 99820 b48eb5 99794->99820 99795 b48e65 99797 b48e72 99795->99797 99799 b055d6 __fcloseall 83 API calls 99795->99799 99801 b055d6 __fcloseall 83 API calls 99797->99801 99797->99806 99799->99797 99801->99806 99803 b48ea0 99805 b055d6 __fcloseall 83 API calls 99803->99805 99803->99806 99805->99806 99806->99259 99808 b49040 99807->99808 99810 b49029 __tzset_nolock _memmove 99807->99810 99809 b05812 __fread_nolock 74 API calls 99808->99809 99809->99810 99810->99785 99812 b0594c _W_store_winword 58 API calls 99811->99812 99813 b48c42 99812->99813 99814 b0594c _W_store_winword 58 API calls 99813->99814 99815 b48c56 99814->99815 99816 b0594c _W_store_winword 58 API calls 99815->99816 99817 b48c6a 99816->99817 99818 b48f97 58 API calls 99817->99818 99819 b48c7d 99817->99819 99818->99819 99819->99794 99819->99795 99827 b48eca 99820->99827 99821 b48f82 99853 b491bf 99821->99853 99822 b48c8f 74 API calls 99822->99827 99824 b48e8c 99828 b48f97 99824->99828 99827->99821 99827->99822 99827->99824 99849 b4909c 99827->99849 99857 b48d2b 74 API calls 99827->99857 99829 b48fa4 99828->99829 99830 b48faa 99828->99830 99831 b02f95 _free 58 API calls 99829->99831 99832 b48fbb 99830->99832 99833 b02f95 _free 58 API calls 99830->99833 99831->99830 99834 b48e93 99832->99834 99835 b02f95 _free 58 API calls 99832->99835 99833->99832 99834->99803 99836 b055d6 99834->99836 99835->99834 99837 b055e2 __wsopen_helper 99836->99837 99838 b055f6 99837->99838 99839 b0560e 99837->99839 99906 b08d68 58 API calls __getptd_noexit 99838->99906 99842 b05606 __wsopen_helper 99839->99842 99843 b06e4e __lock_file 59 API calls 99839->99843 99841 b055fb 99907 b08ff6 9 API calls __woutput_l 99841->99907 99842->99803 99845 b05620 99843->99845 99890 b0556a 99845->99890 99850 b490eb 99849->99850 99851 b490ab 99849->99851 99850->99851 99858 b49172 99850->99858 99851->99827 99854 b491dd 99853->99854 99855 b491cc 99853->99855 99854->99824 99856 b04a93 80 API calls 99855->99856 99856->99854 99857->99827 99859 b4919e 99858->99859 99860 b491af 99858->99860 99862 b04a93 99859->99862 99860->99850 99863 b04a9f __wsopen_helper 99862->99863 99864 b04ad5 99863->99864 99865 b04abd 99863->99865 99866 b04acd __wsopen_helper 99863->99866 99868 b06e4e __lock_file 59 API calls 99864->99868 99887 b08d68 58 API calls __getptd_noexit 99865->99887 99866->99860 99870 b04adb 99868->99870 99869 b04ac2 99888 b08ff6 9 API calls __woutput_l 99869->99888 99875 b0493a 99870->99875 99877 b04949 99875->99877 99882 b04967 99875->99882 99876 b04957 99878 b08d68 __woutput_l 58 API calls 99876->99878 99877->99876 99877->99882 99883 b04981 _memmove 99877->99883 99879 b0495c 99878->99879 99880 b08ff6 __woutput_l 9 API calls 99879->99880 99880->99882 99881 b0b05e __flsbuf 78 API calls 99881->99883 99889 b04b0d LeaveCriticalSection LeaveCriticalSection __wfsopen 99882->99889 99883->99881 99883->99882 99884 b04c6d __flush 78 API calls 99883->99884 99885 b04916 __fclose_nolock 58 API calls 99883->99885 99886 b0dac6 __write 78 API calls 99883->99886 99884->99883 99885->99883 99886->99883 99887->99869 99888->99866 99889->99866 99891 b05579 99890->99891 99892 b0558d 99890->99892 99945 b08d68 58 API calls __getptd_noexit 99891->99945 99893 b05589 99892->99893 99909 b04c6d 99892->99909 99908 b05645 LeaveCriticalSection LeaveCriticalSection __wfsopen 99893->99908 99896 b0557e 99946 b08ff6 9 API calls __woutput_l 99896->99946 99901 b04916 __fclose_nolock 58 API calls 99902 b055a7 99901->99902 99919 b10c52 99902->99919 99904 b055ad 99904->99893 99905 b02f95 _free 58 API calls 99904->99905 99905->99893 99906->99841 99907->99842 99908->99842 99910 b04c80 99909->99910 99914 b04ca4 99909->99914 99911 b04916 __fclose_nolock 58 API calls 99910->99911 99910->99914 99912 b04c9d 99911->99912 99947 b0dac6 99912->99947 99915 b10dc7 99914->99915 99916 b055a1 99915->99916 99917 b10dd4 99915->99917 99916->99901 99917->99916 99918 b02f95 _free 58 API calls 99917->99918 99918->99916 99920 b10c5e __wsopen_helper 99919->99920 99921 b10c82 99920->99921 99922 b10c6b 99920->99922 99924 b10d0d 99921->99924 99926 b10c92 99921->99926 100072 b08d34 58 API calls __getptd_noexit 99922->100072 100077 b08d34 58 API calls __getptd_noexit 99924->100077 99925 b10c70 100073 b08d68 58 API calls __getptd_noexit 99925->100073 99929 b10cb0 99926->99929 99930 b10cba 99926->99930 100074 b08d34 58 API calls __getptd_noexit 99929->100074 99933 b0d446 ___lock_fhandle 59 API calls 99930->99933 99931 b10cb5 100078 b08d68 58 API calls __getptd_noexit 99931->100078 99935 b10cc0 99933->99935 99936 b10cd3 99935->99936 99937 b10cde 99935->99937 100057 b10d2d 99936->100057 100075 b08d68 58 API calls __getptd_noexit 99937->100075 99938 b10d19 100079 b08ff6 9 API calls __woutput_l 99938->100079 99940 b10c77 __wsopen_helper 99940->99904 99943 b10cd9 100076 b10d05 LeaveCriticalSection __unlock_fhandle 99943->100076 99945->99896 99946->99893 99948 b0dad2 __wsopen_helper 99947->99948 99949 b0daf6 99948->99949 99950 b0dadf 99948->99950 99951 b0db95 99949->99951 99953 b0db0a 99949->99953 100048 b08d34 58 API calls __getptd_noexit 99950->100048 100054 b08d34 58 API calls __getptd_noexit 99951->100054 99956 b0db32 99953->99956 99957 b0db28 99953->99957 99955 b0dae4 100049 b08d68 58 API calls __getptd_noexit 99955->100049 99975 b0d446 99956->99975 100050 b08d34 58 API calls __getptd_noexit 99957->100050 99958 b0db2d 100055 b08d68 58 API calls __getptd_noexit 99958->100055 99962 b0db38 99964 b0db4b 99962->99964 99965 b0db5e 99962->99965 99984 b0dbb5 99964->99984 100051 b08d68 58 API calls __getptd_noexit 99965->100051 99966 b0dba1 100056 b08ff6 9 API calls __woutput_l 99966->100056 99970 b0daeb __wsopen_helper 99970->99914 99971 b0db57 100053 b0db8d LeaveCriticalSection __unlock_fhandle 99971->100053 99972 b0db63 100052 b08d34 58 API calls __getptd_noexit 99972->100052 99976 b0d452 __wsopen_helper 99975->99976 99977 b0d4a1 EnterCriticalSection 99976->99977 99979 b09e4b __lock 58 API calls 99976->99979 99978 b0d4c7 __wsopen_helper 99977->99978 99978->99962 99980 b0d477 99979->99980 99981 b0d48f 99980->99981 99982 b0a06b __ioinit InitializeCriticalSectionAndSpinCount 99980->99982 99983 b0d4cb ___lock_fhandle LeaveCriticalSection 99981->99983 99982->99981 99983->99977 99985 b0dbc2 __ftell_nolock 99984->99985 99986 b0dbf6 99985->99986 99987 b0dc20 99985->99987 99988 b0dc01 99985->99988 99989 b0c836 __woutput_l 6 API calls 99986->99989 99991 b0dc78 99987->99991 99992 b0dc5c 99987->99992 99990 b08d34 __write 58 API calls 99988->99990 99993 b0e416 99989->99993 99994 b0dc06 99990->99994 99995 b0dc91 99991->99995 99998 b11b11 __lseeki64_nolock 60 API calls 99991->99998 99997 b08d34 __write 58 API calls 99992->99997 99993->99971 99996 b08d68 __woutput_l 58 API calls 99994->99996 100000 b15ebb __stbuf 58 API calls 99995->100000 99999 b0dc0d 99996->99999 100001 b0dc61 99997->100001 99998->99995 100002 b08ff6 __woutput_l 9 API calls 99999->100002 100003 b0dc9f 100000->100003 100004 b08d68 __woutput_l 58 API calls 100001->100004 100002->99986 100005 b0dff8 100003->100005 100010 b09bec __beginthreadex 58 API calls 100003->100010 100006 b0dc68 100004->100006 100007 b0e016 100005->100007 100008 b0e38b WriteFile 100005->100008 100009 b08ff6 __woutput_l 9 API calls 100006->100009 100011 b0e13a 100007->100011 100025 b0e02c 100007->100025 100012 b0dfeb GetLastError 100008->100012 100015 b0dfb8 100008->100015 100009->99986 100013 b0dccb GetConsoleMode 100010->100013 100020 b0e145 100011->100020 100024 b0e22f 100011->100024 100012->100015 100013->100005 100016 b0dd0a 100013->100016 100014 b0e3c4 100014->99986 100017 b08d68 __woutput_l 58 API calls 100014->100017 100015->99986 100015->100014 100023 b0e118 100015->100023 100016->100005 100018 b0dd1a GetConsoleCP 100016->100018 100022 b0e3f2 100017->100022 100018->100014 100042 b0dd49 100018->100042 100019 b0e09b WriteFile 100019->100012 100021 b0e0d8 100019->100021 100020->100014 100026 b0e1aa WriteFile 100020->100026 100021->100025 100027 b0e0fc 100021->100027 100028 b08d34 __write 58 API calls 100022->100028 100029 b0e123 100023->100029 100030 b0e3bb 100023->100030 100024->100014 100031 b0e2a4 WideCharToMultiByte 100024->100031 100025->100014 100025->100019 100026->100012 100032 b0e1f9 100026->100032 100027->100015 100028->99986 100033 b08d68 __woutput_l 58 API calls 100029->100033 100034 b08d47 __dosmaperr 58 API calls 100030->100034 100031->100012 100040 b0e2eb 100031->100040 100032->100015 100032->100020 100032->100027 100036 b0e128 100033->100036 100034->99986 100035 b0e2f3 WriteFile 100038 b0e346 GetLastError 100035->100038 100035->100040 100039 b08d34 __write 58 API calls 100036->100039 100037 b03835 __write_nolock 58 API calls 100037->100042 100038->100040 100039->99986 100040->100015 100040->100024 100040->100027 100040->100035 100041 b17cae WriteConsoleW CreateFileW __putwch_nolock 100046 b0de9f 100041->100046 100042->100015 100042->100037 100043 b1650a 60 API calls __write_nolock 100042->100043 100044 b0de32 WideCharToMultiByte 100042->100044 100042->100046 100043->100042 100044->100015 100045 b0de6d WriteFile 100044->100045 100045->100012 100045->100046 100046->100012 100046->100015 100046->100041 100046->100042 100047 b0dec7 WriteFile 100046->100047 100047->100012 100047->100046 100048->99955 100049->99970 100050->99958 100051->99972 100052->99971 100053->99970 100054->99958 100055->99966 100056->99970 100080 b0d703 100057->100080 100059 b10d91 100093 b0d67d 59 API calls 2 library calls 100059->100093 100060 b10d3b 100060->100059 100062 b10d6f 100060->100062 100063 b0d703 __close_nolock 58 API calls 100060->100063 100062->100059 100064 b0d703 __close_nolock 58 API calls 100062->100064 100066 b10d66 100063->100066 100067 b10d7b FindCloseChangeNotification 100064->100067 100065 b10d99 100068 b10dbb 100065->100068 100094 b08d47 58 API calls 3 library calls 100065->100094 100069 b0d703 __close_nolock 58 API calls 100066->100069 100067->100059 100070 b10d87 GetLastError 100067->100070 100068->99943 100069->100062 100070->100059 100072->99925 100073->99940 100074->99931 100075->99943 100076->99940 100077->99931 100078->99938 100079->99940 100081 b0d723 100080->100081 100082 b0d70e 100080->100082 100085 b08d34 __write 58 API calls 100081->100085 100087 b0d748 100081->100087 100083 b08d34 __write 58 API calls 100082->100083 100084 b0d713 100083->100084 100086 b08d68 __woutput_l 58 API calls 100084->100086 100088 b0d752 100085->100088 100090 b0d71b 100086->100090 100087->100060 100089 b08d68 __woutput_l 58 API calls 100088->100089 100091 b0d75a 100089->100091 100090->100060 100092 b08ff6 __woutput_l 9 API calls 100091->100092 100092->100090 100093->100065 100094->100068 100157 b11b90 100095->100157 100098 ae48da 100100 ae7d2c 59 API calls 100098->100100 100099 ae48f7 100163 ae7eec 100099->100163 100102 ae48e6 100100->100102 100159 ae7886 100102->100159 100105 b009d5 100106 b11b90 __ftell_nolock 100105->100106 100107 b009e2 GetLongPathNameW 100106->100107 100108 ae7d2c 59 API calls 100107->100108 100109 ae741d 100108->100109 100110 ae716b 100109->100110 100111 ae77c7 59 API calls 100110->100111 100112 ae717d 100111->100112 100113 ae48ae 60 API calls 100112->100113 100114 ae7188 100113->100114 100115 ae7193 100114->100115 100116 b1ecae 100114->100116 100117 ae3f84 59 API calls 100115->100117 100121 b1ecc8 100116->100121 100177 ae7a68 61 API calls 100116->100177 100119 ae719f 100117->100119 100171 ae34c2 100119->100171 100122 ae71b2 Mailbox 100122->98948 100124 ae4f3d 136 API calls 100123->100124 100125 ae69ef 100124->100125 100126 b1e45a 100125->100126 100128 ae4f3d 136 API calls 100125->100128 100127 b497e5 122 API calls 100126->100127 100129 b1e46f 100127->100129 100130 ae6a03 100128->100130 100131 b1e490 100129->100131 100132 b1e473 100129->100132 100130->100126 100133 ae6a0b 100130->100133 100137 b00ff6 Mailbox 59 API calls 100131->100137 100136 ae4faa 84 API calls 100132->100136 100134 ae6a17 100133->100134 100135 b1e47b 100133->100135 100178 ae6bec 100134->100178 100279 b44534 90 API calls _wprintf 100135->100279 100136->100135 100154 b1e4d5 Mailbox 100137->100154 100141 b1e489 100141->100131 100142 b1e689 100143 b02f95 _free 58 API calls 100142->100143 100144 b1e691 100143->100144 100145 ae4faa 84 API calls 100144->100145 100150 b1e69a 100145->100150 100149 b02f95 _free 58 API calls 100149->100150 100150->100149 100151 ae4faa 84 API calls 100150->100151 100284 b3fcb1 89 API calls 4 library calls 100150->100284 100151->100150 100153 ae7f41 59 API calls 100153->100154 100154->100142 100154->100150 100154->100153 100271 ae766f 100154->100271 100280 b3fc4d 59 API calls 2 library calls 100154->100280 100281 b3fb6e 61 API calls 2 library calls 100154->100281 100282 b47621 59 API calls Mailbox 100154->100282 100283 ae74bd 59 API calls Mailbox 100154->100283 100158 ae48bb GetFullPathNameW 100157->100158 100158->100098 100158->100099 100160 ae7894 100159->100160 100167 ae7e8c 100160->100167 100162 ae48f2 100162->100105 100164 ae7f06 100163->100164 100166 ae7ef9 100163->100166 100165 b00ff6 Mailbox 59 API calls 100164->100165 100165->100166 100166->100102 100168 ae7e9a 100167->100168 100170 ae7ea3 _memmove 100167->100170 100169 ae7faf 59 API calls 100168->100169 100168->100170 100169->100170 100170->100162 100172 ae34d4 100171->100172 100176 ae34f3 _memmove 100171->100176 100175 b00ff6 Mailbox 59 API calls 100172->100175 100173 b00ff6 Mailbox 59 API calls 100174 ae350a 100173->100174 100174->100122 100175->100176 100176->100173 100177->100116 100179 b1e847 100178->100179 100180 ae6c15 100178->100180 100376 b3fcb1 89 API calls 4 library calls 100179->100376 100290 ae5906 60 API calls Mailbox 100180->100290 100183 b1e85a 100377 b3fcb1 89 API calls 4 library calls 100183->100377 100184 ae6c37 100291 ae5956 100184->100291 100188 ae6c54 100189 ae77c7 59 API calls 100188->100189 100191 ae6c60 100189->100191 100190 b1e876 100193 ae6cc1 100190->100193 100304 b00b9b 60 API calls __ftell_nolock 100191->100304 100195 ae6ccf 100193->100195 100196 b1e889 100193->100196 100194 ae6c6c 100197 ae77c7 59 API calls 100194->100197 100199 ae77c7 59 API calls 100195->100199 100198 ae5dcf CloseHandle 100196->100198 100200 ae6c78 100197->100200 100201 b1e895 100198->100201 100202 ae6cd8 100199->100202 100203 ae48ae 60 API calls 100200->100203 100204 ae4f3d 136 API calls 100201->100204 100205 ae77c7 59 API calls 100202->100205 100207 ae6c86 100203->100207 100208 b1e8b1 100204->100208 100206 ae6ce1 100205->100206 100314 ae46f9 100206->100314 100305 ae59b0 ReadFile SetFilePointerEx 100207->100305 100211 b1e8da 100208->100211 100215 b497e5 122 API calls 100208->100215 100378 b3fcb1 89 API calls 4 library calls 100211->100378 100212 ae6cf8 100217 ae7c8e 59 API calls 100212->100217 100214 ae6cb2 100306 ae5c4e 100214->100306 100216 b1e8cd 100215->100216 100220 b1e8d5 100216->100220 100221 b1e8f6 100216->100221 100222 ae6d09 SetCurrentDirectoryW 100217->100222 100218 b1e8f1 100250 ae6e6c Mailbox 100218->100250 100223 ae4faa 84 API calls 100220->100223 100224 ae4faa 84 API calls 100221->100224 100227 ae6d1c Mailbox 100222->100227 100223->100211 100225 b1e8fb 100224->100225 100226 b00ff6 Mailbox 59 API calls 100225->100226 100233 b1e92f 100226->100233 100229 b00ff6 Mailbox 59 API calls 100227->100229 100231 ae6d2f 100229->100231 100230 ae3bcd 100230->98810 100230->98833 100232 ae538e 59 API calls 100231->100232 100247 ae6d3a Mailbox __wsetenvp 100232->100247 100234 ae766f 59 API calls 100233->100234 100240 b1e978 Mailbox 100234->100240 100235 ae6e47 100372 ae5dcf 100235->100372 100236 b1eb69 100383 b47581 59 API calls Mailbox 100236->100383 100240->100236 100252 ae766f 59 API calls 100240->100252 100262 ae7f41 59 API calls 100240->100262 100266 b1ebbb 100240->100266 100379 b3fc4d 59 API calls 2 library calls 100240->100379 100380 b3fb6e 61 API calls 2 library calls 100240->100380 100381 b47621 59 API calls Mailbox 100240->100381 100382 ae7373 59 API calls Mailbox 100240->100382 100243 b1eb8b 100384 b4f835 59 API calls 2 library calls 100243->100384 100246 b1eb98 100248 b02f95 _free 58 API calls 100246->100248 100247->100235 100255 b1ebfa 100247->100255 100256 ae7f41 59 API calls 100247->100256 100259 b1ec02 100247->100259 100365 ae59cd 67 API calls _wcscpy 100247->100365 100366 ae70bd GetStringTypeW 100247->100366 100367 ae702c 60 API calls __wcsnicmp 100247->100367 100368 ae710a GetStringTypeW __wsetenvp 100247->100368 100369 b0387d GetStringTypeW _iswctype 100247->100369 100370 ae6a3c 165 API calls 3 library calls 100247->100370 100371 ae7373 59 API calls Mailbox 100247->100371 100248->100250 100285 ae5934 100250->100285 100252->100240 100253 b1ec1b 100253->100235 100386 b3fb07 59 API calls 4 library calls 100255->100386 100256->100247 100387 b3fcb1 89 API calls 4 library calls 100259->100387 100262->100240 100385 b3fcb1 89 API calls 4 library calls 100266->100385 100268 b1ebd4 100269 b02f95 _free 58 API calls 100268->100269 100270 b1ebe7 100269->100270 100270->100250 100272 ae770f 100271->100272 100278 ae7682 _memmove 100271->100278 100274 b00ff6 Mailbox 59 API calls 100272->100274 100273 b00ff6 Mailbox 59 API calls 100275 ae7689 100273->100275 100274->100278 100276 ae76b2 100275->100276 100277 b00ff6 Mailbox 59 API calls 100275->100277 100276->100154 100277->100276 100278->100273 100279->100141 100280->100154 100281->100154 100282->100154 100283->100154 100284->100150 100286 ae5dcf CloseHandle 100285->100286 100287 ae593c Mailbox 100286->100287 100288 ae5dcf CloseHandle 100287->100288 100289 ae594b 100288->100289 100289->100230 100290->100184 100292 ae5dcf CloseHandle 100291->100292 100293 ae5962 100292->100293 100388 ae5df9 100293->100388 100295 ae59a4 100295->100183 100295->100188 100296 ae5981 100296->100295 100396 ae5770 100296->100396 100298 ae5993 100413 ae53db SetFilePointerEx SetFilePointerEx 100298->100413 100300 b1e030 100414 b43696 SetFilePointerEx SetFilePointerEx WriteFile 100300->100414 100301 ae599a 100301->100295 100301->100300 100303 b1e060 100303->100295 100304->100194 100305->100214 100313 ae5c68 100306->100313 100307 ae5cef SetFilePointerEx 100427 ae5dae SetFilePointerEx 100307->100427 100308 b1e151 100428 ae5dae SetFilePointerEx 100308->100428 100311 ae5cc3 100311->100193 100312 b1e16b 100313->100307 100313->100308 100313->100311 100315 ae77c7 59 API calls 100314->100315 100316 ae470f 100315->100316 100317 ae77c7 59 API calls 100316->100317 100318 ae4717 100317->100318 100319 ae77c7 59 API calls 100318->100319 100320 ae471f 100319->100320 100321 ae77c7 59 API calls 100320->100321 100322 ae4727 100321->100322 100323 ae475b 100322->100323 100324 b1d8fb 100322->100324 100325 ae79ab 59 API calls 100323->100325 100326 ae81a7 59 API calls 100324->100326 100327 ae4769 100325->100327 100328 b1d904 100326->100328 100329 ae7e8c 59 API calls 100327->100329 100330 ae7eec 59 API calls 100328->100330 100331 ae4773 100329->100331 100334 ae479e 100330->100334 100333 ae79ab 59 API calls 100331->100333 100331->100334 100332 ae47de 100429 ae79ab 100332->100429 100336 ae4794 100333->100336 100334->100332 100337 ae47bd 100334->100337 100346 b1d924 100334->100346 100338 ae7e8c 59 API calls 100336->100338 100340 ae7b52 59 API calls 100337->100340 100338->100334 100339 b1d9f4 100342 ae7d2c 59 API calls 100339->100342 100343 ae47c7 100340->100343 100341 ae47ef 100344 ae4801 100341->100344 100347 ae81a7 59 API calls 100341->100347 100360 b1d9b1 100342->100360 100343->100332 100351 ae79ab 59 API calls 100343->100351 100345 ae4811 100344->100345 100348 ae81a7 59 API calls 100344->100348 100350 ae4818 100345->100350 100352 ae81a7 59 API calls 100345->100352 100346->100339 100349 b1d9dd 100346->100349 100362 b1d95b 100346->100362 100347->100344 100348->100345 100349->100339 100356 b1d9c8 100349->100356 100353 ae81a7 59 API calls 100350->100353 100354 ae481f Mailbox 100350->100354 100351->100332 100352->100350 100353->100354 100354->100212 100355 ae7b52 59 API calls 100355->100360 100359 ae7d2c 59 API calls 100356->100359 100357 b1d9b9 100358 ae7d2c 59 API calls 100357->100358 100358->100360 100359->100360 100360->100332 100360->100355 100442 ae7a84 59 API calls 2 library calls 100360->100442 100362->100357 100363 b1d9a4 100362->100363 100364 ae7d2c 59 API calls 100363->100364 100364->100360 100365->100247 100366->100247 100367->100247 100368->100247 100369->100247 100370->100247 100371->100247 100373 ae5de8 100372->100373 100374 ae5dd9 100372->100374 100373->100374 100376->100183 100377->100190 100378->100218 100379->100240 100380->100240 100381->100240 100382->100240 100383->100243 100384->100246 100385->100268 100386->100259 100387->100253 100389 b1e181 100388->100389 100390 ae5e12 CreateFileW 100388->100390 100391 b1e187 CreateFileW 100389->100391 100392 ae5e34 100389->100392 100390->100392 100391->100392 100393 b1e1ad 100391->100393 100392->100296 100394 ae5c4e 2 API calls 100393->100394 100395 b1e1b8 100394->100395 100395->100392 100397 ae578b 100396->100397 100398 b1dfce 100396->100398 100399 ae5c4e 2 API calls 100397->100399 100404 ae581a 100397->100404 100398->100404 100421 ae5e3f 100398->100421 100400 ae57ad 100399->100400 100401 ae538e 59 API calls 100400->100401 100403 ae57b7 100401->100403 100403->100398 100405 ae57c4 100403->100405 100404->100298 100406 b00ff6 Mailbox 59 API calls 100405->100406 100407 ae57cf 100406->100407 100408 ae538e 59 API calls 100407->100408 100409 ae57da 100408->100409 100415 ae5d20 100409->100415 100412 ae5c4e 2 API calls 100412->100404 100413->100301 100414->100303 100416 ae5d2e 100415->100416 100417 ae5d93 100415->100417 100419 ae5807 100416->100419 100420 ae5d66 ReadFile 100416->100420 100426 ae5dae SetFilePointerEx 100417->100426 100419->100412 100420->100416 100420->100419 100422 ae5c4e 2 API calls 100421->100422 100423 ae5e60 100422->100423 100424 ae5c4e 2 API calls 100423->100424 100425 ae5e74 100424->100425 100425->100404 100426->100416 100427->100311 100428->100312 100430 ae79ba 100429->100430 100431 ae7a17 100429->100431 100430->100431 100433 ae79c5 100430->100433 100432 ae7e8c 59 API calls 100431->100432 100439 ae79e8 _memmove 100432->100439 100434 b1ef32 100433->100434 100435 ae79e0 100433->100435 100447 ae8189 100434->100447 100443 ae8087 100435->100443 100438 b1ef3c 100440 b00ff6 Mailbox 59 API calls 100438->100440 100439->100341 100441 b1ef5c 100440->100441 100442->100360 100444 ae809f 100443->100444 100446 ae8099 100443->100446 100445 b00ff6 Mailbox 59 API calls 100444->100445 100445->100446 100446->100439 100448 b00ff6 Mailbox 59 API calls 100447->100448 100449 ae8193 100448->100449 100449->100438 100451 ae6ef5 100450->100451 100455 ae7009 100450->100455 100452 b00ff6 Mailbox 59 API calls 100451->100452 100451->100455 100454 ae6f1c 100452->100454 100453 b00ff6 Mailbox 59 API calls 100460 ae6f91 100453->100460 100454->100453 100455->98963 100459 ae766f 59 API calls 100459->100460 100460->100455 100460->100459 100463 ae63a0 100460->100463 100488 ae74bd 59 API calls Mailbox 100460->100488 100489 b36ac9 59 API calls Mailbox 100460->100489 100461->98966 100462->98968 100490 ae7b76 100463->100490 100465 ae65ca 100466 ae766f 59 API calls 100465->100466 100467 ae65e4 Mailbox 100466->100467 100467->100460 100470 b1e41f 100499 b3fdba 91 API calls 4 library calls 100470->100499 100471 ae766f 59 API calls 100480 ae63c5 100471->100480 100475 ae7eec 59 API calls 100475->100480 100476 b1e42d 100477 ae766f 59 API calls 100476->100477 100479 ae68f9 _memmove 100500 b3fdba 91 API calls 4 library calls 100479->100500 100480->100465 100480->100470 100480->100471 100480->100475 100480->100479 100481 b1e3bb 100480->100481 100485 ae7faf 59 API calls 100480->100485 100495 ae60cc 60 API calls 100480->100495 100496 ae5ea1 59 API calls Mailbox 100480->100496 100497 ae5fd2 60 API calls 100480->100497 100498 ae7a84 59 API calls 2 library calls 100480->100498 100482 ae8189 59 API calls 100481->100482 100483 b1e3c6 100482->100483 100487 b00ff6 Mailbox 59 API calls 100483->100487 100486 ae659b CharUpperBuffW 100485->100486 100486->100480 100487->100479 100488->100460 100489->100460 100491 b00ff6 Mailbox 59 API calls 100490->100491 100492 ae7b9b 100491->100492 100493 ae8189 59 API calls 100492->100493 100494 ae7baa 100493->100494 100494->100480 100495->100480 100496->100480 100497->100480 100498->100480 100499->100476 100500->100467 100501->98981 100502->98982 100504 b1d638 100503->100504 100505 ae4227 100503->100505 100504->100505 100506 b1d641 DestroyIcon 100504->100506 100505->98988 100529 b43226 62 API calls _W_store_winword 100505->100529 100506->100505 100529->98988 100586->99008 100587->99008 100588->99008 101025 ae107d 101030 ae71eb 101025->101030 101027 ae108c 101028 b02f80 __cinit 67 API calls 101027->101028 101029 ae1096 101028->101029 101031 ae71fb __ftell_nolock 101030->101031 101032 ae77c7 59 API calls 101031->101032 101033 ae72b1 101032->101033 101034 ae4864 61 API calls 101033->101034 101035 ae72ba 101034->101035 101061 b0074f 101035->101061 101038 ae7e0b 59 API calls 101039 ae72d3 101038->101039 101040 ae3f84 59 API calls 101039->101040 101041 ae72e2 101040->101041 101042 ae77c7 59 API calls 101041->101042 101043 ae72eb 101042->101043 101044 ae7eec 59 API calls 101043->101044 101045 ae72f4 RegOpenKeyExW 101044->101045 101046 b1ecda RegQueryValueExW 101045->101046 101051 ae7316 Mailbox 101045->101051 101047 b1ecf7 101046->101047 101048 b1ed6c RegCloseKey 101046->101048 101049 b00ff6 Mailbox 59 API calls 101047->101049 101048->101051 101060 b1ed7e _wcscat Mailbox __wsetenvp 101048->101060 101050 b1ed10 101049->101050 101053 ae538e 59 API calls 101050->101053 101051->101027 101052 ae7b52 59 API calls 101052->101060 101054 b1ed1b RegQueryValueExW 101053->101054 101055 b1ed38 101054->101055 101057 b1ed52 101054->101057 101056 ae7d2c 59 API calls 101055->101056 101056->101057 101057->101048 101058 ae7f41 59 API calls 101058->101060 101059 ae3f84 59 API calls 101059->101060 101060->101051 101060->101052 101060->101058 101060->101059 101062 b11b90 __ftell_nolock 101061->101062 101063 b0075c GetFullPathNameW 101062->101063 101064 b0077e 101063->101064 101065 ae7d2c 59 API calls 101064->101065 101066 ae72c5 101065->101066 101066->101038 101067 ae568a 101074 ae5c18 101067->101074 101073 ae56ba Mailbox 101075 b00ff6 Mailbox 59 API calls 101074->101075 101076 ae5c2b 101075->101076 101077 b00ff6 Mailbox 59 API calls 101076->101077 101078 ae569c 101077->101078 101079 ae5632 101078->101079 101093 ae5a2f 101079->101093 101081 ae5674 101081->101073 101085 ae81c1 MultiByteToWideChar 101081->101085 101082 ae5d20 2 API calls 101083 ae5643 101082->101083 101083->101081 101083->101082 101100 ae5bda 59 API calls 2 library calls 101083->101100 101086 ae822e 101085->101086 101087 ae81e7 101085->101087 101089 ae7eec 59 API calls 101086->101089 101088 b00ff6 Mailbox 59 API calls 101087->101088 101090 ae81fc MultiByteToWideChar 101088->101090 101092 ae8220 101089->101092 101102 ae78ad 101090->101102 101092->101073 101094 b1e065 101093->101094 101095 ae5a40 101093->101095 101101 b36443 59 API calls Mailbox 101094->101101 101095->101083 101097 b1e06f 101098 b00ff6 Mailbox 59 API calls 101097->101098 101099 b1e07b 101098->101099 101100->101083 101101->101097 101103 ae792f 101102->101103 101104 ae78bc 101102->101104 101105 ae7e8c 59 API calls 101103->101105 101104->101103 101107 ae78c8 101104->101107 101106 ae78da _memmove 101105->101106 101106->101092 101108 ae78d2 101107->101108 101109 ae7900 101107->101109 101110 ae8087 59 API calls 101108->101110 101111 ae8189 59 API calls 101109->101111 101110->101106 101112 ae790a 101111->101112 101113 b00ff6 Mailbox 59 API calls 101112->101113 101113->101106 101114 b20226 101120 aeade2 Mailbox 101114->101120 101115 aeb6c1 101229 b4a0b5 89 API calls 4 library calls 101115->101229 101117 b20c86 101230 b366f4 101117->101230 101119 b20c8f 101120->101115 101120->101117 101120->101119 101122 b200e0 VariantClear 101120->101122 101128 b5e237 101120->101128 101131 b4d2e6 101120->101131 101178 af2123 101120->101178 101218 b5474d 101120->101218 101227 ae9df0 59 API calls Mailbox 101120->101227 101228 b37405 59 API calls 101120->101228 101122->101120 101129 b5cdf1 130 API calls 101128->101129 101130 b5e247 101129->101130 101130->101120 101132 b4d305 101131->101132 101133 b4d310 101131->101133 101233 ae9c9c 59 API calls 101132->101233 101135 b4d3ea Mailbox 101133->101135 101137 ae77c7 59 API calls 101133->101137 101136 b00ff6 Mailbox 59 API calls 101135->101136 101175 b4d3f3 Mailbox 101135->101175 101138 b4d433 101136->101138 101139 b4d334 101137->101139 101140 b4d43f 101138->101140 101236 ae5906 60 API calls Mailbox 101138->101236 101141 ae77c7 59 API calls 101139->101141 101143 ae9997 84 API calls 101140->101143 101144 b4d33d 101141->101144 101145 b4d457 101143->101145 101146 ae9997 84 API calls 101144->101146 101147 ae5956 67 API calls 101145->101147 101148 b4d349 101146->101148 101149 b4d466 101147->101149 101150 ae46f9 59 API calls 101148->101150 101151 b4d49e 101149->101151 101152 b4d46a GetLastError 101149->101152 101153 b4d35e 101150->101153 101156 b4d500 101151->101156 101157 b4d4c9 101151->101157 101154 b4d483 101152->101154 101155 ae7c8e 59 API calls 101153->101155 101154->101175 101237 ae5a1a CloseHandle 101154->101237 101158 b4d391 101155->101158 101161 b00ff6 Mailbox 59 API calls 101156->101161 101159 b00ff6 Mailbox 59 API calls 101157->101159 101160 b4d3e3 101158->101160 101165 b43e73 3 API calls 101158->101165 101162 b4d4ce 101159->101162 101235 ae9c9c 59 API calls 101160->101235 101166 b4d505 101161->101166 101167 b4d4df 101162->101167 101170 ae77c7 59 API calls 101162->101170 101168 b4d3a1 101165->101168 101169 ae77c7 59 API calls 101166->101169 101166->101175 101238 b4f835 59 API calls 2 library calls 101167->101238 101168->101160 101171 b4d3a5 101168->101171 101169->101175 101170->101167 101173 ae7f41 59 API calls 101171->101173 101174 b4d3b2 101173->101174 101234 b43c66 63 API calls Mailbox 101174->101234 101175->101120 101177 b4d3bb Mailbox 101177->101160 101239 ae9bf8 101178->101239 101182 b00ff6 Mailbox 59 API calls 101183 af2154 101182->101183 101184 af2164 101183->101184 101267 ae5906 60 API calls Mailbox 101183->101267 101188 ae9997 84 API calls 101184->101188 101185 af2189 101193 af2196 101185->101193 101272 ae9c9c 59 API calls 101185->101272 101186 b269af 101186->101185 101271 b4f7df 59 API calls 101186->101271 101190 af2172 101188->101190 101192 ae5956 67 API calls 101190->101192 101191 b269f7 101191->101193 101194 b269ff 101191->101194 101195 af2181 101192->101195 101197 ae5e3f 2 API calls 101193->101197 101273 ae9c9c 59 API calls 101194->101273 101195->101185 101195->101186 101270 ae5a1a CloseHandle 101195->101270 101199 af219d 101197->101199 101200 b26a11 101199->101200 101201 af21b7 101199->101201 101203 b00ff6 Mailbox 59 API calls 101200->101203 101202 ae77c7 59 API calls 101201->101202 101204 af21bf 101202->101204 101205 b26a17 101203->101205 101252 ae56d2 101204->101252 101207 b26a2b 101205->101207 101274 ae59b0 ReadFile SetFilePointerEx 101205->101274 101212 b26a2f _memmove 101207->101212 101275 b4794e 59 API calls 2 library calls 101207->101275 101209 af21ce 101209->101212 101268 ae9b9c 59 API calls Mailbox 101209->101268 101213 af21e2 Mailbox 101214 af221c 101213->101214 101215 ae5dcf CloseHandle 101213->101215 101214->101120 101216 af2210 101215->101216 101216->101214 101269 ae5a1a CloseHandle 101216->101269 101219 ae9997 84 API calls 101218->101219 101220 b54787 101219->101220 101221 ae63a0 94 API calls 101220->101221 101222 b54797 101221->101222 101223 b547bc 101222->101223 101224 aea000 341 API calls 101222->101224 101225 ae9bf8 59 API calls 101223->101225 101226 b547c0 101223->101226 101224->101223 101225->101226 101226->101120 101227->101120 101228->101120 101229->101117 101279 b36636 101230->101279 101232 b36702 101232->101119 101233->101133 101234->101177 101235->101135 101236->101140 101237->101175 101238->101175 101240 ae9c08 101239->101240 101241 b1fbff 101239->101241 101245 b00ff6 Mailbox 59 API calls 101240->101245 101242 b1fc10 101241->101242 101243 ae7d2c 59 API calls 101241->101243 101244 ae7eec 59 API calls 101242->101244 101243->101242 101248 b1fc1a 101244->101248 101246 ae9c1b 101245->101246 101246->101248 101249 ae9c26 101246->101249 101247 ae9c34 101247->101182 101247->101186 101248->101247 101250 ae77c7 59 API calls 101248->101250 101249->101247 101251 ae7f41 59 API calls 101249->101251 101250->101247 101251->101247 101253 ae56dd 101252->101253 101254 ae5702 101252->101254 101253->101254 101258 ae56ec 101253->101258 101255 ae7eec 59 API calls 101254->101255 101259 b4349a 101255->101259 101256 b434c9 101256->101209 101260 ae5c18 59 API calls 101258->101260 101259->101256 101276 b43436 ReadFile SetFilePointerEx 101259->101276 101277 ae7a84 59 API calls 2 library calls 101259->101277 101262 b435ba 101260->101262 101263 ae5632 61 API calls 101262->101263 101264 b435c8 101263->101264 101266 b435d8 Mailbox 101264->101266 101278 ae793a 61 API calls Mailbox 101264->101278 101266->101209 101267->101184 101268->101213 101269->101214 101270->101186 101271->101186 101272->101191 101273->101199 101274->101207 101275->101212 101276->101259 101277->101259 101278->101266 101280 b36641 101279->101280 101281 b3665e 101279->101281 101280->101281 101283 b36621 59 API calls Mailbox 101280->101283 101281->101232 101283->101280 101284 b1ff06 101285 b1ff10 101284->101285 101293 aeac90 Mailbox _memmove 101284->101293 101383 ae8e34 59 API calls Mailbox 101285->101383 101291 b00ff6 59 API calls Mailbox 101307 aea097 Mailbox 101291->101307 101295 aea1b7 101293->101295 101296 aeb685 101293->101296 101303 ae7f41 59 API calls 101293->101303 101293->101307 101314 b5bf80 341 API calls 101293->101314 101316 b366f4 Mailbox 59 API calls 101293->101316 101317 b00ff6 59 API calls Mailbox 101293->101317 101318 aeb416 101293->101318 101320 aea000 341 API calls 101293->101320 101321 b20c94 101293->101321 101323 b20ca2 101293->101323 101326 aeb37c 101293->101326 101333 aeade2 Mailbox 101293->101333 101339 b5c5f4 101293->101339 101371 b47be0 101293->101371 101384 b37405 59 API calls 101293->101384 101385 b5c4a7 85 API calls 2 library calls 101293->101385 101294 aeb5d5 101298 ae81a7 59 API calls 101294->101298 101388 b4a0b5 89 API calls 4 library calls 101296->101388 101297 ae81a7 59 API calls 101297->101307 101298->101295 101299 b2047f 101387 b4a0b5 89 API calls 4 library calls 101299->101387 101300 aeb5da 101393 b4a0b5 89 API calls 4 library calls 101300->101393 101303->101293 101304 ae77c7 59 API calls 101304->101307 101306 b2048e 101307->101291 101307->101294 101307->101295 101307->101297 101307->101299 101307->101300 101307->101304 101308 b02f80 67 API calls __cinit 101307->101308 101310 b37405 59 API calls 101307->101310 101312 b20e00 101307->101312 101315 aea6ba 101307->101315 101377 aeca20 341 API calls 2 library calls 101307->101377 101378 aeba60 60 API calls Mailbox 101307->101378 101308->101307 101310->101307 101311 b366f4 Mailbox 59 API calls 101311->101295 101392 b4a0b5 89 API calls 4 library calls 101312->101392 101314->101293 101391 b4a0b5 89 API calls 4 library calls 101315->101391 101316->101293 101317->101293 101382 aef803 341 API calls 101318->101382 101320->101293 101389 ae9df0 59 API calls Mailbox 101321->101389 101390 b4a0b5 89 API calls 4 library calls 101323->101390 101325 b20c86 101325->101295 101325->101311 101380 ae9e9c 60 API calls Mailbox 101326->101380 101328 aeb38d 101381 ae9e9c 60 API calls Mailbox 101328->101381 101333->101295 101333->101296 101333->101325 101334 b200e0 VariantClear 101333->101334 101335 b4d2e6 101 API calls 101333->101335 101336 b5e237 130 API calls 101333->101336 101337 b5474d 341 API calls 101333->101337 101338 af2123 95 API calls 101333->101338 101379 ae9df0 59 API calls Mailbox 101333->101379 101386 b37405 59 API calls 101333->101386 101334->101333 101335->101333 101336->101333 101337->101333 101338->101333 101340 ae77c7 59 API calls 101339->101340 101341 b5c608 101340->101341 101342 ae77c7 59 API calls 101341->101342 101343 b5c610 101342->101343 101344 ae77c7 59 API calls 101343->101344 101345 b5c618 101344->101345 101346 ae9997 84 API calls 101345->101346 101368 b5c626 101346->101368 101347 ae7d2c 59 API calls 101347->101368 101348 ae7a84 59 API calls 101348->101368 101349 b5c80f 101350 b5c83c Mailbox 101349->101350 101396 ae9b9c 59 API calls Mailbox 101349->101396 101350->101293 101352 b5c7f6 101353 ae7e0b 59 API calls 101352->101353 101356 b5c803 101353->101356 101354 b5c811 101357 ae7e0b 59 API calls 101354->101357 101355 ae81a7 59 API calls 101355->101368 101359 ae7c8e 59 API calls 101356->101359 101360 b5c820 101357->101360 101358 ae7faf 59 API calls 101361 b5c6bd CharUpperBuffW 101358->101361 101359->101349 101362 ae7c8e 59 API calls 101360->101362 101394 ae859a 68 API calls 101361->101394 101362->101349 101363 ae7faf 59 API calls 101365 b5c77d CharUpperBuffW 101363->101365 101395 aec707 69 API calls 2 library calls 101365->101395 101367 ae9997 84 API calls 101367->101368 101368->101347 101368->101348 101368->101349 101368->101350 101368->101352 101368->101354 101368->101355 101368->101358 101368->101363 101368->101367 101369 ae7c8e 59 API calls 101368->101369 101370 ae7e0b 59 API calls 101368->101370 101369->101368 101370->101368 101372 b47bec 101371->101372 101373 b00ff6 Mailbox 59 API calls 101372->101373 101374 b47bfa 101373->101374 101375 ae77c7 59 API calls 101374->101375 101376 b47c08 101374->101376 101375->101376 101376->101293 101377->101307 101378->101307 101379->101333 101380->101328 101381->101318 101382->101296 101383->101293 101384->101293 101385->101293 101386->101333 101387->101306 101388->101325 101389->101325 101390->101325 101391->101295 101392->101300 101393->101295 101394->101368 101395->101368 101396->101350 101397 ae1016 101402 ae4ad2 101397->101402 101400 b02f80 __cinit 67 API calls 101401 ae1025 101400->101401 101403 b00ff6 Mailbox 59 API calls 101402->101403 101405 ae4ada 101403->101405 101404 ae101b 101404->101400 101405->101404 101409 ae4a94 101405->101409 101410 ae4a9d 101409->101410 101411 ae4aaf 101409->101411 101412 b02f80 __cinit 67 API calls 101410->101412 101413 ae4afe 101411->101413 101412->101411 101414 ae77c7 59 API calls 101413->101414 101415 ae4b16 GetVersionExW 101414->101415 101416 ae7d2c 59 API calls 101415->101416 101417 ae4b59 101416->101417 101418 ae7e8c 59 API calls 101417->101418 101427 ae4b86 101417->101427 101419 ae4b7a 101418->101419 101420 ae7886 59 API calls 101419->101420 101420->101427 101421 ae4bf1 GetCurrentProcess IsWow64Process 101422 ae4c0a 101421->101422 101424 ae4c89 GetSystemInfo 101422->101424 101425 ae4c20 101422->101425 101423 b1dc8d 101426 ae4c56 101424->101426 101437 ae4c95 101425->101437 101426->101404 101427->101421 101427->101423 101430 ae4c7d GetSystemInfo 101433 ae4c47 101430->101433 101431 ae4c32 101432 ae4c95 2 API calls 101431->101432 101434 ae4c3a GetNativeSystemInfo 101432->101434 101433->101426 101435 ae4c4d FreeLibrary 101433->101435 101434->101433 101435->101426 101438 ae4c2e 101437->101438 101439 ae4c9e LoadLibraryA 101437->101439 101438->101430 101438->101431 101439->101438 101440 ae4caf GetProcAddress 101439->101440 101440->101438 101441 ae1066 101446 aef8cf 101441->101446 101443 ae106c 101444 b02f80 __cinit 67 API calls 101443->101444 101445 ae1076 101444->101445 101447 aef8f0 101446->101447 101479 b00143 101447->101479 101451 aef937 101452 ae77c7 59 API calls 101451->101452 101453 aef941 101452->101453 101454 ae77c7 59 API calls 101453->101454 101455 aef94b 101454->101455 101456 ae77c7 59 API calls 101455->101456 101457 aef955 101456->101457 101458 ae77c7 59 API calls 101457->101458 101459 aef993 101458->101459 101460 ae77c7 59 API calls 101459->101460 101461 aefa5e 101460->101461 101489 af60e7 101461->101489 101465 aefa90 101466 ae77c7 59 API calls 101465->101466 101467 aefa9a 101466->101467 101517 afffde 101467->101517 101469 aefae1 101470 aefaf1 GetStdHandle 101469->101470 101471 aefb3d 101470->101471 101472 b249d5 101470->101472 101473 aefb45 OleInitialize 101471->101473 101472->101471 101474 b249de 101472->101474 101473->101443 101524 b46dda 64 API calls Mailbox 101474->101524 101476 b249e5 101525 b474a9 CreateThread 101476->101525 101478 b249f1 CloseHandle 101478->101473 101526 b0021c 101479->101526 101482 b0021c 59 API calls 101483 b00185 101482->101483 101484 ae77c7 59 API calls 101483->101484 101485 b00191 101484->101485 101486 ae7d2c 59 API calls 101485->101486 101487 aef8f6 101486->101487 101488 b003a2 6 API calls 101487->101488 101488->101451 101490 ae77c7 59 API calls 101489->101490 101491 af60f7 101490->101491 101492 ae77c7 59 API calls 101491->101492 101493 af60ff 101492->101493 101533 af5bfd 101493->101533 101496 af5bfd 59 API calls 101497 af610f 101496->101497 101498 ae77c7 59 API calls 101497->101498 101499 af611a 101498->101499 101500 b00ff6 Mailbox 59 API calls 101499->101500 101501 aefa68 101500->101501 101502 af6259 101501->101502 101503 af6267 101502->101503 101504 ae77c7 59 API calls 101503->101504 101505 af6272 101504->101505 101506 ae77c7 59 API calls 101505->101506 101507 af627d 101506->101507 101508 ae77c7 59 API calls 101507->101508 101509 af6288 101508->101509 101510 ae77c7 59 API calls 101509->101510 101511 af6293 101510->101511 101512 af5bfd 59 API calls 101511->101512 101513 af629e 101512->101513 101514 b00ff6 Mailbox 59 API calls 101513->101514 101515 af62a5 RegisterWindowMessageW 101514->101515 101515->101465 101518 b35cc3 101517->101518 101519 afffee 101517->101519 101536 b49d71 60 API calls 101518->101536 101520 b00ff6 Mailbox 59 API calls 101519->101520 101523 affff6 101520->101523 101522 b35cce 101523->101469 101524->101476 101525->101478 101537 b4748f 65 API calls 101525->101537 101527 ae77c7 59 API calls 101526->101527 101528 b00227 101527->101528 101529 ae77c7 59 API calls 101528->101529 101530 b0022f 101529->101530 101531 ae77c7 59 API calls 101530->101531 101532 b0017b 101531->101532 101532->101482 101534 ae77c7 59 API calls 101533->101534 101535 af5c05 101534->101535 101535->101496 101536->101522 101538 ae1055 101543 ae2649 101538->101543 101541 b02f80 __cinit 67 API calls 101542 ae1064 101541->101542 101544 ae77c7 59 API calls 101543->101544 101545 ae26b7 101544->101545 101550 ae3582 101545->101550 101548 ae2754 101549 ae105a 101548->101549 101553 ae3416 59 API calls 2 library calls 101548->101553 101549->101541 101554 ae35b0 101550->101554 101553->101548 101555 ae35a1 101554->101555 101556 ae35bd 101554->101556 101555->101548 101556->101555 101557 ae35c4 RegOpenKeyExW 101556->101557 101557->101555 101558 ae35de RegQueryValueExW 101557->101558 101559 ae35ff 101558->101559 101560 ae3614 RegCloseKey 101558->101560 101559->101560 101560->101555 101561 ae3633 101562 ae366a 101561->101562 101563 ae3688 101562->101563 101564 ae36e7 101562->101564 101601 ae36e5 101562->101601 101565 ae375d PostQuitMessage 101563->101565 101566 ae3695 101563->101566 101568 ae36ed 101564->101568 101569 b1d31c 101564->101569 101602 ae36d8 101565->101602 101570 b1d38f 101566->101570 101571 ae36a0 101566->101571 101567 ae36ca DefWindowProcW 101567->101602 101573 ae3715 SetTimer RegisterWindowMessageW 101568->101573 101574 ae36f2 101568->101574 101611 af11d0 10 API calls Mailbox 101569->101611 101615 b42a16 71 API calls _memset 101570->101615 101575 ae36a8 101571->101575 101576 ae3767 101571->101576 101577 ae373e CreatePopupMenu 101573->101577 101573->101602 101580 ae36f9 KillTimer 101574->101580 101581 b1d2bf 101574->101581 101583 b1d374 101575->101583 101584 ae36b3 101575->101584 101609 ae4531 64 API calls _memset 101576->101609 101577->101602 101579 b1d343 101612 af11f3 341 API calls Mailbox 101579->101612 101606 ae44cb Shell_NotifyIconW _memset 101580->101606 101588 b1d2c4 101581->101588 101589 b1d2f8 MoveWindow 101581->101589 101583->101567 101614 b3817e 59 API calls Mailbox 101583->101614 101591 ae36be 101584->101591 101592 ae374b 101584->101592 101585 b1d3a1 101585->101567 101585->101602 101594 b1d2e7 SetFocus 101588->101594 101595 b1d2c8 101588->101595 101589->101602 101590 ae370c 101607 ae3114 DeleteObject DestroyWindow Mailbox 101590->101607 101591->101567 101613 ae44cb Shell_NotifyIconW _memset 101591->101613 101608 ae45df 81 API calls _memset 101592->101608 101593 ae375b 101593->101602 101594->101602 101595->101591 101596 b1d2d1 101595->101596 101610 af11d0 10 API calls Mailbox 101596->101610 101601->101567 101604 b1d368 101605 ae43db 68 API calls 101604->101605 101605->101601 101606->101590 101607->101602 101608->101593 101609->101593 101610->101602 101611->101579 101612->101591 101613->101604 101614->101601 101615->101585

                    Control-flow Graph

                    APIs
                    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00AE3B7A
                    • IsDebuggerPresent.KERNEL32 ref: 00AE3B8C
                    • GetFullPathNameW.KERNEL32(00007FFF,?,?,00BA62F8,00BA62E0,?,?), ref: 00AE3BFD
                      • Part of subcall function 00AE7D2C: _memmove.LIBCMT ref: 00AE7D66
                      • Part of subcall function 00AF0A8D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00AE3C26,00BA62F8,?,?,?), ref: 00AF0ACE
                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00AE3C81
                    • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00B993F0,00000010), ref: 00B1D4BC
                    • SetCurrentDirectoryW.KERNEL32(?,00BA62F8,?,?,?), ref: 00B1D4F4
                    • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00B95D40,00BA62F8,?,?,?), ref: 00B1D57A
                    • ShellExecuteW.SHELL32(00000000,?,?), ref: 00B1D581
                      • Part of subcall function 00AE3A58: GetSysColorBrush.USER32(0000000F), ref: 00AE3A62
                      • Part of subcall function 00AE3A58: LoadCursorW.USER32(00000000,00007F00), ref: 00AE3A71
                      • Part of subcall function 00AE3A58: LoadIconW.USER32(00000063), ref: 00AE3A88
                      • Part of subcall function 00AE3A58: LoadIconW.USER32(000000A4), ref: 00AE3A9A
                      • Part of subcall function 00AE3A58: LoadIconW.USER32(000000A2), ref: 00AE3AAC
                      • Part of subcall function 00AE3A58: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00AE3AD2
                      • Part of subcall function 00AE3A58: RegisterClassExW.USER32(?), ref: 00AE3B28
                      • Part of subcall function 00AE39E7: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00AE3A15
                      • Part of subcall function 00AE39E7: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00AE3A36
                      • Part of subcall function 00AE39E7: ShowWindow.USER32(00000000,?,?), ref: 00AE3A4A
                      • Part of subcall function 00AE39E7: ShowWindow.USER32(00000000,?,?), ref: 00AE3A53
                      • Part of subcall function 00AE43DB: _memset.LIBCMT ref: 00AE4401
                      • Part of subcall function 00AE43DB: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00AE44A6
                    Strings
                    • runas, xrefs: 00B1D575
                    • This is a third-party compiled AutoIt script., xrefs: 00B1D4B4
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                    • String ID: This is a third-party compiled AutoIt script.$runas
                    • API String ID: 529118366-3287110873
                    • Opcode ID: cd31d0cf05c254899f3cedca7982ebccd329afcb53cfc7b8e7597e7adbb700f1
                    • Instruction ID: fe877d00a576eb7d778dd24520ed0ba6763f577f24761c19c94a3c84fc78befa
                    • Opcode Fuzzy Hash: cd31d0cf05c254899f3cedca7982ebccd329afcb53cfc7b8e7597e7adbb700f1
                    • Instruction Fuzzy Hash: 62510A72908389AECF11EBB5DD1AEFD7BB8AF46300F1440B5F411631A1DE749A45CB21

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 996 ae4afe-ae4b5e call ae77c7 GetVersionExW call ae7d2c 1001 ae4c69-ae4c6b 996->1001 1002 ae4b64 996->1002 1003 b1db90-b1db9c 1001->1003 1004 ae4b67-ae4b6c 1002->1004 1005 b1db9d-b1dba1 1003->1005 1006 ae4b72 1004->1006 1007 ae4c70-ae4c71 1004->1007 1009 b1dba3 1005->1009 1010 b1dba4-b1dbb0 1005->1010 1008 ae4b73-ae4baa call ae7e8c call ae7886 1006->1008 1007->1008 1018 b1dc8d-b1dc90 1008->1018 1019 ae4bb0-ae4bb1 1008->1019 1009->1010 1010->1005 1012 b1dbb2-b1dbb7 1010->1012 1012->1004 1014 b1dbbd-b1dbc4 1012->1014 1014->1003 1016 b1dbc6 1014->1016 1020 b1dbcb-b1dbce 1016->1020 1021 b1dc92 1018->1021 1022 b1dca9-b1dcad 1018->1022 1019->1020 1023 ae4bb7-ae4bc2 1019->1023 1024 b1dbd4-b1dbf2 1020->1024 1025 ae4bf1-ae4c08 GetCurrentProcess IsWow64Process 1020->1025 1026 b1dc95 1021->1026 1030 b1dc98-b1dca1 1022->1030 1031 b1dcaf-b1dcb8 1022->1031 1027 b1dc13-b1dc19 1023->1027 1028 ae4bc8-ae4bca 1023->1028 1024->1025 1029 b1dbf8-b1dbfe 1024->1029 1032 ae4c0d-ae4c1e 1025->1032 1033 ae4c0a 1025->1033 1026->1030 1038 b1dc23-b1dc29 1027->1038 1039 b1dc1b-b1dc1e 1027->1039 1034 ae4bd0-ae4bd3 1028->1034 1035 b1dc2e-b1dc3a 1028->1035 1036 b1dc00-b1dc03 1029->1036 1037 b1dc08-b1dc0e 1029->1037 1030->1022 1031->1026 1040 b1dcba-b1dcbd 1031->1040 1041 ae4c89-ae4c93 GetSystemInfo 1032->1041 1042 ae4c20-ae4c30 call ae4c95 1032->1042 1033->1032 1043 ae4bd9-ae4be8 1034->1043 1044 b1dc5a-b1dc5d 1034->1044 1046 b1dc44-b1dc4a 1035->1046 1047 b1dc3c-b1dc3f 1035->1047 1036->1025 1037->1025 1038->1025 1039->1025 1040->1030 1045 ae4c56-ae4c66 1041->1045 1053 ae4c7d-ae4c87 GetSystemInfo 1042->1053 1054 ae4c32-ae4c3f call ae4c95 1042->1054 1050 ae4bee 1043->1050 1051 b1dc4f-b1dc55 1043->1051 1044->1025 1049 b1dc63-b1dc78 1044->1049 1046->1025 1047->1025 1055 b1dc82-b1dc88 1049->1055 1056 b1dc7a-b1dc7d 1049->1056 1050->1025 1051->1025 1058 ae4c47-ae4c4b 1053->1058 1061 ae4c76-ae4c7b 1054->1061 1062 ae4c41-ae4c45 GetNativeSystemInfo 1054->1062 1055->1025 1056->1025 1058->1045 1060 ae4c4d-ae4c50 FreeLibrary 1058->1060 1060->1045 1061->1062 1062->1058
                    APIs
                    • GetVersionExW.KERNEL32(?), ref: 00AE4B2B
                      • Part of subcall function 00AE7D2C: _memmove.LIBCMT ref: 00AE7D66
                    • GetCurrentProcess.KERNEL32(?,00B6FAEC,00000000,00000000,?), ref: 00AE4BF8
                    • IsWow64Process.KERNEL32(00000000), ref: 00AE4BFF
                    • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00AE4C45
                    • FreeLibrary.KERNEL32(00000000), ref: 00AE4C50
                    • GetSystemInfo.KERNEL32(00000000), ref: 00AE4C81
                    • GetSystemInfo.KERNEL32(00000000), ref: 00AE4C8D
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                    • String ID:
                    • API String ID: 1986165174-0
                    • Opcode ID: 2c644495badf0b6f69a1e29bc716d345d43cc11f38f3fb946d89eb621b1abf40
                    • Instruction ID: b306ceb8a456f2545113f96d30abebfb87744dd9b294227a45e6c6009b05bc68
                    • Opcode Fuzzy Hash: 2c644495badf0b6f69a1e29bc716d345d43cc11f38f3fb946d89eb621b1abf40
                    • Instruction Fuzzy Hash: A091E43154A7C0DEC731CB7995512ABBFF8AF6A300B584D9DE0CB93A41D224F948C759

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1063 ae4fe9-ae5001 CreateStreamOnHGlobal 1064 ae5003-ae501a FindResourceExW 1063->1064 1065 ae5021-ae5026 1063->1065 1066 b1dd5c-b1dd6b LoadResource 1064->1066 1067 ae5020 1064->1067 1066->1067 1068 b1dd71-b1dd7f SizeofResource 1066->1068 1067->1065 1068->1067 1069 b1dd85-b1dd90 LockResource 1068->1069 1069->1067 1070 b1dd96-b1dd9e 1069->1070 1071 b1dda2-b1ddb4 1070->1071 1071->1067
                    APIs
                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00AE4EEE,?,?,00000000,00000000), ref: 00AE4FF9
                    • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00AE4EEE,?,?,00000000,00000000), ref: 00AE5010
                    • LoadResource.KERNEL32(?,00000000,?,?,00AE4EEE,?,?,00000000,00000000,?,?,?,?,?,?,00AE4F8F), ref: 00B1DD60
                    • SizeofResource.KERNEL32(?,00000000,?,?,00AE4EEE,?,?,00000000,00000000,?,?,?,?,?,?,00AE4F8F), ref: 00B1DD75
                    • LockResource.KERNEL32(00AE4EEE,?,?,00AE4EEE,?,?,00000000,00000000,?,?,?,?,?,?,00AE4F8F,00000000), ref: 00B1DD88
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                    • String ID: SCRIPT
                    • API String ID: 3051347437-3967369404
                    • Opcode ID: 4d3c3d6e8abcd4fc1cc4606575e152cafafc8e942378317c62246e35f926808c
                    • Instruction ID: 1efaeaaa9df4c95c93e5424176e2a3b6a69304650ede566c6bdc95acc81d3eb9
                    • Opcode Fuzzy Hash: 4d3c3d6e8abcd4fc1cc4606575e152cafafc8e942378317c62246e35f926808c
                    • Instruction Fuzzy Hash: AF112A75640741AFD7218B6AEC58F677BB9EBC9B55F204168F406D72A0DBA1E8008A60
                    APIs
                    • GetFileAttributesW.KERNELBASE(?,00B1E7C1), ref: 00B446A6
                    • FindFirstFileW.KERNELBASE(?,?), ref: 00B446B7
                    • FindClose.KERNEL32(00000000), ref: 00B446C7
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: FileFind$AttributesCloseFirst
                    • String ID:
                    • API String ID: 48322524-0
                    • Opcode ID: f33717810903b23ccd47e840271e9ba916cad8a3058e91a0aad01bad859b0e32
                    • Instruction ID: a01893eca31fd70ba8f763629df25bb15301c148dc095277eeaa4f43e180b94d
                    • Opcode Fuzzy Hash: f33717810903b23ccd47e840271e9ba916cad8a3058e91a0aad01bad859b0e32
                    • Instruction Fuzzy Hash: 02E0D8314104015B42106B38FC4D4FA779CDE06335F100796F835C21E0EBF45A60A999
                    Strings
                    • Variable must be of type 'Object'., xrefs: 00B2428C
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID:
                    • String ID: Variable must be of type 'Object'.
                    • API String ID: 0-109567571
                    • Opcode ID: 92fa688b1d00ca21612a9da47a31e76afd7cc0331b1b8f2780736deb53e64c51
                    • Instruction ID: 53d50f793f3174bf7b967c3b8426f6e5abb8f532ec508a9969d6d79c94a3bfa4
                    • Opcode Fuzzy Hash: 92fa688b1d00ca21612a9da47a31e76afd7cc0331b1b8f2780736deb53e64c51
                    • Instruction Fuzzy Hash: 75A2A274A04255CFCB24CF5AC980AAEB7F1FF59300F2481A9E91AAB351D735ED42CB91
                    APIs
                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00AF0BBB
                    • timeGetTime.WINMM ref: 00AF0E76
                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00AF0FB3
                    • TranslateMessage.USER32(?), ref: 00AF0FC7
                    • DispatchMessageW.USER32(?), ref: 00AF0FD5
                    • Sleep.KERNEL32(0000000A), ref: 00AF0FDF
                    • LockWindowUpdate.USER32(00000000,?,?), ref: 00AF105A
                    • DestroyWindow.USER32 ref: 00AF1066
                    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00AF1080
                    • Sleep.KERNEL32(0000000A,?,?), ref: 00B252AD
                    • TranslateMessage.USER32(?), ref: 00B2608A
                    • DispatchMessageW.USER32(?), ref: 00B26098
                    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00B260AC
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Message$DispatchPeekSleepTranslateWindow$DestroyLockTimeUpdatetime
                    • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                    • API String ID: 4003667617-3242690629
                    • Opcode ID: 5b1dbcf38bae2ce7a93bce98dbbd7f952b597fe251c1cdb06fb40e7b4ce35c16
                    • Instruction ID: df7f69e498b230528fa117e4d8e3ae7d2e0e0196f804e5d788768c731ffc4230
                    • Opcode Fuzzy Hash: 5b1dbcf38bae2ce7a93bce98dbbd7f952b597fe251c1cdb06fb40e7b4ce35c16
                    • Instruction Fuzzy Hash: CAB2AC70608751DFD738DB24D885BAABBE5FF84304F14499DF58A872A2DB74E844CB82

                    Control-flow Graph

                    APIs
                      • Part of subcall function 00B491E9: __time64.LIBCMT ref: 00B491F3
                      • Part of subcall function 00AE5045: _fseek.LIBCMT ref: 00AE505D
                    • __wsplitpath.LIBCMT ref: 00B494BE
                      • Part of subcall function 00B0432E: __wsplitpath_helper.LIBCMT ref: 00B0436E
                    • _wcscpy.LIBCMT ref: 00B494D1
                    • _wcscat.LIBCMT ref: 00B494E4
                    • __wsplitpath.LIBCMT ref: 00B49509
                    • _wcscat.LIBCMT ref: 00B4951F
                    • _wcscat.LIBCMT ref: 00B49532
                      • Part of subcall function 00B4922F: _memmove.LIBCMT ref: 00B49268
                      • Part of subcall function 00B4922F: _memmove.LIBCMT ref: 00B49277
                    • _wcscmp.LIBCMT ref: 00B49479
                      • Part of subcall function 00B499BE: _wcscmp.LIBCMT ref: 00B49AAE
                      • Part of subcall function 00B499BE: _wcscmp.LIBCMT ref: 00B49AC1
                    • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00B496DC
                    • _wcsncpy.LIBCMT ref: 00B4974F
                    • DeleteFileW.KERNEL32(?,?), ref: 00B49785
                    • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00B4979B
                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00B497AC
                    • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00B497BE
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                    • String ID:
                    • API String ID: 1500180987-0
                    • Opcode ID: 3db9eb2eb709636c095013b8c02241174e4f2b83551bd1795baeb89ea5b97309
                    • Instruction ID: 62a9b54801b8c6903e1b67dbfc32ca74416fd69295888e6527573d6eb83c3378
                    • Opcode Fuzzy Hash: 3db9eb2eb709636c095013b8c02241174e4f2b83551bd1795baeb89ea5b97309
                    • Instruction Fuzzy Hash: 9CC128B1D00229AEDF21DFA5CD85ADFBBBDEF44304F0040AAF609E6151DB709A849F65

                    Control-flow Graph

                    APIs
                    • GetSysColorBrush.USER32(0000000F), ref: 00AE3074
                    • RegisterClassExW.USER32(00000030), ref: 00AE309E
                    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00AE30AF
                    • InitCommonControlsEx.COMCTL32(?), ref: 00AE30CC
                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00AE30DC
                    • LoadIconW.USER32(000000A9), ref: 00AE30F2
                    • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00AE3101
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                    • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                    • API String ID: 2914291525-1005189915
                    • Opcode ID: a407fa877b9cc8cb200a1e0aad7c664c8e77afa0e236e8a9cfd0d7842575fbd2
                    • Instruction ID: cb1639e5e73f78303296d3910f70fc6dc19f1fb34b3d34941bdc2596e04e5183
                    • Opcode Fuzzy Hash: a407fa877b9cc8cb200a1e0aad7c664c8e77afa0e236e8a9cfd0d7842575fbd2
                    • Instruction Fuzzy Hash: 0E3149B184430AAFDB40CFA4EC85AD9BBF4FB09310F14456AE590E72A0DBB94585CF90

                    Control-flow Graph

                    APIs
                    • GetSysColorBrush.USER32(0000000F), ref: 00AE3074
                    • RegisterClassExW.USER32(00000030), ref: 00AE309E
                    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00AE30AF
                    • InitCommonControlsEx.COMCTL32(?), ref: 00AE30CC
                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00AE30DC
                    • LoadIconW.USER32(000000A9), ref: 00AE30F2
                    • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00AE3101
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                    • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                    • API String ID: 2914291525-1005189915
                    • Opcode ID: b982f4324f2caab1612db1e7838ced15e89f07631f0bebbb7d6db0afb9a2241d
                    • Instruction ID: 3fbe224ed6a060633ae53ed8ead6c64317253c115442da12921ea22679480b51
                    • Opcode Fuzzy Hash: b982f4324f2caab1612db1e7838ced15e89f07631f0bebbb7d6db0afb9a2241d
                    • Instruction Fuzzy Hash: FC21C5B1D01219AFDB00DFA4EC49BADBBF8FB09700F04412AF510A72A0DBB945448F91

                    Control-flow Graph

                    APIs
                      • Part of subcall function 00AE4864: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00BA62F8,?,00AE37C0,?), ref: 00AE4882
                      • Part of subcall function 00B0074F: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00AE72C5), ref: 00B00771
                    • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00AE7308
                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00B1ECF1
                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00B1ED32
                    • RegCloseKey.ADVAPI32(?), ref: 00B1ED70
                    • _wcscat.LIBCMT ref: 00B1EDC9
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                    • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                    • API String ID: 2673923337-2727554177
                    • Opcode ID: 8555fbcef5734a70aae41409fd8ab15fdab039208d4adaab21634806d1e4c1eb
                    • Instruction ID: 1ece123bc27126dc49425729f11dafb193e593ebb6359b7b8d3aa8ec86ea1fc5
                    • Opcode Fuzzy Hash: 8555fbcef5734a70aae41409fd8ab15fdab039208d4adaab21634806d1e4c1eb
                    • Instruction Fuzzy Hash: 89714A7254C3419EC314EF66EC86AABBBE8FF9A340F40446EF455871A1EF709948CB51

                    Control-flow Graph

                    APIs
                    • GetSysColorBrush.USER32(0000000F), ref: 00AE3A62
                    • LoadCursorW.USER32(00000000,00007F00), ref: 00AE3A71
                    • LoadIconW.USER32(00000063), ref: 00AE3A88
                    • LoadIconW.USER32(000000A4), ref: 00AE3A9A
                    • LoadIconW.USER32(000000A2), ref: 00AE3AAC
                    • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00AE3AD2
                    • RegisterClassExW.USER32(?), ref: 00AE3B28
                      • Part of subcall function 00AE3041: GetSysColorBrush.USER32(0000000F), ref: 00AE3074
                      • Part of subcall function 00AE3041: RegisterClassExW.USER32(00000030), ref: 00AE309E
                      • Part of subcall function 00AE3041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00AE30AF
                      • Part of subcall function 00AE3041: InitCommonControlsEx.COMCTL32(?), ref: 00AE30CC
                      • Part of subcall function 00AE3041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00AE30DC
                      • Part of subcall function 00AE3041: LoadIconW.USER32(000000A9), ref: 00AE30F2
                      • Part of subcall function 00AE3041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00AE3101
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                    • String ID: #$0$AutoIt v3
                    • API String ID: 423443420-4155596026
                    • Opcode ID: d03bb6e96dd0b6263990b0b1aa3c3ecb5ddafc3413375c427970c1acaeb269ab
                    • Instruction ID: 45ef3f40d9bef6863bb1bd6355e4d42e79d3f418ab4ca6c217a5074082fb6701
                    • Opcode Fuzzy Hash: d03bb6e96dd0b6263990b0b1aa3c3ecb5ddafc3413375c427970c1acaeb269ab
                    • Instruction Fuzzy Hash: 06215EB1D00305AFEB149FA5EC0ABAD7BB4FB09711F040129F504A72E0DBBA59549F84

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 767 ae3633-ae3681 769 ae3683-ae3686 767->769 770 ae36e1-ae36e3 767->770 771 ae3688-ae368f 769->771 772 ae36e7 769->772 770->769 773 ae36e5 770->773 774 ae375d-ae3765 PostQuitMessage 771->774 775 ae3695-ae369a 771->775 777 ae36ed-ae36f0 772->777 778 b1d31c-b1d34a call af11d0 call af11f3 772->778 776 ae36ca-ae36d2 DefWindowProcW 773->776 783 ae3711-ae3713 774->783 779 b1d38f-b1d3a3 call b42a16 775->779 780 ae36a0-ae36a2 775->780 782 ae36d8-ae36de 776->782 784 ae3715-ae373c SetTimer RegisterWindowMessageW 777->784 785 ae36f2-ae36f3 777->785 814 b1d34f-b1d356 778->814 779->783 805 b1d3a9 779->805 786 ae36a8-ae36ad 780->786 787 ae3767-ae3776 call ae4531 780->787 783->782 784->783 788 ae373e-ae3749 CreatePopupMenu 784->788 791 ae36f9-ae370c KillTimer call ae44cb call ae3114 785->791 792 b1d2bf-b1d2c2 785->792 794 b1d374-b1d37b 786->794 795 ae36b3-ae36b8 786->795 787->783 788->783 791->783 799 b1d2c4-b1d2c6 792->799 800 b1d2f8-b1d317 MoveWindow 792->800 794->776 802 b1d381-b1d38a call b3817e 794->802 803 ae36be-ae36c4 795->803 804 ae374b-ae375b call ae45df 795->804 808 b1d2e7-b1d2f3 SetFocus 799->808 809 b1d2c8-b1d2cb 799->809 800->783 802->776 803->776 803->814 804->783 805->776 808->783 809->803 810 b1d2d1-b1d2e2 call af11d0 809->810 810->783 814->776 818 b1d35c-b1d36f call ae44cb call ae43db 814->818 818->776
                    APIs
                    • DefWindowProcW.USER32(?,?,?,?), ref: 00AE36D2
                    • KillTimer.USER32(?,00000001), ref: 00AE36FC
                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00AE371F
                    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00AE372A
                    • CreatePopupMenu.USER32 ref: 00AE373E
                    • PostQuitMessage.USER32(00000000), ref: 00AE375F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                    • String ID: TaskbarCreated
                    • API String ID: 129472671-2362178303
                    • Opcode ID: 5b629f42794f22481a4afe42e524c653024220b83ea38ab7455d3b67028c417f
                    • Instruction ID: cf9344fb3cf363c9be94581576fd880f438f07ce31ae81ae4b7cc24b8e451a18
                    • Opcode Fuzzy Hash: 5b629f42794f22481a4afe42e524c653024220b83ea38ab7455d3b67028c417f
                    • Instruction Fuzzy Hash: 4F412AF3204285BBDF149F75EC0EB7E37A8EB05300F180129F612872E1DEA59E509765

                    Control-flow Graph

                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                    • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
                    • API String ID: 1825951767-3513169116
                    • Opcode ID: 3c28165deee24393e2b01bd89f29f1bb37a9a11f702abf3df287667ce33590f3
                    • Instruction ID: 5b101cd57a193264afaab47536d287f5ec973032bdbbe4806a2798c24748d7ed
                    • Opcode Fuzzy Hash: 3c28165deee24393e2b01bd89f29f1bb37a9a11f702abf3df287667ce33590f3
                    • Instruction Fuzzy Hash: 3BA151B2C102699ACF04EFA6DD95EEEB7B8BF14300F440569F416B7191EF745A09CB60

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 942 c12660-c1270e call c10000 945 c12715-c1273b call c13570 CreateFileW 942->945 948 c12742-c12752 945->948 949 c1273d 945->949 957 c12754 948->957 958 c12759-c12773 VirtualAlloc 948->958 950 c1288d-c12891 949->950 951 c128d3-c128d6 950->951 952 c12893-c12897 950->952 954 c128d9-c128e0 951->954 955 c128a3-c128a7 952->955 956 c12899-c1289c 952->956 959 c128e2-c128ed 954->959 960 c12935-c1294a 954->960 961 c128b7-c128bb 955->961 962 c128a9-c128b3 955->962 956->955 957->950 963 c12775 958->963 964 c1277a-c12791 ReadFile 958->964 967 c128f1-c128fd 959->967 968 c128ef 959->968 969 c1295a-c12962 960->969 970 c1294c-c12957 VirtualFree 960->970 971 c128cb 961->971 972 c128bd-c128c7 961->972 962->961 963->950 965 c12793 964->965 966 c12798-c127d8 VirtualAlloc 964->966 965->950 973 c127da 966->973 974 c127df-c127fa call c137c0 966->974 975 c12911-c1291d 967->975 976 c128ff-c1290f 967->976 968->960 970->969 971->951 972->971 973->950 982 c12805-c1280f 974->982 979 c1292a-c12930 975->979 980 c1291f-c12928 975->980 978 c12933 976->978 978->954 979->978 980->978 983 c12811-c12840 call c137c0 982->983 984 c12842-c12856 call c135d0 982->984 983->982 990 c12858 984->990 991 c1285a-c1285e 984->991 990->950 992 c12860-c12864 FindCloseChangeNotification 991->992 993 c1286a-c1286e 991->993 992->993 994 c12870-c1287b VirtualFree 993->994 995 c1287e-c12887 993->995 994->995 995->945 995->950
                    APIs
                    • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 00C12731
                    • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00C12957
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000430294.0000000000C10000.00000040.00001000.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_c10000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: CreateFileFreeVirtual
                    • String ID:
                    • API String ID: 204039940-0
                    • Opcode ID: 30e8af4b53c3aa052917812e21e5e8fbde56ed90f0e39d50c947676a587081b9
                    • Instruction ID: 764528229b5cd0b741d92950fef8515115c0618d12c3b7d09fce4d5e3f79b6e3
                    • Opcode Fuzzy Hash: 30e8af4b53c3aa052917812e21e5e8fbde56ed90f0e39d50c947676a587081b9
                    • Instruction Fuzzy Hash: CDA10775E00209EBEB14CFA4C894BEEBBB5FF49304F208159E511BB2C0D7759A91EB94

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1073 ae39e7-ae3a57 CreateWindowExW * 2 ShowWindow * 2
                    APIs
                    • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00AE3A15
                    • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00AE3A36
                    • ShowWindow.USER32(00000000,?,?), ref: 00AE3A4A
                    • ShowWindow.USER32(00000000,?,?), ref: 00AE3A53
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Window$CreateShow
                    • String ID: AutoIt v3$edit
                    • API String ID: 1584632944-3779509399
                    • Opcode ID: 070fb7670884fcf7f909935987cf392759704de4df585b88d7daa2be79ac23f4
                    • Instruction ID: 7ea3b6dd881b4355be674c34c0ee8e554147336f83d2310a5cbe1ffa0ec606e4
                    • Opcode Fuzzy Hash: 070fb7670884fcf7f909935987cf392759704de4df585b88d7daa2be79ac23f4
                    • Instruction Fuzzy Hash: BAF0DAB16413907EEA315B677C4AF772F7DE7C7F50B04412AB904E31B0CAA91851DAB0

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1074 c12410-c12557 call c10000 call c12300 CreateFileW 1081 c12559 1074->1081 1082 c1255e-c1256e 1074->1082 1083 c1260e-c12613 1081->1083 1085 c12570 1082->1085 1086 c12575-c1258f VirtualAlloc 1082->1086 1085->1083 1087 c12591 1086->1087 1088 c12593-c125aa ReadFile 1086->1088 1087->1083 1089 c125ac 1088->1089 1090 c125ae-c125e8 call c12340 call c11300 1088->1090 1089->1083 1095 c12604-c1260c ExitProcess 1090->1095 1096 c125ea-c125ff call c12390 1090->1096 1095->1083 1096->1095
                    APIs
                      • Part of subcall function 00C12300: Sleep.KERNELBASE(000001F4), ref: 00C12311
                    • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00C1254D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000430294.0000000000C10000.00000040.00001000.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_c10000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: CreateFileSleep
                    • String ID: HIY19XTJ569RIG
                    • API String ID: 2694422964-3972060199
                    • Opcode ID: 680dd79dd718dbbd9a61c592bc08e720d0ef228a093fdc911aa9b2c5af7113c4
                    • Instruction ID: eec176f666afbab3e3f415dd9d410c3af20572ba050ca45310a7b70a7ab44ad3
                    • Opcode Fuzzy Hash: 680dd79dd718dbbd9a61c592bc08e720d0ef228a093fdc911aa9b2c5af7113c4
                    • Instruction Fuzzy Hash: 3551A234D04248EBEF11DBE4C854BEEBB79AF19300F104199E209BB2C0DBB95B85DB65

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1098 ae410d-ae4123 1099 ae4129-ae413e call ae7b76 1098->1099 1100 ae4200-ae4204 1098->1100 1103 ae4144-ae4164 call ae7d2c 1099->1103 1104 b1d5dd-b1d5ec LoadStringW 1099->1104 1107 b1d5f7-b1d60f call ae7c8e call ae7143 1103->1107 1108 ae416a-ae416e 1103->1108 1104->1107 1118 ae417e-ae41fb call b03020 call ae463e call b02ffc Shell_NotifyIconW call ae5a64 1107->1118 1120 b1d615-b1d633 call ae7e0b call ae7143 call ae7e0b 1107->1120 1110 ae4174-ae4179 call ae7c8e 1108->1110 1111 ae4205-ae420e call ae81a7 1108->1111 1110->1118 1111->1118 1118->1100 1120->1118
                    APIs
                    • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00B1D5EC
                      • Part of subcall function 00AE7D2C: _memmove.LIBCMT ref: 00AE7D66
                    • _memset.LIBCMT ref: 00AE418D
                    • _wcscpy.LIBCMT ref: 00AE41E1
                    • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00AE41F1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                    • String ID: Line:
                    • API String ID: 3942752672-1585850449
                    • Opcode ID: 76d17735bac7e1430378d4dbc39c9f26707f8fef7b74483b116e0f901b88ec2d
                    • Instruction ID: 31dc9c11c0470bcf4bb9e9f45b157daf92640aee04aaa00483feed44b331dbeb
                    • Opcode Fuzzy Hash: 76d17735bac7e1430378d4dbc39c9f26707f8fef7b74483b116e0f901b88ec2d
                    • Instruction Fuzzy Hash: 1B31E0B1008385AAD721EB61DD46FEF77ECAF59300F14461EF185930A1EF74AA48CB92

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1133 b0564d-b05666 1134 b05683 1133->1134 1135 b05668-b0566d 1133->1135 1137 b05685-b0568b 1134->1137 1135->1134 1136 b0566f-b05671 1135->1136 1138 b05673-b05678 call b08d68 1136->1138 1139 b0568c-b05691 1136->1139 1151 b0567e call b08ff6 1138->1151 1141 b05693-b0569d 1139->1141 1142 b0569f-b056a3 1139->1142 1141->1142 1144 b056c3-b056d2 1141->1144 1145 b056b3-b056b5 1142->1145 1146 b056a5-b056b0 call b03020 1142->1146 1149 b056d4-b056d7 1144->1149 1150 b056d9 1144->1150 1145->1138 1148 b056b7-b056c1 1145->1148 1146->1145 1148->1138 1148->1144 1153 b056de-b056e3 1149->1153 1150->1153 1151->1134 1155 b056e9-b056f0 1153->1155 1156 b057cc-b057cf 1153->1156 1157 b05731-b05733 1155->1157 1158 b056f2-b056fa 1155->1158 1156->1137 1159 b05735-b05737 1157->1159 1160 b0579d-b0579e call b10df7 1157->1160 1158->1157 1161 b056fc 1158->1161 1162 b05739-b05741 1159->1162 1163 b0575b-b05766 1159->1163 1170 b057a3-b057a7 1160->1170 1165 b05702-b05704 1161->1165 1166 b057fa 1161->1166 1168 b05751-b05755 1162->1168 1169 b05743-b0574f 1162->1169 1171 b05768 1163->1171 1172 b0576a-b0576d 1163->1172 1173 b05706-b05708 1165->1173 1174 b0570b-b05710 1165->1174 1167 b057fe-b05807 1166->1167 1167->1137 1175 b05757-b05759 1168->1175 1169->1175 1170->1167 1176 b057a9-b057ae 1170->1176 1171->1172 1177 b057d4-b057d8 1172->1177 1178 b0576f-b0577b call b04916 call b110ab 1172->1178 1173->1174 1174->1177 1179 b05716-b0572f call b10f18 1174->1179 1175->1172 1176->1177 1180 b057b0-b057c1 1176->1180 1181 b057ea-b057f5 call b08d68 1177->1181 1182 b057da-b057e7 call b03020 1177->1182 1194 b05780-b05785 1178->1194 1190 b05792-b0579b 1179->1190 1186 b057c4-b057c6 1180->1186 1181->1151 1182->1181 1186->1155 1186->1156 1190->1186 1195 b0578b-b0578e 1194->1195 1196 b0580c-b05810 1194->1196 1195->1166 1197 b05790 1195->1197 1196->1167 1197->1190
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                    • String ID:
                    • API String ID: 1559183368-0
                    • Opcode ID: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                    • Instruction ID: 73eee4d5567ce86c4afb21f56c771010cc6aac9564621d55a4b7618a692be49f
                    • Opcode Fuzzy Hash: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                    • Instruction Fuzzy Hash: 06519070A00B05DFDB349FA988846AF7FE5EF40320F6487A9E82596AD0D7719E50AF50
                    APIs
                      • Part of subcall function 00AE4F3D: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00BA62F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00AE4F6F
                    • _free.LIBCMT ref: 00B1E68C
                    • _free.LIBCMT ref: 00B1E6D3
                      • Part of subcall function 00AE6BEC: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00AE6D0D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: _free$CurrentDirectoryLibraryLoad
                    • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                    • API String ID: 2861923089-1757145024
                    • Opcode ID: ddd791e123d51bfef39432ca9168fb3859246318555394d63ee565a4a2524823
                    • Instruction ID: 2c6eaff6341afb2c9f458208abba8f064a9fba5107d67199de9ca6fa7c155ca3
                    • Opcode Fuzzy Hash: ddd791e123d51bfef39432ca9168fb3859246318555394d63ee565a4a2524823
                    • Instruction Fuzzy Hash: 7C918B71910259AFCF04EFA5C8919EDB7F5FF18304F9444A9F825AB2A1EB30E944CB60
                    APIs
                    • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,00AE35A1,SwapMouseButtons,00000004,?), ref: 00AE35D4
                    • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,00AE35A1,SwapMouseButtons,00000004,?,?,?,?,00AE2754), ref: 00AE35F5
                    • RegCloseKey.KERNELBASE(00000000,?,?,00AE35A1,SwapMouseButtons,00000004,?,?,?,?,00AE2754), ref: 00AE3617
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: CloseOpenQueryValue
                    • String ID: Control Panel\Mouse
                    • API String ID: 3677997916-824357125
                    • Opcode ID: df49339bf0552b108dad3ca6d14160eb473777c58562198b236f4ff56d64b9d2
                    • Instruction ID: 7f180973ee4e6fd5c389944c6f3b33d4798c8b6d3430d9cfa6c3ed94fcf9d5e5
                    • Opcode Fuzzy Hash: df49339bf0552b108dad3ca6d14160eb473777c58562198b236f4ff56d64b9d2
                    • Instruction Fuzzy Hash: FB114872510248BFDF20CFA9EC489BFB7B8EF05740F018469E805D7210D6719E409760
                    APIs
                    • CreateProcessW.KERNELBASE(?,00000000), ref: 00C11B2D
                    • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00C11B51
                    • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00C11B73
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000430294.0000000000C10000.00000040.00001000.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_c10000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Process$ContextCreateMemoryReadThreadWow64
                    • String ID:
                    • API String ID: 2438371351-0
                    • Opcode ID: e8e7a77c1c38f92167ec50984bffac71589908538948dc0fdf133907e09ee162
                    • Instruction ID: 43cbf8ee743f9c3b02e4cbe9fb15f25c485be0faa0a6fdbda8b33f7491d82bfc
                    • Opcode Fuzzy Hash: e8e7a77c1c38f92167ec50984bffac71589908538948dc0fdf133907e09ee162
                    • Instruction Fuzzy Hash: 13622B30A14258DBEB24CFA4C850BDEB372EF59300F1491A9D60DEB390E7799E81DB59
                    APIs
                      • Part of subcall function 00AE5045: _fseek.LIBCMT ref: 00AE505D
                      • Part of subcall function 00B499BE: _wcscmp.LIBCMT ref: 00B49AAE
                      • Part of subcall function 00B499BE: _wcscmp.LIBCMT ref: 00B49AC1
                    • _free.LIBCMT ref: 00B4992C
                    • _free.LIBCMT ref: 00B49933
                    • _free.LIBCMT ref: 00B4999E
                      • Part of subcall function 00B02F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00B09C64), ref: 00B02FA9
                      • Part of subcall function 00B02F95: GetLastError.KERNEL32(00000000,?,00B09C64), ref: 00B02FBB
                    • _free.LIBCMT ref: 00B499A6
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                    • String ID:
                    • API String ID: 1552873950-0
                    • Opcode ID: d9ae0c5d453641694606f69828c3ed73b5fd5779769f00272cc49afe01aba135
                    • Instruction ID: b1a9a0573c6e6c92314845dc9f10e70aa8111011c662c37dcf4f2afb2713f64c
                    • Opcode Fuzzy Hash: d9ae0c5d453641694606f69828c3ed73b5fd5779769f00272cc49afe01aba135
                    • Instruction Fuzzy Hash: ED515BB1D04258AFDF249F65DC85A9EBBB9EF48314F1004EEB609A7281DB715E80CF58
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                    • String ID:
                    • API String ID: 2782032738-0
                    • Opcode ID: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                    • Instruction ID: 057c52fb1c7e432d11fee0286921f3eab756d6e834edeb4d478c8e1f16b2ab96
                    • Opcode Fuzzy Hash: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                    • Instruction Fuzzy Hash: B24195B17406059FDF288EA9C88096F7FE5EF84360B2485BDEA55C76D0D7709D418744
                    APIs
                    • _memset.LIBCMT ref: 00B1EE62
                    • GetOpenFileNameW.COMDLG32(?), ref: 00B1EEAC
                      • Part of subcall function 00AE48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00AE48A1,?,?,00AE37C0,?), ref: 00AE48CE
                      • Part of subcall function 00B009D5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00B009F4
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Name$Path$FileFullLongOpen_memset
                    • String ID: X
                    • API String ID: 3777226403-3081909835
                    • Opcode ID: 27f8d465b698cd1058369670b8b653d0b0d5cc72aa5d8b0b4dddc64fd67e9a27
                    • Instruction ID: 0900ca2248ba694d1bf0705a4ded92290b4462aae4c875232d9e7462328824bb
                    • Opcode Fuzzy Hash: 27f8d465b698cd1058369670b8b653d0b0d5cc72aa5d8b0b4dddc64fd67e9a27
                    • Instruction Fuzzy Hash: 3E21D571A142989BDF51DF98CC45BEEBBFC9F49700F00405AE408E7281DBB499898FA1
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: __fread_nolock_memmove
                    • String ID: EA06
                    • API String ID: 1988441806-3962188686
                    • Opcode ID: 06343a615181abf98cabf92d070345fb6c3de55771e28ca5d7e38b4d8ea06b8d
                    • Instruction ID: 602ecc4bb0bb5539b3e1016f4654084cd2ddd096f2785dafc2340cb694053b93
                    • Opcode Fuzzy Hash: 06343a615181abf98cabf92d070345fb6c3de55771e28ca5d7e38b4d8ea06b8d
                    • Instruction Fuzzy Hash: 7901F971804218AEDB28C6A8C856EEE7FFCDB01301F0041DAF592D22C1E575A7089BA0
                    APIs
                    • GetTempPathW.KERNEL32(00000104,?), ref: 00B49B82
                    • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00B49B99
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Temp$FileNamePath
                    • String ID: aut
                    • API String ID: 3285503233-3010740371
                    • Opcode ID: 11547f1e147753d0ad63e37aaa59bdd8d08b3c9bcd783d9da385151ecd834b91
                    • Instruction ID: fa4b090a0a23748c2ef20b4db966cc96a35ef53419150690f74dd2b7f6739b37
                    • Opcode Fuzzy Hash: 11547f1e147753d0ad63e37aaa59bdd8d08b3c9bcd783d9da385151ecd834b91
                    • Instruction Fuzzy Hash: E7D05E7A94030EABDB109B90EC0EFAA776CE704704F0042B1FE54921E1DEF455988FD1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: dffaa441c12ea4401850c627dca6e9d0fd98d2890a83c8c313816966db5ff3db
                    • Instruction ID: f0d7f7a0259d12360a79048df1a66280a05efc087abb178d55a6c8479126ec16
                    • Opcode Fuzzy Hash: dffaa441c12ea4401850c627dca6e9d0fd98d2890a83c8c313816966db5ff3db
                    • Instruction Fuzzy Hash: 51F16C706083419FC724DF28C584A6ABBE5FF88314F1489ADF8999B351D771E94ACF82
                    APIs
                      • Part of subcall function 00B003A2: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00B003D3
                      • Part of subcall function 00B003A2: MapVirtualKeyW.USER32(00000010,00000000), ref: 00B003DB
                      • Part of subcall function 00B003A2: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00B003E6
                      • Part of subcall function 00B003A2: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00B003F1
                      • Part of subcall function 00B003A2: MapVirtualKeyW.USER32(00000011,00000000), ref: 00B003F9
                      • Part of subcall function 00B003A2: MapVirtualKeyW.USER32(00000012,00000000), ref: 00B00401
                      • Part of subcall function 00AF6259: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00AEFA90), ref: 00AF62B4
                    • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00AEFB2D
                    • OleInitialize.OLE32(00000000), ref: 00AEFBAA
                    • CloseHandle.KERNEL32(00000000), ref: 00B249F2
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                    • String ID:
                    • API String ID: 1986988660-0
                    • Opcode ID: 4af8db771598cdc56d0352e7f117e8f46a10feab5dee61fcf061b363be371922
                    • Instruction ID: 2622542b2318b1ca1ec113c483d9028663aa88263f06bca4703d25b300262662
                    • Opcode Fuzzy Hash: 4af8db771598cdc56d0352e7f117e8f46a10feab5dee61fcf061b363be371922
                    • Instruction Fuzzy Hash: F881B9F19182808ECB84DF7AE9566297BE4FB5E30871885BAD429C73A2EF754805CF14
                    APIs
                    • _memset.LIBCMT ref: 00AE4401
                    • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00AE44A6
                    • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00AE44C3
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: IconNotifyShell_$_memset
                    • String ID:
                    • API String ID: 1505330794-0
                    • Opcode ID: d294c9fc318853a644162f26fb95a83ef57e702c37e9827e342578e1574dfde1
                    • Instruction ID: f00d505dd7d1d95b93f39c05f2b41e88216b8485db7fa4b8942f5dfe9ce3f740
                    • Opcode Fuzzy Hash: d294c9fc318853a644162f26fb95a83ef57e702c37e9827e342578e1574dfde1
                    • Instruction Fuzzy Hash: 963171B06057418FD721DF25D88579BBBF8FB49304F04092EF59A83291EBB5A944CB92
                    APIs
                    • __FF_MSGBANNER.LIBCMT ref: 00B05963
                      • Part of subcall function 00B0A3AB: __NMSG_WRITE.LIBCMT ref: 00B0A3D2
                      • Part of subcall function 00B0A3AB: __NMSG_WRITE.LIBCMT ref: 00B0A3DC
                    • __NMSG_WRITE.LIBCMT ref: 00B0596A
                      • Part of subcall function 00B0A408: GetModuleFileNameW.KERNEL32(00000000,00BA43BA,00000104,?,00000001,00000000), ref: 00B0A49A
                      • Part of subcall function 00B0A408: ___crtMessageBoxW.LIBCMT ref: 00B0A548
                      • Part of subcall function 00B032DF: ___crtCorExitProcess.LIBCMT ref: 00B032E5
                      • Part of subcall function 00B032DF: ExitProcess.KERNEL32 ref: 00B032EE
                      • Part of subcall function 00B08D68: __getptd_noexit.LIBCMT ref: 00B08D68
                    • RtlAllocateHeap.NTDLL(00C30000,00000000,00000001,00000000,?,?,?,00B01013,?), ref: 00B0598F
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                    • String ID:
                    • API String ID: 1372826849-0
                    • Opcode ID: 5c86b3daef0f98fcd50b2782eadf7ea490607570d7502fc431815289ae177105
                    • Instruction ID: f15a6ed3be977e3dfcfc1aa71916e63d1456896a6cddcf97c6fcfa5a1ee86e07
                    • Opcode Fuzzy Hash: 5c86b3daef0f98fcd50b2782eadf7ea490607570d7502fc431815289ae177105
                    • Instruction Fuzzy Hash: 8A01B535200B15EEE6352B64EC46B7F7EC8DF92B70F1002BAF541AB5D1DEB09D019A64
                    APIs
                    • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00B497D2,?,?,?,?,?,00000004), ref: 00B49B45
                    • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00B497D2,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00B49B5B
                    • CloseHandle.KERNEL32(00000000,?,00B497D2,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00B49B62
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: File$CloseCreateHandleTime
                    • String ID:
                    • API String ID: 3397143404-0
                    • Opcode ID: fcc10253b81fc6af7f5bcbce69c9fe42f92052986624d7445c1cb93fee337bd9
                    • Instruction ID: 75e87daaec57db002d64890e33ac96aef9939c36845a9e51273e119d574d3e0b
                    • Opcode Fuzzy Hash: fcc10253b81fc6af7f5bcbce69c9fe42f92052986624d7445c1cb93fee337bd9
                    • Instruction Fuzzy Hash: B0E08632181215B7D7211B54FC09FDA7B58EB067A1F104120FB547A0E08BF52A119798
                    APIs
                    • _free.LIBCMT ref: 00B48FA5
                      • Part of subcall function 00B02F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00B09C64), ref: 00B02FA9
                      • Part of subcall function 00B02F95: GetLastError.KERNEL32(00000000,?,00B09C64), ref: 00B02FBB
                    • _free.LIBCMT ref: 00B48FB6
                    • _free.LIBCMT ref: 00B48FC8
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 776569668-0
                    • Opcode ID: efa5cfa9b1b2f41bce9affd07bef402890ef9bb67adc050918c04926c1923072
                    • Instruction ID: fda0399ba627250473bd4eb6ce9f83f7fed11a028c85b11cedc8957baa952b4c
                    • Opcode Fuzzy Hash: efa5cfa9b1b2f41bce9affd07bef402890ef9bb67adc050918c04926c1923072
                    • Instruction Fuzzy Hash: B1E02BB170C7024BCA20A738AD05E871BFE9F48390B080C8DB409DB1C2DF20FD489034
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID:
                    • String ID: CALL
                    • API String ID: 0-4196123274
                    • Opcode ID: 1a550d3174a9fb1761cfe5150a73fe63ff1cae5eff577511fdf1eec2efb19260
                    • Instruction ID: 61b36e7055948c7cfdb6b81775b51d36e27bf9f06c7578f83ac31e32fe36b451
                    • Opcode Fuzzy Hash: 1a550d3174a9fb1761cfe5150a73fe63ff1cae5eff577511fdf1eec2efb19260
                    • Instruction Fuzzy Hash: 6A2237705182919FC724DF15C594B6ABBF1FF94300F1489ADE89A8B362DB31ED85CB82
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: _memmove
                    • String ID: EA06
                    • API String ID: 4104443479-3962188686
                    • Opcode ID: 1687ae910b1c0af289630d24733c5869353d13d10bd6142e830a7f1fef98c5ed
                    • Instruction ID: c37a40dcd93f50fac120847e05d0c5fc9ecb743979cf7f154791b8ad301dfa3e
                    • Opcode Fuzzy Hash: 1687ae910b1c0af289630d24733c5869353d13d10bd6142e830a7f1fef98c5ed
                    • Instruction Fuzzy Hash: 69416D32A041D45BCF255F6699517FE7FBEEF0D300F6844B5F882AB282C6219D8483E1
                    APIs
                    • IsThemeActive.UXTHEME ref: 00AE4992
                      • Part of subcall function 00B035AC: __lock.LIBCMT ref: 00B035B2
                      • Part of subcall function 00B035AC: DecodePointer.KERNEL32(00000001,?,00AE49A7,00B381BC), ref: 00B035BE
                      • Part of subcall function 00B035AC: EncodePointer.KERNEL32(?,?,00AE49A7,00B381BC), ref: 00B035C9
                      • Part of subcall function 00AE4A5B: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00AE4A73
                      • Part of subcall function 00AE4A5B: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00AE4A88
                      • Part of subcall function 00AE3B4C: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00AE3B7A
                      • Part of subcall function 00AE3B4C: IsDebuggerPresent.KERNEL32 ref: 00AE3B8C
                      • Part of subcall function 00AE3B4C: GetFullPathNameW.KERNEL32(00007FFF,?,?,00BA62F8,00BA62E0,?,?), ref: 00AE3BFD
                      • Part of subcall function 00AE3B4C: SetCurrentDirectoryW.KERNEL32(?), ref: 00AE3C81
                    • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00AE49D2
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                    • String ID:
                    • API String ID: 1438897964-0
                    • Opcode ID: da0c36b01251602c09c71499d6d1ea18ffaea3e5aa412e6f3222a867c3be5b15
                    • Instruction ID: 9b8c58bd33db170d64dedd1cccec2bacfaa1fc8419e22084c9078ce7ea5b1815
                    • Opcode Fuzzy Hash: da0c36b01251602c09c71499d6d1ea18ffaea3e5aa412e6f3222a867c3be5b15
                    • Instruction Fuzzy Hash: 18118CB19083519BC700EF2AED0691ABFE8EF99750F00452EF055972B1DFB09945CB92
                    APIs
                    • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000,?,00AE5981,?,?,?,?), ref: 00AE5E27
                    • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,00000000,?,00AE5981,?,?,?,?), ref: 00B1E19C
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: CreateFile
                    • String ID:
                    • API String ID: 823142352-0
                    • Opcode ID: 1bc6978e9dbdc7f02abf5a806b070db22816c0cbdf13ad30e5b063445d487266
                    • Instruction ID: c50c749adff7dcb7c2bbe9bdbd97d9c973f5b15d1719cdd9297c0e59a9558247
                    • Opcode Fuzzy Hash: 1bc6978e9dbdc7f02abf5a806b070db22816c0cbdf13ad30e5b063445d487266
                    • Instruction Fuzzy Hash: 95018070644648BEF3240E29EC8AF663ADCEB0176CF148318BAE56A1E0C6B45E458B50
                    APIs
                      • Part of subcall function 00B0594C: __FF_MSGBANNER.LIBCMT ref: 00B05963
                      • Part of subcall function 00B0594C: __NMSG_WRITE.LIBCMT ref: 00B0596A
                      • Part of subcall function 00B0594C: RtlAllocateHeap.NTDLL(00C30000,00000000,00000001,00000000,?,?,?,00B01013,?), ref: 00B0598F
                    • std::exception::exception.LIBCMT ref: 00B0102C
                    • __CxxThrowException@8.LIBCMT ref: 00B01041
                      • Part of subcall function 00B087DB: RaiseException.KERNEL32(?,?,?,00B9BAF8,00000000,?,?,?,?,00B01046,?,00B9BAF8,?,00000001), ref: 00B08830
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                    • String ID:
                    • API String ID: 3902256705-0
                    • Opcode ID: 3e9d195dd0f1c06fea083cd418d4688b38dc6351416f6f6176e2f076ce7de339
                    • Instruction ID: d51b021e6437e6b416d6ddb8c76de67476d6be99249ab5e7b4cf40b8cf582795
                    • Opcode Fuzzy Hash: 3e9d195dd0f1c06fea083cd418d4688b38dc6351416f6f6176e2f076ce7de339
                    • Instruction Fuzzy Hash: 3EF08135500219A6CB25AB58ED069DF7FECDF00360F1044E5F898966E1EFB19A809691
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: __lock_file_memset
                    • String ID:
                    • API String ID: 26237723-0
                    • Opcode ID: 59aca6475a3d52599fe88dabf66e2a3342f56b387437eb3b69129e022383f927
                    • Instruction ID: fbb8bdbf8ceff23ce54c4f0da48b4784586d6401043e48bc972a6364b3ca3c37
                    • Opcode Fuzzy Hash: 59aca6475a3d52599fe88dabf66e2a3342f56b387437eb3b69129e022383f927
                    • Instruction Fuzzy Hash: 78017171800B09EBCF22AF698C0599F7FE5AF40360F14C2A5B8145A1E1EB31CA21DF91
                    APIs
                      • Part of subcall function 00B08D68: __getptd_noexit.LIBCMT ref: 00B08D68
                    • __lock_file.LIBCMT ref: 00B0561B
                      • Part of subcall function 00B06E4E: __lock.LIBCMT ref: 00B06E71
                    • __fclose_nolock.LIBCMT ref: 00B05626
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                    • String ID:
                    • API String ID: 2800547568-0
                    • Opcode ID: f3dae88c46c6c9847b8ccfe0fe856e16854a96839cfb3f86bd2e0e47dcb7925d
                    • Instruction ID: dcfa9fe024553dc70d0dcefb75957943bcd486d5e07cb922e0b1a38919cb04ca
                    • Opcode Fuzzy Hash: f3dae88c46c6c9847b8ccfe0fe856e16854a96839cfb3f86bd2e0e47dcb7925d
                    • Instruction Fuzzy Hash: F0F09A71801A059ADB30AF798802B6F7FE1AF40334F6582C9A465AB5C2CF7D8A019F65
                    APIs
                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001,00000000,00000000,?,?,?,00AE558F,?,?,?,?,?), ref: 00AE81DA
                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001,00000000,?,?,?,00AE558F,?,?,?,?,?), ref: 00AE820D
                      • Part of subcall function 00AE78AD: _memmove.LIBCMT ref: 00AE78E9
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ByteCharMultiWide$_memmove
                    • String ID:
                    • API String ID: 3033907384-0
                    • Opcode ID: 957e78f2b5d8d64968dd41946dd66d6402168c6e8e4046da6076f989d7520456
                    • Instruction ID: 568cfc495b4a344f44e3af489cae945739022861ad02e2d2cd8ed0139e1e58ff
                    • Opcode Fuzzy Hash: 957e78f2b5d8d64968dd41946dd66d6402168c6e8e4046da6076f989d7520456
                    • Instruction Fuzzy Hash: D4018B31201544BEEB246B26ED4AF7B3FACEB8A760F10802AFA05DE1D0DE7098009661
                    APIs
                    • CreateProcessW.KERNELBASE(?,00000000), ref: 00C11B2D
                    • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00C11B51
                    • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00C11B73
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000430294.0000000000C10000.00000040.00001000.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_c10000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Process$ContextCreateMemoryReadThreadWow64
                    • String ID:
                    • API String ID: 2438371351-0
                    • Opcode ID: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                    • Instruction ID: ed679a4f9b885f79f688eee8db5f02b30ab464d4a9336c39174734e82d839253
                    • Opcode Fuzzy Hash: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                    • Instruction Fuzzy Hash: 4712DE24E24658C6EB24DF64D8507DEB232EF69300F1090E9910DEB7A5E77A4F81CB5A
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9d2e86d20c6ba0ceeef0aeb325b6b005a35d2b6c44c27496076e28b14484f0e8
                    • Instruction ID: c483947139111f626f210485b6e0f9211935dcaf34eb5cae71a135399027a032
                    • Opcode Fuzzy Hash: 9d2e86d20c6ba0ceeef0aeb325b6b005a35d2b6c44c27496076e28b14484f0e8
                    • Instruction Fuzzy Hash: 2E518335600614AFCF14EB68DA91FBE77E5AF49314F1481A8F90AAB392DB30ED00CB55
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: _memmove
                    • String ID:
                    • API String ID: 4104443479-0
                    • Opcode ID: 66df3c07b3103f0ef04c0b15b29fab749f31eee2ad856efa914133f647b06a1e
                    • Instruction ID: fdaa6efd01d18a9304cda1439d6e70e9cf07b0747d7e6cae80599c029f6e6998
                    • Opcode Fuzzy Hash: 66df3c07b3103f0ef04c0b15b29fab749f31eee2ad856efa914133f647b06a1e
                    • Instruction Fuzzy Hash: 47318579608A42DFD724DF1AC590A25F7F0FF08310B14C569E999CB7A5E730D881CB54
                    APIs
                    • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000000,?,?,00000000), ref: 00AE5CF6
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: FilePointer
                    • String ID:
                    • API String ID: 973152223-0
                    • Opcode ID: 1263c85e79c9483b2a9f5f46fb93f29fb63a8676dae0506d796dc79645bab6b0
                    • Instruction ID: 0ec67e3cc9209c739ad9376c5f6e78263ff49140456cca71ec6094e4fbb9a4ba
                    • Opcode Fuzzy Hash: 1263c85e79c9483b2a9f5f46fb93f29fb63a8676dae0506d796dc79645bab6b0
                    • Instruction Fuzzy Hash: B4316D31E00B49AFCB18CF2ED9946ADB7B5FF88314F248629D81993710D771B960DB90
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ClearVariant
                    • String ID:
                    • API String ID: 1473721057-0
                    • Opcode ID: c5a27dbd400c46533cdb48808e28d05890d724af826b67fa65ec5c9cc704677e
                    • Instruction ID: 24b9abdea134650e6da9e94cb8ddc9c002c47c5b4ea6d45e23d2c34a6c8817f2
                    • Opcode Fuzzy Hash: c5a27dbd400c46533cdb48808e28d05890d724af826b67fa65ec5c9cc704677e
                    • Instruction Fuzzy Hash: 15410574508391CFDB24DF15C484B1ABBE0BF45318F1988ACE8998B762C736EC85CB52
                    APIs
                      • Part of subcall function 00AE4D13: FreeLibrary.KERNEL32(00000000,?), ref: 00AE4D4D
                      • Part of subcall function 00B0548B: __wfsopen.LIBCMT ref: 00B05496
                    • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00BA62F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00AE4F6F
                      • Part of subcall function 00AE4CC8: FreeLibrary.KERNEL32(00000000), ref: 00AE4D02
                      • Part of subcall function 00AE4DD0: _memmove.LIBCMT ref: 00AE4E1A
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Library$Free$Load__wfsopen_memmove
                    • String ID:
                    • API String ID: 1396898556-0
                    • Opcode ID: a6fed814a712cf3de124e93b25ed8eb1a9d4482c65086199e2bab87f982c7d08
                    • Instruction ID: f4a78da764efaeb8856edb2e3eb54d6d17660682f12f7e053aaa71d60e927536
                    • Opcode Fuzzy Hash: a6fed814a712cf3de124e93b25ed8eb1a9d4482c65086199e2bab87f982c7d08
                    • Instruction Fuzzy Hash: B311E731A00709AACB10AF71DD52BAE77E8DF48B00F208429F541A72C1DA759A05AB50
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ClearVariant
                    • String ID:
                    • API String ID: 1473721057-0
                    • Opcode ID: 392d860d00d9b951882c7cf2433f538c5357120e902b3f7b65db7ccebbce5ed0
                    • Instruction ID: c96e6688f938bf250f717e72eeca535da4df2a1d31461d47c30c3cbd0761ed81
                    • Opcode Fuzzy Hash: 392d860d00d9b951882c7cf2433f538c5357120e902b3f7b65db7ccebbce5ed0
                    • Instruction Fuzzy Hash: 8E2122B4508391DFDB28DF65C484B1BBBE0BF88304F0589A8E89A47762D731F845CB52
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: _memmove
                    • String ID:
                    • API String ID: 4104443479-0
                    • Opcode ID: e0b0f1feff7007f9a685850875a5a6e1ea6a23f504afe070e1a0459631d1335c
                    • Instruction ID: 5279797130d5c4482aef57205e4dde6358c3bd9ee77f4619460487faa9fdc671
                    • Opcode Fuzzy Hash: e0b0f1feff7007f9a685850875a5a6e1ea6a23f504afe070e1a0459631d1335c
                    • Instruction Fuzzy Hash: 0611A5722092956BC714AB6DE892E7EB79DEF45320714422AFD59C72D1DF319C108790
                    APIs
                    • ReadFile.KERNELBASE(?,?,00010000,?,00000000,00000000,?,00010000,?,00AE5807,00000000,00010000,00000000,00000000,00000000,00000000), ref: 00AE5D76
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: FileRead
                    • String ID:
                    • API String ID: 2738559852-0
                    • Opcode ID: 36d1e56f376e79eedabd549641c2eb8997198b003f95cc85d040dbd04b1bda97
                    • Instruction ID: 08126c069e540ca0a4b96ebf3dabb13caab54035f096adb800fb9864f9cf5204
                    • Opcode Fuzzy Hash: 36d1e56f376e79eedabd549641c2eb8997198b003f95cc85d040dbd04b1bda97
                    • Instruction Fuzzy Hash: 89113A31600B419FD330CF26E884B62B7F9EF45764F10C92EE4AA86A50D7B0E945CB60
                    APIs
                    • __lock_file.LIBCMT ref: 00B04AD6
                      • Part of subcall function 00B08D68: __getptd_noexit.LIBCMT ref: 00B08D68
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: __getptd_noexit__lock_file
                    • String ID:
                    • API String ID: 2597487223-0
                    • Opcode ID: 82b1d9e7e24c3793ff77397505ec8982168e9efa72c6811d53ba04adf5d5440b
                    • Instruction ID: 946cbbb8ddc9db0d1e48c7e92a275352a854e9ed8ea63a5fbd709a023dfc4ab2
                    • Opcode Fuzzy Hash: 82b1d9e7e24c3793ff77397505ec8982168e9efa72c6811d53ba04adf5d5440b
                    • Instruction Fuzzy Hash: E4F0AFB1A40209ABDF61BF74CC0679F3EE1AF00365F1486A4B524AA1E1CB788A60DF51
                    APIs
                    • FreeLibrary.KERNEL32(?,?,00BA62F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00AE4FDE
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: FreeLibrary
                    • String ID:
                    • API String ID: 3664257935-0
                    • Opcode ID: 809218ad23ed75bf9d30338612bd28d901d65f83562150fab30da25aa507f792
                    • Instruction ID: e2fc37621e51793400949837d80ed4ae390a149876ac808e49e9404bc85e4117
                    • Opcode Fuzzy Hash: 809218ad23ed75bf9d30338612bd28d901d65f83562150fab30da25aa507f792
                    • Instruction Fuzzy Hash: 5FF03071109B52CFC7349F65E494912BBF9BF18B253208A7EE1D682A10C7719840DF50
                    APIs
                    • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00B009F4
                      • Part of subcall function 00AE7D2C: _memmove.LIBCMT ref: 00AE7D66
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: LongNamePath_memmove
                    • String ID:
                    • API String ID: 2514874351-0
                    • Opcode ID: f7bc74d09aa4e205da2fd2ad4b22d59d7591cbac0a226fe651284fb95cac289a
                    • Instruction ID: 320490204bc047009e6547c9fe1f9538ae0ec258e3e4c94a412027262746949e
                    • Opcode Fuzzy Hash: f7bc74d09aa4e205da2fd2ad4b22d59d7591cbac0a226fe651284fb95cac289a
                    • Instruction Fuzzy Hash: B0E0867690422857C720D65C9C05FFA77EDDF88690F0401B5FD0CD7248D9A49C818A90
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: __fread_nolock
                    • String ID:
                    • API String ID: 2638373210-0
                    • Opcode ID: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                    • Instruction ID: c8c33fdef82b5da319073cdaf454adc145f37396cc8b3c95d92ef051d350ebfc
                    • Opcode Fuzzy Hash: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                    • Instruction Fuzzy Hash: 6FE092B0104B005FD7348A24D8107E377E0EB06315F00085DF69A93341EB6278419B59
                    APIs
                    • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001,?,?,?,00B1E16B,?,?,00000000), ref: 00AE5DBF
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: FilePointer
                    • String ID:
                    • API String ID: 973152223-0
                    • Opcode ID: 454f2f9317dfc8c17f19390df74458fddb91ad548376ff1c547c326f7b889ff7
                    • Instruction ID: cf7013f60bf05623e84819d8179b5942a3d67e8e114dec55d6660bbe705eb09e
                    • Opcode Fuzzy Hash: 454f2f9317dfc8c17f19390df74458fddb91ad548376ff1c547c326f7b889ff7
                    • Instruction Fuzzy Hash: E1D0C77464420CBFE710DB80DC46FA9777CD705710F100194FD0467290D6F27D508795
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: __wfsopen
                    • String ID:
                    • API String ID: 197181222-0
                    • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                    • Instruction ID: 4227a6a2070449e2852e7afb99fa5cc7c4cabc0b4e2ca818ff8b1a51092e6f48
                    • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                    • Instruction Fuzzy Hash: 72B09B7544010C77DE111D42EC02A593F595740674F404050FB0C18561957395605585
                    APIs
                    • GetLastError.KERNEL32(00000002,00000000), ref: 00B4D46A
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ErrorLast
                    • String ID:
                    • API String ID: 1452528299-0
                    • Opcode ID: eefb7da937f9f801c95c282f4863ad2ee50f91c783e34bcd1ad49a9d70748d64
                    • Instruction ID: 1eab777101bd45e6c868df2901f0f788a2ef893009d2aa99a83cc02aec55618f
                    • Opcode Fuzzy Hash: eefb7da937f9f801c95c282f4863ad2ee50f91c783e34bcd1ad49a9d70748d64
                    • Instruction Fuzzy Hash: 72715E306043428FC714EF29D591A6EB7E0EF88354F0449ADF4968B3A2DB70EA45DB52
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                    • Instruction ID: 4cf513f2966df6617bfcd4d2536444bcbc925934f749392e46791c5037d7a228
                    • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                    • Instruction Fuzzy Hash: EB31A271A10106DBC718EF58D480A69FBE6FF59300F648AE5E409DB692DB31EDC1DB80
                    APIs
                    • Sleep.KERNELBASE(000001F4), ref: 00C12311
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000430294.0000000000C10000.00000040.00001000.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_c10000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Sleep
                    • String ID:
                    • API String ID: 3472027048-0
                    • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                    • Instruction ID: 3123577294b0932fd087147d238e8fa7f8310f485c4ff3f9fee5b00a498f2764
                    • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                    • Instruction Fuzzy Hash: 76E0E67494010DDFDB00EFF4D5496DE7FB4EF04301F500561FD01D2280D6309D609A62
                    APIs
                      • Part of subcall function 00AE2612: GetWindowLongW.USER32(?,000000EB), ref: 00AE2623
                    • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00B6CE50
                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00B6CE91
                    • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00B6CED6
                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00B6CF00
                    • SendMessageW.USER32 ref: 00B6CF29
                    • _wcsncpy.LIBCMT ref: 00B6CFA1
                    • GetKeyState.USER32(00000011), ref: 00B6CFC2
                    • GetKeyState.USER32(00000009), ref: 00B6CFCF
                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00B6CFE5
                    • GetKeyState.USER32(00000010), ref: 00B6CFEF
                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00B6D018
                    • SendMessageW.USER32 ref: 00B6D03F
                    • SendMessageW.USER32(?,00001030,?,00B6B602), ref: 00B6D145
                    • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00B6D15B
                    • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00B6D16E
                    • SetCapture.USER32(?), ref: 00B6D177
                    • ClientToScreen.USER32(?,?), ref: 00B6D1DC
                    • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00B6D1E9
                    • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00B6D203
                    • ReleaseCapture.USER32 ref: 00B6D20E
                    • GetCursorPos.USER32(?), ref: 00B6D248
                    • ScreenToClient.USER32(?,?), ref: 00B6D255
                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 00B6D2B1
                    • SendMessageW.USER32 ref: 00B6D2DF
                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00B6D31C
                    • SendMessageW.USER32 ref: 00B6D34B
                    • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00B6D36C
                    • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00B6D37B
                    • GetCursorPos.USER32(?), ref: 00B6D39B
                    • ScreenToClient.USER32(?,?), ref: 00B6D3A8
                    • GetParent.USER32(?), ref: 00B6D3C8
                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 00B6D431
                    • SendMessageW.USER32 ref: 00B6D462
                    • ClientToScreen.USER32(?,?), ref: 00B6D4C0
                    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00B6D4F0
                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00B6D51A
                    • SendMessageW.USER32 ref: 00B6D53D
                    • ClientToScreen.USER32(?,?), ref: 00B6D58F
                    • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00B6D5C3
                      • Part of subcall function 00AE25DB: GetWindowLongW.USER32(?,000000EB), ref: 00AE25EC
                    • GetWindowLongW.USER32(?,000000F0), ref: 00B6D65F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                    • String ID: @GUI_DRAGID$F
                    • API String ID: 3977979337-4164748364
                    • Opcode ID: f90dce9ed6bc4a59015719d6ddfb950ba4c50e39b123ffb41f6658dee17f71c0
                    • Instruction ID: 65cac0c14c62787391df788a195744a092995d3958f239bdba3aade39e5d4809
                    • Opcode Fuzzy Hash: f90dce9ed6bc4a59015719d6ddfb950ba4c50e39b123ffb41f6658dee17f71c0
                    • Instruction Fuzzy Hash: 96429E71604241AFD721CF28C884FBABFF5FF49314F144599F6A5872A0CB7AA854CB92
                    APIs
                    • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 00B6873F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID: %d/%02d/%02d
                    • API String ID: 3850602802-328681919
                    • Opcode ID: 86e24a525e55c61871ef9da6037fb6bba9684af01586a1e26c32ff2232e0eac6
                    • Instruction ID: 0e257614d2dce70860726b26937c08bd4f850c6768891e7469ef8cce725e00ba
                    • Opcode Fuzzy Hash: 86e24a525e55c61871ef9da6037fb6bba9684af01586a1e26c32ff2232e0eac6
                    • Instruction Fuzzy Hash: 8912A371500245ABEB259F24DC89FBA7BF8EF45710F2442A9F516EB2E1DF788941CB10
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: _memmove$_memset
                    • String ID: DEFINE$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                    • API String ID: 1357608183-1798697756
                    • Opcode ID: 12a06636054fb3e1595841aba06b638b809985cb0325eee89822a5703444d4e6
                    • Instruction ID: b30f73090db143864d6ee2929e4a0b3e8edc62ebc43d98b9174319b2bb2015b1
                    • Opcode Fuzzy Hash: 12a06636054fb3e1595841aba06b638b809985cb0325eee89822a5703444d4e6
                    • Instruction Fuzzy Hash: 90938075A04219DBDB24CF98C881BBDB7F1FF48710F3581AAE955AB290E7749E81CB40
                    APIs
                    • GetForegroundWindow.USER32(00000000,?), ref: 00AE4A3D
                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00B1DA8E
                    • IsIconic.USER32(?), ref: 00B1DA97
                    • ShowWindow.USER32(?,00000009), ref: 00B1DAA4
                    • SetForegroundWindow.USER32(?), ref: 00B1DAAE
                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00B1DAC4
                    • GetCurrentThreadId.KERNEL32 ref: 00B1DACB
                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 00B1DAD7
                    • AttachThreadInput.USER32(?,00000000,00000001), ref: 00B1DAE8
                    • AttachThreadInput.USER32(?,00000000,00000001), ref: 00B1DAF0
                    • AttachThreadInput.USER32(00000000,?,00000001), ref: 00B1DAF8
                    • SetForegroundWindow.USER32(?), ref: 00B1DAFB
                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00B1DB10
                    • keybd_event.USER32(00000012,00000000), ref: 00B1DB1B
                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00B1DB25
                    • keybd_event.USER32(00000012,00000000), ref: 00B1DB2A
                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00B1DB33
                    • keybd_event.USER32(00000012,00000000), ref: 00B1DB38
                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00B1DB42
                    • keybd_event.USER32(00000012,00000000), ref: 00B1DB47
                    • SetForegroundWindow.USER32(?), ref: 00B1DB4A
                    • AttachThreadInput.USER32(?,?,00000000), ref: 00B1DB71
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                    • String ID: Shell_TrayWnd
                    • API String ID: 4125248594-2988720461
                    • Opcode ID: 5170c2ad6c57b49d2be9e78baf10946d87bb92fb4e23be8c0624ef5dd727efd7
                    • Instruction ID: ff32f942eb13787e8233a80b8d45891b77ca7824a4536b2d26283097e7bad926
                    • Opcode Fuzzy Hash: 5170c2ad6c57b49d2be9e78baf10946d87bb92fb4e23be8c0624ef5dd727efd7
                    • Instruction Fuzzy Hash: 27318571A44318BBEB206FA1AC49FBF3EACEB44B50F114075FA05E71D0CAB45D40EAA5
                    APIs
                      • Part of subcall function 00B38CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00B38D0D
                      • Part of subcall function 00B38CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00B38D3A
                      • Part of subcall function 00B38CC3: GetLastError.KERNEL32 ref: 00B38D47
                    • _memset.LIBCMT ref: 00B3889B
                    • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00B388ED
                    • CloseHandle.KERNEL32(?), ref: 00B388FE
                    • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00B38915
                    • GetProcessWindowStation.USER32 ref: 00B3892E
                    • SetProcessWindowStation.USER32(00000000), ref: 00B38938
                    • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00B38952
                      • Part of subcall function 00B38713: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00B38851), ref: 00B38728
                      • Part of subcall function 00B38713: CloseHandle.KERNEL32(?,?,00B38851), ref: 00B3873A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                    • String ID: $default$winsta0
                    • API String ID: 2063423040-1027155976
                    • Opcode ID: 095ea7e0d0d9bed84fe8ba586eba65cdf02152756d8eeeccf4548c8bc775408b
                    • Instruction ID: 13072239118e9e7f40ab46139530411afb88974499c6e7c5a234319a87411c61
                    • Opcode Fuzzy Hash: 095ea7e0d0d9bed84fe8ba586eba65cdf02152756d8eeeccf4548c8bc775408b
                    • Instruction Fuzzy Hash: BB812971900309AFDF11DFA4EC45AEE7BB8EF04304F2841AAF910A62A1DF759E15DB61
                    APIs
                    • OpenClipboard.USER32(00B6F910), ref: 00B54284
                    • IsClipboardFormatAvailable.USER32(0000000D), ref: 00B54292
                    • GetClipboardData.USER32(0000000D), ref: 00B5429A
                    • CloseClipboard.USER32 ref: 00B542A6
                    • GlobalLock.KERNEL32(00000000), ref: 00B542C2
                    • CloseClipboard.USER32 ref: 00B542CC
                    • GlobalUnlock.KERNEL32(00000000,00000000), ref: 00B542E1
                    • IsClipboardFormatAvailable.USER32(00000001), ref: 00B542EE
                    • GetClipboardData.USER32(00000001), ref: 00B542F6
                    • GlobalLock.KERNEL32(00000000), ref: 00B54303
                    • GlobalUnlock.KERNEL32(00000000,00000000,?), ref: 00B54337
                    • CloseClipboard.USER32 ref: 00B54447
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                    • String ID:
                    • API String ID: 3222323430-0
                    • Opcode ID: f898e9366878403de37825acb01d62df2fc7d8a50d5d41cc2854f5d85708eb03
                    • Instruction ID: 4eb40aedcb5f46c42897ec9f7f58ac33aa571aeaa9046412a2ee294fb4a95d1f
                    • Opcode Fuzzy Hash: f898e9366878403de37825acb01d62df2fc7d8a50d5d41cc2854f5d85708eb03
                    • Instruction Fuzzy Hash: 54518B31204302ABD300AB61ED96F7F77A8AF84B05F1045A9F956D32E1DFB499488A62
                    APIs
                    • FindFirstFileW.KERNEL32(?,?), ref: 00B4C9F8
                    • FindClose.KERNEL32(00000000), ref: 00B4CA4C
                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00B4CA71
                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00B4CA88
                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00B4CAAF
                    • __swprintf.LIBCMT ref: 00B4CAFB
                    • __swprintf.LIBCMT ref: 00B4CB3E
                      • Part of subcall function 00AE7F41: _memmove.LIBCMT ref: 00AE7F82
                    • __swprintf.LIBCMT ref: 00B4CB92
                      • Part of subcall function 00B038D8: __woutput_l.LIBCMT ref: 00B03931
                    • __swprintf.LIBCMT ref: 00B4CBE0
                      • Part of subcall function 00B038D8: __flsbuf.LIBCMT ref: 00B03953
                      • Part of subcall function 00B038D8: __flsbuf.LIBCMT ref: 00B0396B
                    • __swprintf.LIBCMT ref: 00B4CC2F
                    • __swprintf.LIBCMT ref: 00B4CC7E
                    • __swprintf.LIBCMT ref: 00B4CCCD
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                    • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                    • API String ID: 3953360268-2428617273
                    • Opcode ID: 9741411f5301c26759654b053e555f8ad318b8fd8322a8134a246c35ba02fa4c
                    • Instruction ID: 78910b52f230c9537afdbd0c2625c825374ea909d374181bbab965a3a9b50e0b
                    • Opcode Fuzzy Hash: 9741411f5301c26759654b053e555f8ad318b8fd8322a8134a246c35ba02fa4c
                    • Instruction Fuzzy Hash: 0EA14CB2508345ABC700EB65C986DAFB7ECFF94704F40496DF586C7191EA74DA08CB62
                    APIs
                    • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00B4F221
                    • _wcscmp.LIBCMT ref: 00B4F236
                    • _wcscmp.LIBCMT ref: 00B4F24D
                    • GetFileAttributesW.KERNEL32(?), ref: 00B4F25F
                    • SetFileAttributesW.KERNEL32(?,?), ref: 00B4F279
                    • FindNextFileW.KERNEL32(00000000,?), ref: 00B4F291
                    • FindClose.KERNEL32(00000000), ref: 00B4F29C
                    • FindFirstFileW.KERNEL32(*.*,?), ref: 00B4F2B8
                    • _wcscmp.LIBCMT ref: 00B4F2DF
                    • _wcscmp.LIBCMT ref: 00B4F2F6
                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00B4F308
                    • SetCurrentDirectoryW.KERNEL32(00B9A5A0), ref: 00B4F326
                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00B4F330
                    • FindClose.KERNEL32(00000000), ref: 00B4F33D
                    • FindClose.KERNEL32(00000000), ref: 00B4F34F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                    • String ID: *.*
                    • API String ID: 1803514871-438819550
                    • Opcode ID: 304922502741d2ae5afb325700ef7a18d4165bbc340aa0600bcc9c2bd780b665
                    • Instruction ID: 30c41afcefcd2f3c8537e6fbd5529891706f8ce6539c0399842c92e57e236d01
                    • Opcode Fuzzy Hash: 304922502741d2ae5afb325700ef7a18d4165bbc340aa0600bcc9c2bd780b665
                    • Instruction Fuzzy Hash: 8B31AE7660121A6ADB10DFA4EC98AFE77ECEF08360F1401B6F814D30A0EB74DB459A64
                    APIs
                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B60BDE
                    • RegCreateKeyExW.ADVAPI32(?,?,00000000,00B6F910,00000000,?,00000000,?,?), ref: 00B60C4C
                    • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00B60C94
                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00B60D1D
                    • RegCloseKey.ADVAPI32(?), ref: 00B6103D
                    • RegCloseKey.ADVAPI32(00000000), ref: 00B6104A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Close$ConnectCreateRegistryValue
                    • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                    • API String ID: 536824911-966354055
                    • Opcode ID: 1f4a2a8e6bdbf53fe162be1494d86b2505f96cfe4eef5433260c369c625de8d2
                    • Instruction ID: fe340a4c3aa5d18d012c6033b2b4562b1ee7bd422a8f546f61f41ed3a8c0b548
                    • Opcode Fuzzy Hash: 1f4a2a8e6bdbf53fe162be1494d86b2505f96cfe4eef5433260c369c625de8d2
                    • Instruction Fuzzy Hash: 92025C756006519FCB14EF19C995E2AB7E5FF88714F04889DF88A9B3A2CB34ED41CB81
                    APIs
                    • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00B4F37E
                    • _wcscmp.LIBCMT ref: 00B4F393
                    • _wcscmp.LIBCMT ref: 00B4F3AA
                      • Part of subcall function 00B445C1: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00B445DC
                    • FindNextFileW.KERNEL32(00000000,?), ref: 00B4F3D9
                    • FindClose.KERNEL32(00000000), ref: 00B4F3E4
                    • FindFirstFileW.KERNEL32(*.*,?), ref: 00B4F400
                    • _wcscmp.LIBCMT ref: 00B4F427
                    • _wcscmp.LIBCMT ref: 00B4F43E
                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00B4F450
                    • SetCurrentDirectoryW.KERNEL32(00B9A5A0), ref: 00B4F46E
                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00B4F478
                    • FindClose.KERNEL32(00000000), ref: 00B4F485
                    • FindClose.KERNEL32(00000000), ref: 00B4F497
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                    • String ID: *.*
                    • API String ID: 1824444939-438819550
                    • Opcode ID: 2e918d395205c9884b0016fb77a050917a68dedcb236074f4e10a4e331923988
                    • Instruction ID: d625a27210f19aa149cba2fde3ca8f08d449c8d6eb5072a8b081ee3b479c6ef8
                    • Opcode Fuzzy Hash: 2e918d395205c9884b0016fb77a050917a68dedcb236074f4e10a4e331923988
                    • Instruction Fuzzy Hash: FA319E7660121A6ACF10AFA4EC98AFE77ECDF49360F1401F6E854A31A0DB74DF44DA64
                    APIs
                      • Part of subcall function 00B3874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00B38766
                      • Part of subcall function 00B3874A: GetLastError.KERNEL32(?,00B3822A,?,?,?), ref: 00B38770
                      • Part of subcall function 00B3874A: GetProcessHeap.KERNEL32(00000008,?,?,00B3822A,?,?,?), ref: 00B3877F
                      • Part of subcall function 00B3874A: HeapAlloc.KERNEL32(00000000,?,00B3822A,?,?,?), ref: 00B38786
                      • Part of subcall function 00B3874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00B3879D
                      • Part of subcall function 00B387E7: GetProcessHeap.KERNEL32(00000008,00B38240,00000000,00000000,?,00B38240,?), ref: 00B387F3
                      • Part of subcall function 00B387E7: HeapAlloc.KERNEL32(00000000,?,00B38240,?), ref: 00B387FA
                      • Part of subcall function 00B387E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00B38240,?), ref: 00B3880B
                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00B3825B
                    • _memset.LIBCMT ref: 00B38270
                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00B3828F
                    • GetLengthSid.ADVAPI32(?), ref: 00B382A0
                    • GetAce.ADVAPI32(?,00000000,?), ref: 00B382DD
                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00B382F9
                    • GetLengthSid.ADVAPI32(?), ref: 00B38316
                    • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00B38325
                    • HeapAlloc.KERNEL32(00000000), ref: 00B3832C
                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00B3834D
                    • CopySid.ADVAPI32(00000000), ref: 00B38354
                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00B38385
                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00B383AB
                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00B383BF
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                    • String ID:
                    • API String ID: 3996160137-0
                    • Opcode ID: a72e9ef52b2e8cf014b41e543ba2992c544599d1672a5365134801e1a30423fc
                    • Instruction ID: e409a53058b39dc83f745b6b45379fdc6c407f6401ab81ecde8a017d8f3b50d7
                    • Opcode Fuzzy Hash: a72e9ef52b2e8cf014b41e543ba2992c544599d1672a5365134801e1a30423fc
                    • Instruction Fuzzy Hash: 9C61677190020AEFCF009FA4DC85AEEBBB9FF04700F2481A9F815A7291DF759A05CB61
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID:
                    • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
                    • API String ID: 0-4052911093
                    • Opcode ID: b9df19ff244a47d86ce8a1f35f37d48de0e0a94bf7af0538aa7deea186774f10
                    • Instruction ID: ce58ecf6435fd65798b4fbdf4c87ca66859ae5b7ac1160664f0070a2bec5bd3e
                    • Opcode Fuzzy Hash: b9df19ff244a47d86ce8a1f35f37d48de0e0a94bf7af0538aa7deea186774f10
                    • Instruction Fuzzy Hash: CB724F75E00219DBDB24CF99C8807BEB7F5EF48710F2485AAE949EB290DB749D41CB90
                    APIs
                      • Part of subcall function 00B610A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B60038,?,?), ref: 00B610BC
                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B60737
                      • Part of subcall function 00AE9997: __itow.LIBCMT ref: 00AE99C2
                      • Part of subcall function 00AE9997: __swprintf.LIBCMT ref: 00AE9A0C
                    • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00B607D6
                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00B6086E
                    • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00B60AAD
                    • RegCloseKey.ADVAPI32(00000000), ref: 00B60ABA
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                    • String ID:
                    • API String ID: 1240663315-0
                    • Opcode ID: 5ed7f46c92d4a2791e8923c890a1e231d843d61a67aa896f7be7ef75678e198f
                    • Instruction ID: 4e42b0f4e9680103ec59ecc9dd1384e1e1c3622b0eaff45c989d6beb9dfba27d
                    • Opcode Fuzzy Hash: 5ed7f46c92d4a2791e8923c890a1e231d843d61a67aa896f7be7ef75678e198f
                    • Instruction Fuzzy Hash: 27E14C31214300AFCB14EF69C991E2BBBE4EF89714B0489ADF449DB2A2DA34ED01CB51
                    APIs
                    • GetKeyboardState.USER32(?), ref: 00B40241
                    • GetAsyncKeyState.USER32(000000A0), ref: 00B402C2
                    • GetKeyState.USER32(000000A0), ref: 00B402DD
                    • GetAsyncKeyState.USER32(000000A1), ref: 00B402F7
                    • GetKeyState.USER32(000000A1), ref: 00B4030C
                    • GetAsyncKeyState.USER32(00000011), ref: 00B40324
                    • GetKeyState.USER32(00000011), ref: 00B40336
                    • GetAsyncKeyState.USER32(00000012), ref: 00B4034E
                    • GetKeyState.USER32(00000012), ref: 00B40360
                    • GetAsyncKeyState.USER32(0000005B), ref: 00B40378
                    • GetKeyState.USER32(0000005B), ref: 00B4038A
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: State$Async$Keyboard
                    • String ID:
                    • API String ID: 541375521-0
                    • Opcode ID: 38ad4801283ba3f87ce408c8cdf687482f76c4e970ce21b9520a8930396762a7
                    • Instruction ID: dc7781b43d97bc336f251fcb0941193f8b2d7bc77d067644f499a73ce5d216f7
                    • Opcode Fuzzy Hash: 38ad4801283ba3f87ce408c8cdf687482f76c4e970ce21b9520a8930396762a7
                    • Instruction Fuzzy Hash: 894186245247CA6AFF31AA6494083B5BEE0EB15340F0840DEDBC6471C2DBF45EC4AB96
                    APIs
                      • Part of subcall function 00AE9997: __itow.LIBCMT ref: 00AE99C2
                      • Part of subcall function 00AE9997: __swprintf.LIBCMT ref: 00AE9A0C
                    • CoInitialize.OLE32 ref: 00B58718
                    • CoUninitialize.OLE32 ref: 00B58723
                    • CoCreateInstance.OLE32(?,00000000,00000017,00B72BEC,?), ref: 00B58783
                    • IIDFromString.OLE32(?,?), ref: 00B587F6
                    • VariantInit.OLEAUT32(?), ref: 00B58890
                    • VariantClear.OLEAUT32(?), ref: 00B588F1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                    • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                    • API String ID: 834269672-1287834457
                    • Opcode ID: bc9ca5b7e2251db28c4c011cdd3aa810c4b3d1e0643f2deaa4481ee7bc8848c8
                    • Instruction ID: eebf28eb56807c07eec2e675ff71ffe0bf76c60aa337a62a73f8ace6d6b56754
                    • Opcode Fuzzy Hash: bc9ca5b7e2251db28c4c011cdd3aa810c4b3d1e0643f2deaa4481ee7bc8848c8
                    • Instruction Fuzzy Hash: FC61AE70608311AFD710DF24D985B6BBBE4EF48715F1048D9F985AB2A1DB70ED48CB92
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                    • String ID:
                    • API String ID: 1737998785-0
                    • Opcode ID: e21b9910a31993ffcad6f8ddf9062de7445f3a27b67b31bc8db5ffa971775d61
                    • Instruction ID: 3a130e30acaca082cc651d331f3ec104e600c9f5b4163d706c59309547261037
                    • Opcode Fuzzy Hash: e21b9910a31993ffcad6f8ddf9062de7445f3a27b67b31bc8db5ffa971775d61
                    • Instruction Fuzzy Hash: FD218B75200211AFDB10AF24EC49B7A7BA8EF54715F1080AAF906DB2B1DFB8AD01CB54
                    APIs
                      • Part of subcall function 00AE48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00AE48A1,?,?,00AE37C0,?), ref: 00AE48CE
                      • Part of subcall function 00B44CD3: GetFileAttributesW.KERNEL32(?,00B43947), ref: 00B44CD4
                    • FindFirstFileW.KERNEL32(?,?), ref: 00B43ADF
                    • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00B43B87
                    • MoveFileW.KERNEL32(?,?), ref: 00B43B9A
                    • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00B43BB7
                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00B43BD9
                    • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00B43BF5
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                    • String ID: \*.*
                    • API String ID: 4002782344-1173974218
                    • Opcode ID: 6d6c189dd39b21cfdb1813640c1bf6c7f36ad5d92bd82c5db156aeb2426d6d6e
                    • Instruction ID: 0811391f1ac8d0b6852d6bdeb1bbe0840d0e1c7f47135dce6176a8d62bb77d79
                    • Opcode Fuzzy Hash: 6d6c189dd39b21cfdb1813640c1bf6c7f36ad5d92bd82c5db156aeb2426d6d6e
                    • Instruction Fuzzy Hash: B95181318052899ACF05EBA1DE929FDB7F9EF14300F6841A9E44177092DF716F09DBA0
                    APIs
                      • Part of subcall function 00AE7F41: _memmove.LIBCMT ref: 00AE7F82
                    • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 00B4F6AB
                    • Sleep.KERNEL32(0000000A), ref: 00B4F6DB
                    • _wcscmp.LIBCMT ref: 00B4F6EF
                    • _wcscmp.LIBCMT ref: 00B4F70A
                    • FindNextFileW.KERNEL32(?,?), ref: 00B4F7A8
                    • FindClose.KERNEL32(00000000), ref: 00B4F7BE
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                    • String ID: *.*
                    • API String ID: 713712311-438819550
                    • Opcode ID: b9e289992d2361e0ff8ef72dd516eeab236bb778fa764417ef56b8a06bad61ed
                    • Instruction ID: e6555ed2c742430b362e2fb6d2f3cd140ae1ed92e01d009a7dbb84e0cdc8647b
                    • Opcode Fuzzy Hash: b9e289992d2361e0ff8ef72dd516eeab236bb778fa764417ef56b8a06bad61ed
                    • Instruction Fuzzy Hash: 59417C7190021AABDF11DF64CC99AFEBBF4FF05310F1445A6E815A31A0EB349E44DBA0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID:
                    • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                    • API String ID: 0-1546025612
                    • Opcode ID: ba1ddd1f58d267ec2022cc5cdb8f77956ca1d82a07f182cf0c6251b2210d65d1
                    • Instruction ID: 525e2fb9a3f6463f1f92c95c488aff14dc5e759b83c954168e010f0aad0b15f0
                    • Opcode Fuzzy Hash: ba1ddd1f58d267ec2022cc5cdb8f77956ca1d82a07f182cf0c6251b2210d65d1
                    • Instruction Fuzzy Hash: 78A28270E0422E8BDF24DF98D9907BEB7B1FB58314F1481A9E959A7280DB709E81CF54
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: _memmove
                    • String ID:
                    • API String ID: 4104443479-0
                    • Opcode ID: 5bb5102c595640636ffc42ed117a89809615f9198e848aa94a4bafe78db52f49
                    • Instruction ID: d79fe40681273bbeb39ac30e2527f74e4f57d13c41bf1b2c49976e6701bc6508
                    • Opcode Fuzzy Hash: 5bb5102c595640636ffc42ed117a89809615f9198e848aa94a4bafe78db52f49
                    • Instruction Fuzzy Hash: A612A970E00609DFDF14DFA5DA81AAEB7F5FF48300F2086A9E546A7291EB35AD11CB50
                    APIs
                      • Part of subcall function 00B38CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00B38D0D
                      • Part of subcall function 00B38CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00B38D3A
                      • Part of subcall function 00B38CC3: GetLastError.KERNEL32 ref: 00B38D47
                    • ExitWindowsEx.USER32(?,00000000), ref: 00B4549B
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                    • String ID: $@$SeShutdownPrivilege
                    • API String ID: 2234035333-194228
                    • Opcode ID: d2f2e1aff8325b3be8c7fa197043a6930212bf7edaac451a5c02a22d9c4f8032
                    • Instruction ID: 4ae29cfe83678b64cb6dd8b6e68898145f027ff2f9295f78782b461f5383bc57
                    • Opcode Fuzzy Hash: d2f2e1aff8325b3be8c7fa197043a6930212bf7edaac451a5c02a22d9c4f8032
                    • Instruction Fuzzy Hash: 67014771655F026BF7385674EC8ABBA72D8EB00752F3400B0FC07DA2D7DA940E80A190
                    APIs
                    • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00B565EF
                    • WSAGetLastError.WSOCK32(00000000), ref: 00B565FE
                    • bind.WSOCK32(00000000,?,00000010), ref: 00B5661A
                    • listen.WSOCK32(00000000,00000005), ref: 00B56629
                    • WSAGetLastError.WSOCK32(00000000), ref: 00B56643
                    • closesocket.WSOCK32(00000000,00000000), ref: 00B56657
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ErrorLast$bindclosesocketlistensocket
                    • String ID:
                    • API String ID: 1279440585-0
                    • Opcode ID: d14097267aae753fbbd42e05797c5c65be832c7a236d5047661200c769892307
                    • Instruction ID: 7e1871b0021f749f2f6a9e987ca69a3b63ce8408ca8cb3a903243f336d9fc4be
                    • Opcode Fuzzy Hash: d14097267aae753fbbd42e05797c5c65be832c7a236d5047661200c769892307
                    • Instruction Fuzzy Hash: 04219C30600205AFCB10AF24D985B7EB7E9EF48321F2481A9E95AE73E1CB74AD058B51
                    APIs
                      • Part of subcall function 00B00FF6: std::exception::exception.LIBCMT ref: 00B0102C
                      • Part of subcall function 00B00FF6: __CxxThrowException@8.LIBCMT ref: 00B01041
                    • _memmove.LIBCMT ref: 00B3062F
                    • _memmove.LIBCMT ref: 00B30744
                    • _memmove.LIBCMT ref: 00B307EB
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: _memmove$Exception@8Throwstd::exception::exception
                    • String ID:
                    • API String ID: 1300846289-0
                    • Opcode ID: 9fe73ad271aa36dd78b8f654821308dc7d5b12958fd60b29ce7445b83defad47
                    • Instruction ID: 46339b1878b10055f329f3c01235c93c025f4dd2eef784f3a78df14d7d220eae
                    • Opcode Fuzzy Hash: 9fe73ad271aa36dd78b8f654821308dc7d5b12958fd60b29ce7445b83defad47
                    • Instruction Fuzzy Hash: 48029F70E10209DBDF04EF69D991ABEBBF5EF44340F2480A9E906DB295EB31D950CB91
                    APIs
                      • Part of subcall function 00AE2612: GetWindowLongW.USER32(?,000000EB), ref: 00AE2623
                    • DefDlgProcW.USER32(?,?,?,?,?), ref: 00AE19FA
                    • GetSysColor.USER32(0000000F), ref: 00AE1A4E
                    • SetBkColor.GDI32(?,00000000), ref: 00AE1A61
                      • Part of subcall function 00AE1290: DefDlgProcW.USER32(?,00000020,?), ref: 00AE12D8
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ColorProc$LongWindow
                    • String ID:
                    • API String ID: 3744519093-0
                    • Opcode ID: 61f929ac3844103562d9440a3c3306744ccecf317f3f151b7ee56c85beb677ef
                    • Instruction ID: c8a75b7f7fddd88aeafd32650ffa1e728f3aece99a85d87d8beeae0e8fd98b7f
                    • Opcode Fuzzy Hash: 61f929ac3844103562d9440a3c3306744ccecf317f3f151b7ee56c85beb677ef
                    • Instruction Fuzzy Hash: 2CA16BB11055E4BED638AB2B8C65DBF3AEDDB463C1B54016AF402D7192CE388D4192B2
                    APIs
                      • Part of subcall function 00B580A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00B580CB
                    • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00B56AB1
                    • WSAGetLastError.WSOCK32(00000000), ref: 00B56ADA
                    • bind.WSOCK32(00000000,?,00000010), ref: 00B56B13
                    • WSAGetLastError.WSOCK32(00000000), ref: 00B56B20
                    • closesocket.WSOCK32(00000000,00000000), ref: 00B56B34
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ErrorLast$bindclosesocketinet_addrsocket
                    • String ID:
                    • API String ID: 99427753-0
                    • Opcode ID: 669417a18f2e989d4bd0d93574cb89b41faeb009076cde0bb772baaa4cae77a5
                    • Instruction ID: a9ef05d4570496d82386d5a1bfe76f49563356f6ea61d8d95af4c2ee85584652
                    • Opcode Fuzzy Hash: 669417a18f2e989d4bd0d93574cb89b41faeb009076cde0bb772baaa4cae77a5
                    • Instruction Fuzzy Hash: 6F419175600310AFEB10AF25DD86F7E77E9DF48710F448098F91AAB2D2DA749D018791
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Window$EnabledForegroundIconicVisibleZoomed
                    • String ID:
                    • API String ID: 292994002-0
                    • Opcode ID: 26043a18fe4214e4ea268eae4cba57a753112712decaed2278132f55dc0570dc
                    • Instruction ID: f78980bf824e7691dfb7d4d9051519ad65635514184838bf8d2658ae7a7ecf73
                    • Opcode Fuzzy Hash: 26043a18fe4214e4ea268eae4cba57a753112712decaed2278132f55dc0570dc
                    • Instruction Fuzzy Hash: 5F11BF72700A126FE7211F26EC44A2BBBD8FF54761F808079E806D7281CB789D12CAA5
                    APIs
                    • LoadLibraryA.KERNEL32(kernel32.dll,?,00B21D88,?), ref: 00B5C312
                    • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00B5C324
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: GetSystemWow64DirectoryW$kernel32.dll
                    • API String ID: 2574300362-1816364905
                    • Opcode ID: dc0eaa46ba2672ccddf7eef5e8fdd20e218d4e2f093471e2270aa2f6bdb62f86
                    • Instruction ID: 3972f8460fe3ffe576ff49e95fad66f89486b62e221c004ac068028aee4b5b04
                    • Opcode Fuzzy Hash: dc0eaa46ba2672ccddf7eef5e8fdd20e218d4e2f093471e2270aa2f6bdb62f86
                    • Instruction Fuzzy Hash: 50E0EC74600717CFDB205F25E804B967AD4EF09756B80C4F9E895D32A0EBB8D884CA60
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: __itow__swprintf
                    • String ID:
                    • API String ID: 674341424-0
                    • Opcode ID: dfcafce7ae9e7c6a122cc4102b3fe4d21f88de4eae9f5bc722a75e66c3061d50
                    • Instruction ID: 231df25e9fe22c5cb492ba1d8adf6dae118d75b4b6313c453b7423a6cefd34c1
                    • Opcode Fuzzy Hash: dfcafce7ae9e7c6a122cc4102b3fe4d21f88de4eae9f5bc722a75e66c3061d50
                    • Instruction Fuzzy Hash: C8229B726083559FCB24DF64C981B6FB7E4EF84700F10492DFA9A97291DB70EA04CB92
                    APIs
                    • CreateToolhelp32Snapshot.KERNEL32 ref: 00B5F151
                    • Process32FirstW.KERNEL32(00000000,?), ref: 00B5F15F
                      • Part of subcall function 00AE7F41: _memmove.LIBCMT ref: 00AE7F82
                    • Process32NextW.KERNEL32(00000000,?), ref: 00B5F21F
                    • CloseHandle.KERNEL32(00000000,?,?,?), ref: 00B5F22E
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                    • String ID:
                    • API String ID: 2576544623-0
                    • Opcode ID: 9486965fa1cb61fa560d57ae55ea3ab289682027e0a7024385b0a3a06cddf908
                    • Instruction ID: a82f2abe06efe1c060b56b92903c5131af5e54365ad7d32553bebbc34a79c280
                    • Opcode Fuzzy Hash: 9486965fa1cb61fa560d57ae55ea3ab289682027e0a7024385b0a3a06cddf908
                    • Instruction Fuzzy Hash: EB518DB15083419FD310EF25DC85E6BBBE8FF88750F10486DF995972A1EB70A908CB92
                    APIs
                    • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00B440D1
                    • _memset.LIBCMT ref: 00B440F2
                    • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00B44144
                    • CloseHandle.KERNEL32(00000000), ref: 00B4414D
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: CloseControlCreateDeviceFileHandle_memset
                    • String ID:
                    • API String ID: 1157408455-0
                    • Opcode ID: e5aadeeacb51f96e2e8d95ea66971850016fddf9a5867ee31a83b13a805f96b0
                    • Instruction ID: 4d0454e6ce2a3ab05065e4344af89a80c493d8269720c703f616e7428245231d
                    • Opcode Fuzzy Hash: e5aadeeacb51f96e2e8d95ea66971850016fddf9a5867ee31a83b13a805f96b0
                    • Instruction Fuzzy Hash: DE11AB759012287AD7305BA5AC4DFABBBBCEF45760F1041D6F908E72C0D6744F908BA4
                    APIs
                    • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00B3EB19
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: lstrlen
                    • String ID: ($|
                    • API String ID: 1659193697-1631851259
                    • Opcode ID: bb17214e9d28ca39538813a8fd4014f5629dce74874d42557b720f16f0daf869
                    • Instruction ID: 0d1bf0a27259300be2e003d64ca50403b264e189fc1be478fcf2fca91b29ad98
                    • Opcode Fuzzy Hash: bb17214e9d28ca39538813a8fd4014f5629dce74874d42557b720f16f0daf869
                    • Instruction Fuzzy Hash: B2321575A006059FDB28CF19C481A6AB7F1FF48310F25C5AEE4AADB3A1E770E941CB40
                    APIs
                    • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000), ref: 00B526D5
                    • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00B5270C
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Internet$AvailableDataFileQueryRead
                    • String ID:
                    • API String ID: 599397726-0
                    • Opcode ID: 1b9e6477971efc2a0be13991e0c195de83517fb12af7bc12491bb26bb0ac720f
                    • Instruction ID: 2d532b4edb577941cbdee74497e04e1a090f120be2d39b70d9d31f94681b4397
                    • Opcode Fuzzy Hash: 1b9e6477971efc2a0be13991e0c195de83517fb12af7bc12491bb26bb0ac720f
                    • Instruction Fuzzy Hash: C241C771501209BFEB20DB54DCC5FBB77FCEB45716F1040EAFE01A6180EA719D499A50
                    APIs
                    • SetErrorMode.KERNEL32(00000001), ref: 00B4B5AE
                    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00B4B608
                    • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00B4B655
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ErrorMode$DiskFreeSpace
                    • String ID:
                    • API String ID: 1682464887-0
                    • Opcode ID: 0d046defc5bf54d7c78232eaa632f9b219d7e418d30427402b59d4a3a01ecfe8
                    • Instruction ID: 51610623c695c7bdac6b616de2f105ecd46d13a6d315a225c82019aacb8a7d6d
                    • Opcode Fuzzy Hash: 0d046defc5bf54d7c78232eaa632f9b219d7e418d30427402b59d4a3a01ecfe8
                    • Instruction Fuzzy Hash: CF219035A00218EFCB00EF65E880EAEBBF8FF48310F1480A9E905AB351CB319915CF50
                    APIs
                      • Part of subcall function 00B00FF6: std::exception::exception.LIBCMT ref: 00B0102C
                      • Part of subcall function 00B00FF6: __CxxThrowException@8.LIBCMT ref: 00B01041
                    • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00B38D0D
                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00B38D3A
                    • GetLastError.KERNEL32 ref: 00B38D47
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                    • String ID:
                    • API String ID: 1922334811-0
                    • Opcode ID: a753b76dd156dfea319c478f29d09891c95321c9479f2443ea12239e7abb174a
                    • Instruction ID: 139a47d4537d2a2d88d75730caf193103370c3ec953c5711d4a74de86077c84d
                    • Opcode Fuzzy Hash: a753b76dd156dfea319c478f29d09891c95321c9479f2443ea12239e7abb174a
                    • Instruction Fuzzy Hash: BB1182B2414305AFD728AF54EC85D7BB7F8EB44710B20856EF45597281EF70AC408A64
                    APIs
                    • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00B44C2C
                    • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00B44C43
                    • FreeSid.ADVAPI32(?), ref: 00B44C53
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: AllocateCheckFreeInitializeMembershipToken
                    • String ID:
                    • API String ID: 3429775523-0
                    • Opcode ID: edb3aa3477e4d592c9fed715cdfd31e62fa9f5b3bf41f6bc136b41566ecd2d4d
                    • Instruction ID: 5b1c1f91aa32c251f33bfdf0c1f89e7fb10d0854cac672c193b9833ca3c93690
                    • Opcode Fuzzy Hash: edb3aa3477e4d592c9fed715cdfd31e62fa9f5b3bf41f6bc136b41566ecd2d4d
                    • Instruction Fuzzy Hash: AFF03775A11209BBDB04DFE0AD89ABEBBB8EB08201F0044A9E901E2181E6B46A048B50
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0a0de0347f2735f136a8fcf3433a37936b2e696018263f6158aee844e405730d
                    • Instruction ID: 8011434dffe465312f29077f6b6dfb3062e81eec63551e03835cfbe3c2494fea
                    • Opcode Fuzzy Hash: 0a0de0347f2735f136a8fcf3433a37936b2e696018263f6158aee844e405730d
                    • Instruction Fuzzy Hash: 0922C170A00256CFDB24DF59D480ABEBBF1FF08300F1485A9E85A9B395E735AD85CB91
                    APIs
                    • FindFirstFileW.KERNEL32(?,?), ref: 00B4C966
                    • FindClose.KERNEL32(00000000), ref: 00B4C996
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Find$CloseFileFirst
                    • String ID:
                    • API String ID: 2295610775-0
                    • Opcode ID: b7c540672fbf0f85dc2ecba5560b2dedbcbb9515c033c89f175eef7c56ce6ed7
                    • Instruction ID: a7ba629d857a473b163ea66f13a14c6844f55b8707999cd7b1ac6120139d2d9d
                    • Opcode Fuzzy Hash: b7c540672fbf0f85dc2ecba5560b2dedbcbb9515c033c89f175eef7c56ce6ed7
                    • Instruction Fuzzy Hash: B51161726106009FD710EF29D845A2AFBE9FF84324F00855EF8A9D73A1DB74AD01CB81
                    APIs
                    • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00B5977D,?,00B6FB84,?), ref: 00B4A302
                    • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00B5977D,?,00B6FB84,?), ref: 00B4A314
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ErrorFormatLastMessage
                    • String ID:
                    • API String ID: 3479602957-0
                    • Opcode ID: dfbc3a0ed5d301c97802d9686be93a7e371ed0369ca2eb9ae4203ab4d017af0c
                    • Instruction ID: 0eacea2cd135fd6a8395929735f76c2f5ca774e9267c9c7e197934d01ec4c727
                    • Opcode Fuzzy Hash: dfbc3a0ed5d301c97802d9686be93a7e371ed0369ca2eb9ae4203ab4d017af0c
                    • Instruction Fuzzy Hash: F4F0823554822DABDB109FA4DC48FEA77ADFF08761F0082A5F918D7181EA709A44CBA1
                    APIs
                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00B38851), ref: 00B38728
                    • CloseHandle.KERNEL32(?,?,00B38851), ref: 00B3873A
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: AdjustCloseHandlePrivilegesToken
                    • String ID:
                    • API String ID: 81990902-0
                    • Opcode ID: 52112ca5884e2eb4284e904d8f4955f752e5a9d9f2a0a5c527f18bd53b9fd5df
                    • Instruction ID: 5af2d9f938106afd4ef2c7f936abecee78b2309a026b163d87151c0c4765a039
                    • Opcode Fuzzy Hash: 52112ca5884e2eb4284e904d8f4955f752e5a9d9f2a0a5c527f18bd53b9fd5df
                    • Instruction Fuzzy Hash: D4E0B676014611EEE7252B64FC09D777BE9EB04350B248869F496814B0DBA2AC90DB50
                    APIs
                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00B08F97,?,?,?,00000001), ref: 00B0A39A
                    • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00B0A3A3
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ExceptionFilterUnhandled
                    • String ID:
                    • API String ID: 3192549508-0
                    • Opcode ID: 065a8caed0d7096cbc5e1c4824f02eaf05cc1ec211b83b2ff21fc83e8a82d0ab
                    • Instruction ID: cd7b914dc5b9083b53db049ae4c6fc14d312d75206e483b337b1245b45a576e0
                    • Opcode Fuzzy Hash: 065a8caed0d7096cbc5e1c4824f02eaf05cc1ec211b83b2ff21fc83e8a82d0ab
                    • Instruction Fuzzy Hash: 48B0923105820AABCA002B91FC09BA83F68EB44AA2F404020F70D862A0EFA654508A99
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 07af707e14b5e8cef7a4f970e6b21910381a22d22f8746d0aa420d347fc023aa
                    • Instruction ID: 534c3eab7194cda88d90c10692a4f3de9253285fc67a3c789000bde8e7fcac0e
                    • Opcode Fuzzy Hash: 07af707e14b5e8cef7a4f970e6b21910381a22d22f8746d0aa420d347fc023aa
                    • Instruction Fuzzy Hash: 9632D122E69F424DD7339634D872335A699EFA63C4F15D737E819B6EA6EF2884C34100
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 58430cfc37dc2282771f18c17bfc81ed0ffcd595a0ed1451fbb931165d727e1e
                    • Instruction ID: 6097341b42849f7a14f6be20856f2de49e329beabd26fe3063bdc99f782c59c3
                    • Opcode Fuzzy Hash: 58430cfc37dc2282771f18c17bfc81ed0ffcd595a0ed1451fbb931165d727e1e
                    • Instruction Fuzzy Hash: 8BB1F120D2AF414DD2639A398875336B69CAFFB2C5F92D71BFC1A75D22EB2185C34141
                    APIs
                    • __time64.LIBCMT ref: 00B48B25
                      • Part of subcall function 00B0543A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00B491F8,00000000,?,?,?,?,00B493A9,00000000,?), ref: 00B05443
                      • Part of subcall function 00B0543A: __aulldiv.LIBCMT ref: 00B05463
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Time$FileSystem__aulldiv__time64
                    • String ID:
                    • API String ID: 2893107130-0
                    • Opcode ID: 89c3d7f2bd3044f5cfec347c6a89d6b3d8d198d2677e2ffaf614444ceb8da2de
                    • Instruction ID: 9eff63d6d478d52f28e93c8a15e071c88beeaf440938693011bde94d4a9c7ffc
                    • Opcode Fuzzy Hash: 89c3d7f2bd3044f5cfec347c6a89d6b3d8d198d2677e2ffaf614444ceb8da2de
                    • Instruction Fuzzy Hash: C921E4726395108FC329CF25D841A56B3E1EBA5311F288E6CD0E5CB2D0CE75BD05DB94
                    APIs
                    • BlockInput.USER32(00000001), ref: 00B54218
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: BlockInput
                    • String ID:
                    • API String ID: 3456056419-0
                    • Opcode ID: ca3c0315c1193d75d1defa856d380787b6af22151adc730a2b69e2baca439c55
                    • Instruction ID: 86f91a206a18cbb4eea474ebef9659b9d9f323cd67e5aab83c84e877622a858b
                    • Opcode Fuzzy Hash: ca3c0315c1193d75d1defa856d380787b6af22151adc730a2b69e2baca439c55
                    • Instruction Fuzzy Hash: AEE04F712502149FC710EF5AE844A9BF7E8EF997A1F008066FC4AC7352DBB1E845CBA0
                    APIs
                    • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 00B44F18
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: mouse_event
                    • String ID:
                    • API String ID: 2434400541-0
                    • Opcode ID: 064934f8809e8c1b6ead3a3d328576a3ed43ee08a38bfe294dd865928d8559b1
                    • Instruction ID: 7cc34056f94f41af46a5403f45a6b3ebe0afd09c5465b2b36d1da4b96a2f4938
                    • Opcode Fuzzy Hash: 064934f8809e8c1b6ead3a3d328576a3ed43ee08a38bfe294dd865928d8559b1
                    • Instruction Fuzzy Hash: A2D05EB016821538FC184B20AC0FF760188E341781F8449C9720A954C19AE56E38B035
                    APIs
                    • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00B388D1), ref: 00B38CB3
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: LogonUser
                    • String ID:
                    • API String ID: 1244722697-0
                    • Opcode ID: 2aab1372eef548beba0fc4ac6e833a4e600d2a5da895062724fe81d1755c5620
                    • Instruction ID: c4486dc37eeef0b98556857207be3b08b23a8d3d2f9ff09391516a597dcfea20
                    • Opcode Fuzzy Hash: 2aab1372eef548beba0fc4ac6e833a4e600d2a5da895062724fe81d1755c5620
                    • Instruction Fuzzy Hash: 31D09E3226450EBBEF019EA4ED05EBE3B69EB04B01F408511FE15D61A1C7B5D935AB60
                    APIs
                    • GetUserNameW.ADVAPI32(?,?), ref: 00B22242
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: NameUser
                    • String ID:
                    • API String ID: 2645101109-0
                    • Opcode ID: 6030af1aaa8d6e5718a79b01a8e0281d157f11b832da8737a2842541bd9ec0a7
                    • Instruction ID: 4f2dea8ce8885ab2a2cef784252444038021a71ed3d40f34f9a5c9a8de939628
                    • Opcode Fuzzy Hash: 6030af1aaa8d6e5718a79b01a8e0281d157f11b832da8737a2842541bd9ec0a7
                    • Instruction Fuzzy Hash: 1CC04CF1801119DBDB05DF90E988DFE77BCAB04304F104495E105F2140D7749B448A71
                    APIs
                    • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00B0A36A
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ExceptionFilterUnhandled
                    • String ID:
                    • API String ID: 3192549508-0
                    • Opcode ID: 15df079b6f35f27285f1cc98b342e909a30cc0b7cf61006fc5c45e0c2fa1f62f
                    • Instruction ID: db4957c34b17d180044ab6f8217753857383ebd00bf7d36c99439382fa75fb31
                    • Opcode Fuzzy Hash: 15df079b6f35f27285f1cc98b342e909a30cc0b7cf61006fc5c45e0c2fa1f62f
                    • Instruction Fuzzy Hash: A5A0243000010DF7CF001F41FC044547F5CD7001D07004030F50C41131DF73541045C4
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9d7862f35bb4bb48324af86fca8994ba362d06d6fe1d824c15fef974a4cde99c
                    • Instruction ID: 6c4500da2d8a606f88230cc48886f8f62fe070ecc7455aa50396bb44ebf2dbb0
                    • Opcode Fuzzy Hash: 9d7862f35bb4bb48324af86fca8994ba362d06d6fe1d824c15fef974a4cde99c
                    • Instruction Fuzzy Hash: 81220770605659CBDF388BA4C4D467D77F1EB02344F7544AAFA928B291DB3C9D82CB60
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                    • Instruction ID: b13b6e4d1fdc45eb3e9a78678d31cb983004fd93f8ad38425a07be535680a3fb
                    • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                    • Instruction Fuzzy Hash: B4C1803220519309DB2D473D957813EBEE19AA27F171A0BDDE8B3CB5D5EF20D928D620
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                    • Instruction ID: 09672fc9ef5b61cd007f765ab44240405ce867648844c30e289befda350f0d38
                    • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                    • Instruction Fuzzy Hash: 82C1833220519309DF6D473D957813EBFE19AA27F131A0BEDE4B2DB5D4EF20D5289620
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                    • Instruction ID: c8c8b1fea45cdae8b85ceaf68def85ffae7563d2fee4cb0536356e48f7c64b3d
                    • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                    • Instruction Fuzzy Hash: 3EC16F322091930ADB2D463ED57413EBEE1DAA27F131A0FEDE4B2CB5D4EF20D5649620
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000430294.0000000000C10000.00000040.00001000.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_c10000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                    • Instruction ID: 475869e242e40b0b3f3582096becc54989ef4b8e0621d406b9d76e62429b8256
                    • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                    • Instruction Fuzzy Hash: B641B571D1051CEBCF48CFADC991AEEBBF1AF88201F548299D516AB345D730AB41DB90
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000430294.0000000000C10000.00000040.00001000.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_c10000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                    • Instruction ID: 0e317876fb7327a1422cb70830a6d2039a6ea0cc28b8cddf9d693f8182022321
                    • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                    • Instruction Fuzzy Hash: E2019278A00109EFCB44DF98C5909AEFBB6FB49314F208599E919A7301D730AF81EB90
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000430294.0000000000C10000.00000040.00001000.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_c10000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                    • Instruction ID: ef14cc232599b26a8022e49140209cc786bcfcad3af4a6990887f7a36cedfee5
                    • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                    • Instruction Fuzzy Hash: F6019278A00149EFCB44DF98C5909AEFBB6FB49714F208599E819A7301D730EF81EB90
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000430294.0000000000C10000.00000040.00001000.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_c10000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                    • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                    • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                    • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                    APIs
                    • DeleteObject.GDI32(00000000), ref: 00B57B70
                    • DeleteObject.GDI32(00000000), ref: 00B57B82
                    • DestroyWindow.USER32 ref: 00B57B90
                    • GetDesktopWindow.USER32 ref: 00B57BAA
                    • GetWindowRect.USER32(00000000), ref: 00B57BB1
                    • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00B57CF2
                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00B57D02
                    • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B57D4A
                    • GetClientRect.USER32(00000000,?), ref: 00B57D56
                    • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00B57D90
                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B57DB2
                    • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B57DC5
                    • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B57DD0
                    • GlobalLock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B57DD9
                    • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B57DE8
                    • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B57DF1
                    • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B57DF8
                    • GlobalFree.KERNEL32(00000000), ref: 00B57E03
                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B57E15
                    • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00B72CAC,00000000), ref: 00B57E2B
                    • GlobalFree.KERNEL32(00000000), ref: 00B57E3B
                    • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00B57E61
                    • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00B57E80
                    • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B57EA2
                    • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B5808F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                    • String ID: $AutoIt v3$DISPLAY$static
                    • API String ID: 2211948467-2373415609
                    • Opcode ID: 580945c40d9375ac14a92a4963c132523fd95420ce3667a6be43599803389d83
                    • Instruction ID: 3a845b52e49828ea88ea53d8563354a2ad54f4c1720dbacfb3fbc9d33cee1c5e
                    • Opcode Fuzzy Hash: 580945c40d9375ac14a92a4963c132523fd95420ce3667a6be43599803389d83
                    • Instruction Fuzzy Hash: E9028D71A00215EFDB14DF64ED89EAE7BB9FF49311F148198F915AB2A1CB74AD00CB60
                    APIs
                    • CharUpperBuffW.USER32(?,?,00B6F910), ref: 00B638AF
                    • IsWindowVisible.USER32(?), ref: 00B638D3
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: BuffCharUpperVisibleWindow
                    • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                    • API String ID: 4105515805-45149045
                    • Opcode ID: 616ddb4f29a1ee9dab28c3d638e08c1477f70d5a615b9d1e00e869a97e054468
                    • Instruction ID: fbae088cdb64db627801e128f100d1c175fa603f89ab4b0dd5793329081e3930
                    • Opcode Fuzzy Hash: 616ddb4f29a1ee9dab28c3d638e08c1477f70d5a615b9d1e00e869a97e054468
                    • Instruction Fuzzy Hash: 8FD17F30218305ABCB14EF11C591A6EBBE1EF94B44F1445E8F8865B3E2CB75EE0ACB51
                    APIs
                    • SetTextColor.GDI32(?,00000000), ref: 00B6A89F
                    • GetSysColorBrush.USER32(0000000F), ref: 00B6A8D0
                    • GetSysColor.USER32(0000000F), ref: 00B6A8DC
                    • SetBkColor.GDI32(?,000000FF), ref: 00B6A8F6
                    • SelectObject.GDI32(?,?), ref: 00B6A905
                    • InflateRect.USER32(?,000000FF,000000FF), ref: 00B6A930
                    • GetSysColor.USER32(00000010), ref: 00B6A938
                    • CreateSolidBrush.GDI32(00000000), ref: 00B6A93F
                    • FrameRect.USER32(?,?,00000000), ref: 00B6A94E
                    • DeleteObject.GDI32(00000000), ref: 00B6A955
                    • InflateRect.USER32(?,000000FE,000000FE), ref: 00B6A9A0
                    • FillRect.USER32(?,?,?), ref: 00B6A9D2
                    • GetWindowLongW.USER32(?,000000F0), ref: 00B6A9FD
                      • Part of subcall function 00B6AB60: GetSysColor.USER32(00000012), ref: 00B6AB99
                      • Part of subcall function 00B6AB60: SetTextColor.GDI32(?,?), ref: 00B6AB9D
                      • Part of subcall function 00B6AB60: GetSysColorBrush.USER32(0000000F), ref: 00B6ABB3
                      • Part of subcall function 00B6AB60: GetSysColor.USER32(0000000F), ref: 00B6ABBE
                      • Part of subcall function 00B6AB60: GetSysColor.USER32(00000011), ref: 00B6ABDB
                      • Part of subcall function 00B6AB60: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00B6ABE9
                      • Part of subcall function 00B6AB60: SelectObject.GDI32(?,00000000), ref: 00B6ABFA
                      • Part of subcall function 00B6AB60: SetBkColor.GDI32(?,00000000), ref: 00B6AC03
                      • Part of subcall function 00B6AB60: SelectObject.GDI32(?,?), ref: 00B6AC10
                      • Part of subcall function 00B6AB60: InflateRect.USER32(?,000000FF,000000FF), ref: 00B6AC2F
                      • Part of subcall function 00B6AB60: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00B6AC46
                      • Part of subcall function 00B6AB60: GetWindowLongW.USER32(00000000,000000F0), ref: 00B6AC5B
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                    • String ID:
                    • API String ID: 4124339563-0
                    • Opcode ID: f6c6365754ae5923ad595c1bc1091d079063412f333d47c157c23b34cfbafaf3
                    • Instruction ID: afc9759ebb9f094afb669849386e47453cf3ad8d41350a6d9723817335b064fa
                    • Opcode Fuzzy Hash: f6c6365754ae5923ad595c1bc1091d079063412f333d47c157c23b34cfbafaf3
                    • Instruction Fuzzy Hash: DEA17472408302AFDB109F64EC48A6B7BE9FF89321F104A29F552A71E1DB79D944CF52
                    APIs
                    • DestroyWindow.USER32(?,?,?), ref: 00AE2CA2
                    • DeleteObject.GDI32(00000000), ref: 00AE2CE8
                    • DeleteObject.GDI32(00000000), ref: 00AE2CF3
                    • DestroyIcon.USER32(00000000,?,?,?), ref: 00AE2CFE
                    • DestroyWindow.USER32(00000000,?,?,?), ref: 00AE2D09
                    • SendMessageW.USER32(?,00001308,?,00000000), ref: 00B1C68B
                    • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00B1C6C4
                    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00B1CAED
                      • Part of subcall function 00AE1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00AE2036,?,00000000,?,?,?,?,00AE16CB,00000000,?), ref: 00AE1B9A
                    • SendMessageW.USER32(?,00001053), ref: 00B1CB2A
                    • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00B1CB41
                    • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00B1CB57
                    • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00B1CB62
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                    • String ID: 0
                    • API String ID: 464785882-4108050209
                    • Opcode ID: 69fae1537e89e096493d99fad504458a85ee3e3f195ed82e55b30eb5a97eba18
                    • Instruction ID: 55b7b825f47dac8a8fa9dbbf7b54e51d11ba21e97fffe71f5ecc899988374799
                    • Opcode Fuzzy Hash: 69fae1537e89e096493d99fad504458a85ee3e3f195ed82e55b30eb5a97eba18
                    • Instruction Fuzzy Hash: 1012AF30644241EFDB11CF24C884BB9BBE5FF45310FA445A9E596DB2A2CB71EC81CB91
                    APIs
                    • DestroyWindow.USER32(00000000), ref: 00B577F1
                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00B578B0
                    • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 00B578EE
                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00B57900
                    • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00B57946
                    • GetClientRect.USER32(00000000,?), ref: 00B57952
                    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00B57996
                    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00B579A5
                    • GetStockObject.GDI32(00000011), ref: 00B579B5
                    • SelectObject.GDI32(00000000,00000000), ref: 00B579B9
                    • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 00B579C9
                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00B579D2
                    • DeleteDC.GDI32(00000000), ref: 00B579DB
                    • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00B57A07
                    • SendMessageW.USER32(00000030,00000000,00000001), ref: 00B57A1E
                    • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00B57A59
                    • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00B57A6D
                    • SendMessageW.USER32(00000404,00000001,00000000), ref: 00B57A7E
                    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00B57AAE
                    • GetStockObject.GDI32(00000011), ref: 00B57AB9
                    • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00B57AC4
                    • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00B57ACE
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                    • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                    • API String ID: 2910397461-517079104
                    • Opcode ID: ef577038f10b91f7e40b646ab704b5f59be54d3cabeaade80405888cc40e4f07
                    • Instruction ID: af521fdefce7d608e4623568f9bf5e8539ab0a1fde3b77c0cf7630fe9ddeac22
                    • Opcode Fuzzy Hash: ef577038f10b91f7e40b646ab704b5f59be54d3cabeaade80405888cc40e4f07
                    • Instruction Fuzzy Hash: 2FA181B1A40219BFEB14DBA5DC4AFAE7BA9EB49710F144154FA14A71E0CBB4AD00CB60
                    APIs
                    • SetErrorMode.KERNEL32(00000001), ref: 00B4AF89
                    • GetDriveTypeW.KERNEL32(?,00B6FAC0,?,\\.\,00B6F910), ref: 00B4B066
                    • SetErrorMode.KERNEL32(00000000,00B6FAC0,?,\\.\,00B6F910), ref: 00B4B1C4
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ErrorMode$DriveType
                    • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                    • API String ID: 2907320926-4222207086
                    • Opcode ID: 87fd843f511d5dfef201e5d52c6389637ff410ac759d67c7a9974b3b3eb4cf0c
                    • Instruction ID: d58ceda50a705dd554ec5f5cb341684e7e782edb78027d6ad4ea74982996fb25
                    • Opcode Fuzzy Hash: 87fd843f511d5dfef201e5d52c6389637ff410ac759d67c7a9974b3b3eb4cf0c
                    • Instruction Fuzzy Hash: 68518130694345ABCF04DB50CAA2E7D73F1EB54741B2040E5E60AB72A1DB79DF41EB82
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: __wcsnicmp
                    • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                    • API String ID: 1038674560-86951937
                    • Opcode ID: 588ff4f54675385731ea9ab5ab57c4ee11c5e86ad96fe5e75f025506fff14465
                    • Instruction ID: cad6aa7448602a9f816aa932349223fe73b57eac320eadb0492f514eac3ffdbf
                    • Opcode Fuzzy Hash: 588ff4f54675385731ea9ab5ab57c4ee11c5e86ad96fe5e75f025506fff14465
                    • Instruction Fuzzy Hash: DB812B70740285BADB20AF61DD86FBE7BE8EF25740F0444A5FD45AB1D2EB60DE41C2A1
                    APIs
                    • GetSysColor.USER32(00000012), ref: 00B6AB99
                    • SetTextColor.GDI32(?,?), ref: 00B6AB9D
                    • GetSysColorBrush.USER32(0000000F), ref: 00B6ABB3
                    • GetSysColor.USER32(0000000F), ref: 00B6ABBE
                    • CreateSolidBrush.GDI32(?), ref: 00B6ABC3
                    • GetSysColor.USER32(00000011), ref: 00B6ABDB
                    • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00B6ABE9
                    • SelectObject.GDI32(?,00000000), ref: 00B6ABFA
                    • SetBkColor.GDI32(?,00000000), ref: 00B6AC03
                    • SelectObject.GDI32(?,?), ref: 00B6AC10
                    • InflateRect.USER32(?,000000FF,000000FF), ref: 00B6AC2F
                    • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00B6AC46
                    • GetWindowLongW.USER32(00000000,000000F0), ref: 00B6AC5B
                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00B6ACA7
                    • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00B6ACCE
                    • InflateRect.USER32(?,000000FD,000000FD), ref: 00B6ACEC
                    • DrawFocusRect.USER32(?,?), ref: 00B6ACF7
                    • GetSysColor.USER32(00000011), ref: 00B6AD05
                    • SetTextColor.GDI32(?,00000000), ref: 00B6AD0D
                    • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00B6AD21
                    • SelectObject.GDI32(?,00B6A869), ref: 00B6AD38
                    • DeleteObject.GDI32(?), ref: 00B6AD43
                    • SelectObject.GDI32(?,?), ref: 00B6AD49
                    • DeleteObject.GDI32(?), ref: 00B6AD4E
                    • SetTextColor.GDI32(?,?), ref: 00B6AD54
                    • SetBkColor.GDI32(?,?), ref: 00B6AD5E
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                    • String ID:
                    • API String ID: 1996641542-0
                    • Opcode ID: 9c350db37a0a7563f73cc31f37aedb41286b08af3218bf45544b18f4a18facd1
                    • Instruction ID: 608ae1ed445076c3494a7e466e106dfe4a36ab328120be5193ee320f3098ae70
                    • Opcode Fuzzy Hash: 9c350db37a0a7563f73cc31f37aedb41286b08af3218bf45544b18f4a18facd1
                    • Instruction Fuzzy Hash: CE615F71900219AFDF119FA4EC48AAE7BB9FF08320F144165F915BB2E1DAB99D40DF90
                    APIs
                    • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00B68D34
                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00B68D45
                    • CharNextW.USER32(0000014E), ref: 00B68D74
                    • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00B68DB5
                    • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00B68DCB
                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00B68DDC
                    • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00B68DF9
                    • SetWindowTextW.USER32(?,0000014E), ref: 00B68E45
                    • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00B68E5B
                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00B68E8C
                    • _memset.LIBCMT ref: 00B68EB1
                    • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00B68EFA
                    • _memset.LIBCMT ref: 00B68F59
                    • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00B68F83
                    • SendMessageW.USER32(?,00001074,?,00000001), ref: 00B68FDB
                    • SendMessageW.USER32(?,0000133D,?,?), ref: 00B69088
                    • InvalidateRect.USER32(?,00000000,00000001), ref: 00B690AA
                    • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00B690F4
                    • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00B69121
                    • DrawMenuBar.USER32(?), ref: 00B69130
                    • SetWindowTextW.USER32(?,0000014E), ref: 00B69158
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                    • String ID: 0
                    • API String ID: 1073566785-4108050209
                    • Opcode ID: 752d33194af27908902026241ed1acabf1f4a2f6f9da9641647c68520e943af8
                    • Instruction ID: 37d98acc9ceb82c0ff52f5a4ba1b4474606b78ea64f1083e2b92462569db2b74
                    • Opcode Fuzzy Hash: 752d33194af27908902026241ed1acabf1f4a2f6f9da9641647c68520e943af8
                    • Instruction Fuzzy Hash: 3FE15070901219ABDF209F54DC88EEE7BF9EF05710F148299F915AB1E0DB788A85DF60
                    APIs
                    • GetCursorPos.USER32(?), ref: 00B64C51
                    • GetDesktopWindow.USER32 ref: 00B64C66
                    • GetWindowRect.USER32(00000000), ref: 00B64C6D
                    • GetWindowLongW.USER32(?,000000F0), ref: 00B64CCF
                    • DestroyWindow.USER32(?), ref: 00B64CFB
                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00B64D24
                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00B64D42
                    • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00B64D68
                    • SendMessageW.USER32(?,00000421,?,?), ref: 00B64D7D
                    • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00B64D90
                    • IsWindowVisible.USER32(?), ref: 00B64DB0
                    • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00B64DCB
                    • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00B64DDF
                    • GetWindowRect.USER32(?,?), ref: 00B64DF7
                    • MonitorFromPoint.USER32(?,?,00000002), ref: 00B64E1D
                    • GetMonitorInfoW.USER32(00000000,?), ref: 00B64E37
                    • CopyRect.USER32(?,?), ref: 00B64E4E
                    • SendMessageW.USER32(?,00000412,00000000), ref: 00B64EB9
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                    • String ID: ($0$tooltips_class32
                    • API String ID: 698492251-4156429822
                    • Opcode ID: 673862f1328e7624ae96c5d555ae6b9a6cff30fa9c5de8ebd0cd270223c9ffef
                    • Instruction ID: 22eec5dcb17b97b77cd2b7c786af129106534c6964ff96e18dd1f17e80332d20
                    • Opcode Fuzzy Hash: 673862f1328e7624ae96c5d555ae6b9a6cff30fa9c5de8ebd0cd270223c9ffef
                    • Instruction Fuzzy Hash: 9EB16871608741AFDB04DF25D984B6ABBE4FF88310F00896CF5999B2A1DB75EC04CB91
                    APIs
                    • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00B446E8
                    • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00B4470E
                    • _wcscpy.LIBCMT ref: 00B4473C
                    • _wcscmp.LIBCMT ref: 00B44747
                    • _wcscat.LIBCMT ref: 00B4475D
                    • _wcsstr.LIBCMT ref: 00B44768
                    • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00B44784
                    • _wcscat.LIBCMT ref: 00B447CD
                    • _wcscat.LIBCMT ref: 00B447D4
                    • _wcsncpy.LIBCMT ref: 00B447FF
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                    • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                    • API String ID: 699586101-1459072770
                    • Opcode ID: 052078dae8bf7187fceb96ef25f05e8a34aea95887c02120be5a7efd5071ed56
                    • Instruction ID: d96bd5bffbc80251e9e15602b925a93bcb8b2a101e5c1bf01717cdd953b06472
                    • Opcode Fuzzy Hash: 052078dae8bf7187fceb96ef25f05e8a34aea95887c02120be5a7efd5071ed56
                    • Instruction Fuzzy Hash: FD412472A002057AEB10AB649D47FBF7BFCEF41750F1000EAF905E61D2EF749A11A6A5
                    APIs
                    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00AE28BC
                    • GetSystemMetrics.USER32(00000007), ref: 00AE28C4
                    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00AE28EF
                    • GetSystemMetrics.USER32(00000008), ref: 00AE28F7
                    • GetSystemMetrics.USER32(00000004), ref: 00AE291C
                    • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00AE2939
                    • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00AE2949
                    • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00AE297C
                    • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00AE2990
                    • GetClientRect.USER32(00000000,000000FF), ref: 00AE29AE
                    • GetStockObject.GDI32(00000011), ref: 00AE29CA
                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 00AE29D5
                      • Part of subcall function 00AE2344: GetCursorPos.USER32(?), ref: 00AE2357
                      • Part of subcall function 00AE2344: ScreenToClient.USER32(00BA67B0,?), ref: 00AE2374
                      • Part of subcall function 00AE2344: GetAsyncKeyState.USER32(00000001), ref: 00AE2399
                      • Part of subcall function 00AE2344: GetAsyncKeyState.USER32(00000002), ref: 00AE23A7
                    • SetTimer.USER32(00000000,00000000,00000028,00AE1256), ref: 00AE29FC
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                    • String ID: AutoIt v3 GUI
                    • API String ID: 1458621304-248962490
                    • Opcode ID: 5319f08f5b4573b767de634d8c7525547f2f2d3453049be1bcbffa81a6790088
                    • Instruction ID: 01c358df692bbb52af3bce59b2599021fd0728fe722cfdacc73ed6c114c633c9
                    • Opcode Fuzzy Hash: 5319f08f5b4573b767de634d8c7525547f2f2d3453049be1bcbffa81a6790088
                    • Instruction Fuzzy Hash: 4EB14C71A4024AEFDB14DFA9EC45BAE7BB8FB08314F108129FA16A72D0DB749950CB54
                    APIs
                    • CharUpperBuffW.USER32(?,?), ref: 00B640F6
                    • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00B641B6
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: BuffCharMessageSendUpper
                    • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                    • API String ID: 3974292440-719923060
                    • Opcode ID: 229d68207fe17666d2cb5117043b8cb59b94e0d21370aa137cf5e11b98929ae3
                    • Instruction ID: 1709bd2f28095daf4a393dce55804fa3cb3af46c3afba0cdfd4646eaa3e1005d
                    • Opcode Fuzzy Hash: 229d68207fe17666d2cb5117043b8cb59b94e0d21370aa137cf5e11b98929ae3
                    • Instruction Fuzzy Hash: 4EA16B302247419FCB14EF20CA91A6AB7E5EF95314F2449BCB8A69B3D2DB74EC05CB51
                    APIs
                    • LoadCursorW.USER32(00000000,00007F89), ref: 00B55309
                    • LoadCursorW.USER32(00000000,00007F8A), ref: 00B55314
                    • LoadCursorW.USER32(00000000,00007F00), ref: 00B5531F
                    • LoadCursorW.USER32(00000000,00007F03), ref: 00B5532A
                    • LoadCursorW.USER32(00000000,00007F8B), ref: 00B55335
                    • LoadCursorW.USER32(00000000,00007F01), ref: 00B55340
                    • LoadCursorW.USER32(00000000,00007F81), ref: 00B5534B
                    • LoadCursorW.USER32(00000000,00007F88), ref: 00B55356
                    • LoadCursorW.USER32(00000000,00007F80), ref: 00B55361
                    • LoadCursorW.USER32(00000000,00007F86), ref: 00B5536C
                    • LoadCursorW.USER32(00000000,00007F83), ref: 00B55377
                    • LoadCursorW.USER32(00000000,00007F85), ref: 00B55382
                    • LoadCursorW.USER32(00000000,00007F82), ref: 00B5538D
                    • LoadCursorW.USER32(00000000,00007F84), ref: 00B55398
                    • LoadCursorW.USER32(00000000,00007F04), ref: 00B553A3
                    • LoadCursorW.USER32(00000000,00007F02), ref: 00B553AE
                    • GetCursorInfo.USER32(?), ref: 00B553BE
                    • GetLastError.KERNEL32(00000001,00000000), ref: 00B553E9
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Cursor$Load$ErrorInfoLast
                    • String ID:
                    • API String ID: 3215588206-0
                    • Opcode ID: 61562f42dcc5f7749a43c843cbbc7e5db4241597875576799bc043dde9087085
                    • Instruction ID: 4da55b1343442a8ffb7707cae587ffff2613a0b0b03e2afad92da366dd4783b6
                    • Opcode Fuzzy Hash: 61562f42dcc5f7749a43c843cbbc7e5db4241597875576799bc043dde9087085
                    • Instruction Fuzzy Hash: 39416470E043196ADB209FBA8C4996FFFF8EF51B51F10456FE509E7290DAB8A401CE61
                    APIs
                    • GetClassNameW.USER32(?,?,00000100), ref: 00B3AAA5
                    • __swprintf.LIBCMT ref: 00B3AB46
                    • _wcscmp.LIBCMT ref: 00B3AB59
                    • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00B3ABAE
                    • _wcscmp.LIBCMT ref: 00B3ABEA
                    • GetClassNameW.USER32(?,?,00000400), ref: 00B3AC21
                    • GetDlgCtrlID.USER32(?), ref: 00B3AC73
                    • GetWindowRect.USER32(?,?), ref: 00B3ACA9
                    • GetParent.USER32(?), ref: 00B3ACC7
                    • ScreenToClient.USER32(00000000), ref: 00B3ACCE
                    • GetClassNameW.USER32(?,?,00000100), ref: 00B3AD48
                    • _wcscmp.LIBCMT ref: 00B3AD5C
                    • GetWindowTextW.USER32(?,?,00000400), ref: 00B3AD82
                    • _wcscmp.LIBCMT ref: 00B3AD96
                      • Part of subcall function 00B0386C: _iswctype.LIBCMT ref: 00B03874
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                    • String ID: %s%u
                    • API String ID: 3744389584-679674701
                    • Opcode ID: da807694889e3e5a2d1b8462fc51ac4f061560ec2dbac82221f0f312c5025814
                    • Instruction ID: ba87fbb7e6969cf24e9c3ec05d984fe506d5abcd897384d6bb8609e057401389
                    • Opcode Fuzzy Hash: da807694889e3e5a2d1b8462fc51ac4f061560ec2dbac82221f0f312c5025814
                    • Instruction Fuzzy Hash: C8A1BE71204706ABDB15DF24C884FAABBE8FF04315F3086A9F9D9D2590DB30E955CB92
                    APIs
                    • GetClassNameW.USER32(00000008,?,00000400), ref: 00B3B3DB
                    • _wcscmp.LIBCMT ref: 00B3B3EC
                    • GetWindowTextW.USER32(00000001,?,00000400), ref: 00B3B414
                    • CharUpperBuffW.USER32(?,00000000), ref: 00B3B431
                    • _wcscmp.LIBCMT ref: 00B3B44F
                    • _wcsstr.LIBCMT ref: 00B3B460
                    • GetClassNameW.USER32(00000018,?,00000400), ref: 00B3B498
                    • _wcscmp.LIBCMT ref: 00B3B4A8
                    • GetWindowTextW.USER32(00000002,?,00000400), ref: 00B3B4CF
                    • GetClassNameW.USER32(00000018,?,00000400), ref: 00B3B518
                    • _wcscmp.LIBCMT ref: 00B3B528
                    • GetClassNameW.USER32(00000010,?,00000400), ref: 00B3B550
                    • GetWindowRect.USER32(00000004,?), ref: 00B3B5B9
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                    • String ID: @$ThumbnailClass
                    • API String ID: 1788623398-1539354611
                    • Opcode ID: 55919a106c7a730f449309ef12d25d230c24e7e2828bf066fd433681a0d8b3d7
                    • Instruction ID: 68e59aafb991e8821dfa8619a8bc203b20e63b8d85d8face13cb6f2b063e730d
                    • Opcode Fuzzy Hash: 55919a106c7a730f449309ef12d25d230c24e7e2828bf066fd433681a0d8b3d7
                    • Instruction Fuzzy Hash: B781D1720083069BDB01CF10D885FBABBE8FF54314F2485A9FE898A19ADB34DD45CB61
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: __wcsnicmp
                    • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                    • API String ID: 1038674560-1810252412
                    • Opcode ID: 74d3338586da424d01c639a1f39b4decbf15cd310a25182df6c986b691db0c60
                    • Instruction ID: 02d4e5912970582b536f8bd38e054111ce04c2d2031fc0e8720cf1f700730233
                    • Opcode Fuzzy Hash: 74d3338586da424d01c639a1f39b4decbf15cd310a25182df6c986b691db0c60
                    • Instruction Fuzzy Hash: C631B231A04245A6DF14FAA5DE83EEE7BE8AF14B50F7001BDF511720E6EF616E04C551
                    APIs
                    • LoadIconW.USER32(00000063), ref: 00B3C4D4
                    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00B3C4E6
                    • SetWindowTextW.USER32(?,?), ref: 00B3C4FD
                    • GetDlgItem.USER32(?,000003EA), ref: 00B3C512
                    • SetWindowTextW.USER32(00000000,?), ref: 00B3C518
                    • GetDlgItem.USER32(?,000003E9), ref: 00B3C528
                    • SetWindowTextW.USER32(00000000,?), ref: 00B3C52E
                    • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00B3C54F
                    • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00B3C569
                    • GetWindowRect.USER32(?,?), ref: 00B3C572
                    • SetWindowTextW.USER32(?,?), ref: 00B3C5DD
                    • GetDesktopWindow.USER32 ref: 00B3C5E3
                    • GetWindowRect.USER32(00000000), ref: 00B3C5EA
                    • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 00B3C636
                    • GetClientRect.USER32(?,?), ref: 00B3C643
                    • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 00B3C668
                    • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00B3C693
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                    • String ID:
                    • API String ID: 3869813825-0
                    • Opcode ID: 14867dab4ebcfc9f430fdb71c19f9d6c3826115bb9fd43a4fcc01704e2536ac2
                    • Instruction ID: 9c9aa11256d140f66452fe329becaba77f84520b80a0dad67dc48751b3bb5e22
                    • Opcode Fuzzy Hash: 14867dab4ebcfc9f430fdb71c19f9d6c3826115bb9fd43a4fcc01704e2536ac2
                    • Instruction Fuzzy Hash: BD51717190070AAFDB20DFA8DD86B7EBBF5FF04705F104568E696A35A0CBB4A904CB50
                    APIs
                    • _memset.LIBCMT ref: 00B6A4C8
                    • DestroyWindow.USER32(?,?), ref: 00B6A542
                      • Part of subcall function 00AE7D2C: _memmove.LIBCMT ref: 00AE7D66
                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00B6A5BC
                    • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00B6A5DE
                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00B6A5F1
                    • DestroyWindow.USER32(00000000), ref: 00B6A613
                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00AE0000,00000000), ref: 00B6A64A
                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00B6A663
                    • GetDesktopWindow.USER32 ref: 00B6A67C
                    • GetWindowRect.USER32(00000000), ref: 00B6A683
                    • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00B6A69B
                    • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00B6A6B3
                      • Part of subcall function 00AE25DB: GetWindowLongW.USER32(?,000000EB), ref: 00AE25EC
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                    • String ID: 0$tooltips_class32
                    • API String ID: 1297703922-3619404913
                    • Opcode ID: a104e43c4c627946a5660f0977ef7a610379c813b039bf4b1f53bbf7b22fa7c7
                    • Instruction ID: 69a3ca33d557904a1ab875a821d04385ca68417b06b04a796471e80a55b0525f
                    • Opcode Fuzzy Hash: a104e43c4c627946a5660f0977ef7a610379c813b039bf4b1f53bbf7b22fa7c7
                    • Instruction Fuzzy Hash: EB719A71140245AFDB20CF28DC49F6A7BE9FB89700F08456DF995972A0DBB8E912CF12
                    APIs
                      • Part of subcall function 00AE2612: GetWindowLongW.USER32(?,000000EB), ref: 00AE2623
                    • DragQueryPoint.SHELL32(?,?), ref: 00B6C917
                      • Part of subcall function 00B6ADF1: ClientToScreen.USER32(?,?), ref: 00B6AE1A
                      • Part of subcall function 00B6ADF1: GetWindowRect.USER32(?,?), ref: 00B6AE90
                      • Part of subcall function 00B6ADF1: PtInRect.USER32(?,?,00B6C304), ref: 00B6AEA0
                    • SendMessageW.USER32(?,000000B0,?,?), ref: 00B6C980
                    • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00B6C98B
                    • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00B6C9AE
                    • _wcscat.LIBCMT ref: 00B6C9DE
                    • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00B6C9F5
                    • SendMessageW.USER32(?,000000B0,?,?), ref: 00B6CA0E
                    • SendMessageW.USER32(?,000000B1,?,?), ref: 00B6CA25
                    • SendMessageW.USER32(?,000000B1,?,?), ref: 00B6CA47
                    • DragFinish.SHELL32(?), ref: 00B6CA4E
                    • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00B6CB41
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                    • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                    • API String ID: 169749273-3440237614
                    • Opcode ID: dce65cba674f55959e6321653c1461baa56d057528c7c0bb81011920c7f42d96
                    • Instruction ID: 8f86222eaedc501579f2d4c2aa0083c2736b73200db6206b9f2676d70f6b2f93
                    • Opcode Fuzzy Hash: dce65cba674f55959e6321653c1461baa56d057528c7c0bb81011920c7f42d96
                    • Instruction Fuzzy Hash: 9E619A71108341AFC701DF64DC85DAFBBE8EF89350F000A6EF5A5932A1DB749A09CB62
                    APIs
                    • CharUpperBuffW.USER32(?,?), ref: 00B646AB
                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00B646F6
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: BuffCharMessageSendUpper
                    • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                    • API String ID: 3974292440-4258414348
                    • Opcode ID: cc7939fbf4bf8448b4f7a4a1f7e5a138b5b56b0ac41a767764da31c12bcaa1be
                    • Instruction ID: 751f954c144d0096cee3441800f2bb72c02ea3e158881917321f3d5e074a7199
                    • Opcode Fuzzy Hash: cc7939fbf4bf8448b4f7a4a1f7e5a138b5b56b0ac41a767764da31c12bcaa1be
                    • Instruction Fuzzy Hash: E7918F342047419FCB14EF21C591A6ABBE1EF95354F1448ECF8965B3A2CB34ED4ACB91
                    APIs
                    • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00B6BB6E
                    • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00B69431), ref: 00B6BBCA
                    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00B6BC03
                    • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00B6BC46
                    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00B6BC7D
                    • FreeLibrary.KERNEL32(?), ref: 00B6BC89
                    • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00B6BC99
                    • DestroyIcon.USER32(?,?,?,?,?,00B69431), ref: 00B6BCA8
                    • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00B6BCC5
                    • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00B6BCD1
                      • Part of subcall function 00B0313D: __wcsicmp_l.LIBCMT ref: 00B031C6
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                    • String ID: .dll$.exe$.icl
                    • API String ID: 1212759294-1154884017
                    • Opcode ID: 93aad7d21dcd35898aa2cf59ecb0991d4a32df7d5d2f8ea5ad7728d6a2097096
                    • Instruction ID: a3f45355a94fbc4a872cfbd57e5fe4b306153fffde6a7c849ebf0e9f60b817c9
                    • Opcode Fuzzy Hash: 93aad7d21dcd35898aa2cf59ecb0991d4a32df7d5d2f8ea5ad7728d6a2097096
                    • Instruction Fuzzy Hash: 7A61B071900219BEEB14DF64DC85FBA7BF8FB08710F104195F915D61D1DBB89A90DBA0
                    APIs
                      • Part of subcall function 00AE9997: __itow.LIBCMT ref: 00AE99C2
                      • Part of subcall function 00AE9997: __swprintf.LIBCMT ref: 00AE9A0C
                    • CharLowerBuffW.USER32(?,?), ref: 00B4A636
                    • GetDriveTypeW.KERNEL32 ref: 00B4A683
                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00B4A6CB
                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00B4A702
                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00B4A730
                      • Part of subcall function 00AE7D2C: _memmove.LIBCMT ref: 00AE7D66
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                    • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                    • API String ID: 2698844021-4113822522
                    • Opcode ID: e22872979e9444e100830d84eb9aa7a307b4c0e066abdcf1b526bb5ecdb0a6b6
                    • Instruction ID: 818a88809957b249a698596b7c9a458c1f87015bcf82531534f1fdc55a499d1a
                    • Opcode Fuzzy Hash: e22872979e9444e100830d84eb9aa7a307b4c0e066abdcf1b526bb5ecdb0a6b6
                    • Instruction Fuzzy Hash: BB518C711083459FC700EF25C99186AB7F8FF98758F0449ACF896572A1DB31EE0ACB92
                    APIs
                    • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00B4A47A
                    • __swprintf.LIBCMT ref: 00B4A49C
                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00B4A4D9
                    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00B4A4FE
                    • _memset.LIBCMT ref: 00B4A51D
                    • _wcsncpy.LIBCMT ref: 00B4A559
                    • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00B4A58E
                    • CloseHandle.KERNEL32(00000000), ref: 00B4A599
                    • RemoveDirectoryW.KERNEL32(?), ref: 00B4A5A2
                    • CloseHandle.KERNEL32(00000000), ref: 00B4A5AC
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                    • String ID: :$\$\??\%s
                    • API String ID: 2733774712-3457252023
                    • Opcode ID: 229c3055cd58c54a5984cd9ca2e9489667cacde4b3af807d6b9fba97c5debbda
                    • Instruction ID: 338336a1464624ec881ac45dbb7d0edc07ba2a853f8b144fd10170aa382c1a3d
                    • Opcode Fuzzy Hash: 229c3055cd58c54a5984cd9ca2e9489667cacde4b3af807d6b9fba97c5debbda
                    • Instruction Fuzzy Hash: 87318FB554010AAADB219FA0DC49FAB77BCEF88701F1041F6F908D61A0EBB497448B25
                    APIs
                      • Part of subcall function 00AE2612: GetWindowLongW.USER32(?,000000EB), ref: 00AE2623
                    • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00B6C4EC
                    • GetFocus.USER32 ref: 00B6C4FC
                    • GetDlgCtrlID.USER32(00000000), ref: 00B6C507
                    • _memset.LIBCMT ref: 00B6C632
                    • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00B6C65D
                    • GetMenuItemCount.USER32(?), ref: 00B6C67D
                    • GetMenuItemID.USER32(?,00000000), ref: 00B6C690
                    • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00B6C6C4
                    • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00B6C70C
                    • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00B6C744
                    • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00B6C779
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                    • String ID: 0
                    • API String ID: 1296962147-4108050209
                    • Opcode ID: d657e2bbd859025f766961be90f519f2718eb445fea9cb4a828d6e14cdbe0b09
                    • Instruction ID: 57eaecab4337dca3b08af0d58fb0ae31f99d792c1942269012a548ecd407b430
                    • Opcode Fuzzy Hash: d657e2bbd859025f766961be90f519f2718eb445fea9cb4a828d6e14cdbe0b09
                    • Instruction Fuzzy Hash: A0818D712083019FD710CF24D985A7BBBE8FB98314F1045AEF99697291DB78DD05CBA2
                    APIs
                      • Part of subcall function 00B3874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00B38766
                      • Part of subcall function 00B3874A: GetLastError.KERNEL32(?,00B3822A,?,?,?), ref: 00B38770
                      • Part of subcall function 00B3874A: GetProcessHeap.KERNEL32(00000008,?,?,00B3822A,?,?,?), ref: 00B3877F
                      • Part of subcall function 00B3874A: HeapAlloc.KERNEL32(00000000,?,00B3822A,?,?,?), ref: 00B38786
                      • Part of subcall function 00B3874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00B3879D
                      • Part of subcall function 00B387E7: GetProcessHeap.KERNEL32(00000008,00B38240,00000000,00000000,?,00B38240,?), ref: 00B387F3
                      • Part of subcall function 00B387E7: HeapAlloc.KERNEL32(00000000,?,00B38240,?), ref: 00B387FA
                      • Part of subcall function 00B387E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00B38240,?), ref: 00B3880B
                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00B38458
                    • _memset.LIBCMT ref: 00B3846D
                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00B3848C
                    • GetLengthSid.ADVAPI32(?), ref: 00B3849D
                    • GetAce.ADVAPI32(?,00000000,?), ref: 00B384DA
                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00B384F6
                    • GetLengthSid.ADVAPI32(?), ref: 00B38513
                    • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00B38522
                    • HeapAlloc.KERNEL32(00000000), ref: 00B38529
                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00B3854A
                    • CopySid.ADVAPI32(00000000), ref: 00B38551
                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00B38582
                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00B385A8
                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00B385BC
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                    • String ID:
                    • API String ID: 3996160137-0
                    • Opcode ID: 51ced4be23ec7c33e7195457788d5e83b2fe60b6a1653e0a471e782c9487fe1d
                    • Instruction ID: 46d01044c4688ec94a68d460ea3c8e420f53af304216ac5867fece7dca92be30
                    • Opcode Fuzzy Hash: 51ced4be23ec7c33e7195457788d5e83b2fe60b6a1653e0a471e782c9487fe1d
                    • Instruction Fuzzy Hash: 6C61567190020AEBDF01DFA5EC45AAEBBB9FF04300F2481A9F915A7291DF759A04CF61
                    APIs
                    • GetDC.USER32(00000000), ref: 00B576A2
                    • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00B576AE
                    • CreateCompatibleDC.GDI32(?), ref: 00B576BA
                    • SelectObject.GDI32(00000000,?), ref: 00B576C7
                    • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00B5771B
                    • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00B57757
                    • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00B5777B
                    • SelectObject.GDI32(00000006,?), ref: 00B57783
                    • DeleteObject.GDI32(?), ref: 00B5778C
                    • DeleteDC.GDI32(00000006), ref: 00B57793
                    • ReleaseDC.USER32(00000000,?), ref: 00B5779E
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                    • String ID: (
                    • API String ID: 2598888154-3887548279
                    • Opcode ID: 69653a7d9b52dd96421237be287d6e51f7c80149569917b4b376ba1b9f2eb7c5
                    • Instruction ID: 653d1bf1a5bd82e94d5c7927714e1fb737aa8e8e0151a0b487a822548d6d3e06
                    • Opcode Fuzzy Hash: 69653a7d9b52dd96421237be287d6e51f7c80149569917b4b376ba1b9f2eb7c5
                    • Instruction Fuzzy Hash: 87515875A04209EFCB15CFA8EC84EAEBBF9EF48310F148469E94997250DA75A844CB60
                    APIs
                    • LoadStringW.USER32(00000066,?,00000FFF,00B6FB78), ref: 00B4A0FC
                      • Part of subcall function 00AE7F41: _memmove.LIBCMT ref: 00AE7F82
                    • LoadStringW.USER32(?,?,00000FFF,?), ref: 00B4A11E
                    • __swprintf.LIBCMT ref: 00B4A177
                    • __swprintf.LIBCMT ref: 00B4A190
                    • _wprintf.LIBCMT ref: 00B4A246
                    • _wprintf.LIBCMT ref: 00B4A264
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: LoadString__swprintf_wprintf$_memmove
                    • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                    • API String ID: 311963372-2391861430
                    • Opcode ID: 7cb317d390add04e33e9bb5f5faf510ab26f4192a894ad8551b2f61cab498ffb
                    • Instruction ID: 93d2acd1e97d0a1290eed03e0407528e003b5790a00cb6fbee6d9733262ca7ad
                    • Opcode Fuzzy Hash: 7cb317d390add04e33e9bb5f5faf510ab26f4192a894ad8551b2f61cab498ffb
                    • Instruction Fuzzy Hash: FA518D7190024AAACF15EBE0CE86EEEB7B8EF04300F2441A5F505730A1EB716F58DB61
                    APIs
                      • Part of subcall function 00B00B9B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00AE6C6C,?,00008000), ref: 00B00BB7
                      • Part of subcall function 00AE48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00AE48A1,?,?,00AE37C0,?), ref: 00AE48CE
                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00AE6D0D
                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00AE6E5A
                      • Part of subcall function 00AE59CD: _wcscpy.LIBCMT ref: 00AE5A05
                      • Part of subcall function 00B0387D: _iswctype.LIBCMT ref: 00B03885
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                    • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                    • API String ID: 537147316-1018226102
                    • Opcode ID: c42ea096436d6bb794ef8d75990f7cd5c5523b842bcd46ac3e919d64aa5ca219
                    • Instruction ID: 3308e4a40d3f0e281909afb88885722cd6bec210d5db53f0a28ecc8fc415ca11
                    • Opcode Fuzzy Hash: c42ea096436d6bb794ef8d75990f7cd5c5523b842bcd46ac3e919d64aa5ca219
                    • Instruction Fuzzy Hash: 9F02CE305083819FC724EF25C981AAFBBE5FF98354F54096DF896972A1DB30D989CB42
                    APIs
                    • _memset.LIBCMT ref: 00AE45F9
                    • GetMenuItemCount.USER32(00BA6890), ref: 00B1D7CD
                    • GetMenuItemCount.USER32(00BA6890), ref: 00B1D87D
                    • GetCursorPos.USER32(?), ref: 00B1D8C1
                    • SetForegroundWindow.USER32(00000000), ref: 00B1D8CA
                    • TrackPopupMenuEx.USER32(00BA6890,00000000,?,00000000,00000000,00000000), ref: 00B1D8DD
                    • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00B1D8E9
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                    • String ID:
                    • API String ID: 2751501086-0
                    • Opcode ID: 9666ebae6ad38066ad1cd6f0987f182c17d513dcbe86f0112bfdbc522cd056ed
                    • Instruction ID: af318184815dcbb1c065a4341543fcbb0540924e9d6dc209e9ddbf1c36333128
                    • Opcode Fuzzy Hash: 9666ebae6ad38066ad1cd6f0987f182c17d513dcbe86f0112bfdbc522cd056ed
                    • Instruction Fuzzy Hash: B5712570600246BEEB219F15DC89FEABFA8FF05368F200256F515A61E0CBB15C50DB94
                    APIs
                    • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B60038,?,?), ref: 00B610BC
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: BuffCharUpper
                    • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                    • API String ID: 3964851224-909552448
                    • Opcode ID: 54e89b3379a147e83966a4ce23a40bf368874393d2e3174ac493a53353d6c177
                    • Instruction ID: 28701e910e88c46e48df02b0017a4dacc803137b489462ad2d6292fe720971ef
                    • Opcode Fuzzy Hash: 54e89b3379a147e83966a4ce23a40bf368874393d2e3174ac493a53353d6c177
                    • Instruction Fuzzy Hash: DE41713112424A9BCF10EF94ED91AEE37A4FF26340F1449E4FD916B291DB34AD1AC760
                    APIs
                      • Part of subcall function 00AE7D2C: _memmove.LIBCMT ref: 00AE7D66
                      • Part of subcall function 00AE7A84: _memmove.LIBCMT ref: 00AE7B0D
                    • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00B455D2
                    • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00B455E8
                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00B455F9
                    • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00B4560B
                    • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00B4561C
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: SendString$_memmove
                    • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                    • API String ID: 2279737902-1007645807
                    • Opcode ID: 3c80cf7854d7d8bfaf18c691972dc0990deeb5fbc49981e2755a4fc64ebd93be
                    • Instruction ID: 50cc65b741b8e860920af01639df4eb03b5253a27f087f50f771e1a26f09f482
                    • Opcode Fuzzy Hash: 3c80cf7854d7d8bfaf18c691972dc0990deeb5fbc49981e2755a4fc64ebd93be
                    • Instruction Fuzzy Hash: E51194209545A97ADB20B762DC9ADFF7BBCEF95B40F4004B9B405A30E2DEA01E05C5E5
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                    • String ID: 0.0.0.0
                    • API String ID: 208665112-3771769585
                    • Opcode ID: d41a93fbc553ceec9a2f0e5aab85d97d04e9bb6c28275970c516633c5269ecbf
                    • Instruction ID: f37ff7adc84fc1bcb85005cedd764d7119def1df17f1cb0e3170b3e43feb0dd5
                    • Opcode Fuzzy Hash: d41a93fbc553ceec9a2f0e5aab85d97d04e9bb6c28275970c516633c5269ecbf
                    • Instruction Fuzzy Hash: CC11C03190811AAFCB24EB24AC4AEEB7BECDF40710F0401F6F444970E1EFB49A95A661
                    APIs
                    • timeGetTime.WINMM ref: 00B4521C
                      • Part of subcall function 00B00719: timeGetTime.WINMM(?,75A8B400,00AF0FF9), ref: 00B0071D
                    • Sleep.KERNEL32(0000000A), ref: 00B45248
                    • EnumThreadWindows.USER32(?,Function_000651CA,00000000), ref: 00B4526C
                    • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00B4528E
                    • SetActiveWindow.USER32 ref: 00B452AD
                    • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00B452BB
                    • SendMessageW.USER32(00000010,00000000,00000000), ref: 00B452DA
                    • Sleep.KERNEL32(000000FA), ref: 00B452E5
                    • IsWindow.USER32 ref: 00B452F1
                    • EndDialog.USER32(00000000), ref: 00B45302
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                    • String ID: BUTTON
                    • API String ID: 1194449130-3405671355
                    • Opcode ID: 6a998c0f9dc22bf505fbb3e10dc519cd9820e3583e9f36c5ca3239ad02751971
                    • Instruction ID: a91486e7c81705cc70ae12d283394822186429201837430edf9477308625ae86
                    • Opcode Fuzzy Hash: 6a998c0f9dc22bf505fbb3e10dc519cd9820e3583e9f36c5ca3239ad02751971
                    • Instruction Fuzzy Hash: 9A218370148B05AFE7116F60FC9AB353BA9E756786B0414AAF102931B2CFA55E00EA71
                    APIs
                      • Part of subcall function 00AE9997: __itow.LIBCMT ref: 00AE99C2
                      • Part of subcall function 00AE9997: __swprintf.LIBCMT ref: 00AE9A0C
                    • CoInitialize.OLE32(00000000), ref: 00B4D855
                    • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00B4D8E8
                    • SHGetDesktopFolder.SHELL32(?), ref: 00B4D8FC
                    • CoCreateInstance.OLE32(00B72D7C,00000000,00000001,00B9A89C,?), ref: 00B4D948
                    • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00B4D9B7
                    • CoTaskMemFree.OLE32(?,?), ref: 00B4DA0F
                    • _memset.LIBCMT ref: 00B4DA4C
                    • SHBrowseForFolderW.SHELL32(?), ref: 00B4DA88
                    • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00B4DAAB
                    • CoTaskMemFree.OLE32(00000000), ref: 00B4DAB2
                    • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00B4DAE9
                    • CoUninitialize.OLE32(00000001,00000000), ref: 00B4DAEB
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                    • String ID:
                    • API String ID: 1246142700-0
                    • Opcode ID: 2ade974b1918976fb07034cebd10bdb016dadaaa0a1f16bdb6f80a5acf1ce111
                    • Instruction ID: f6ecca836456891bdc2a39ae10761f833640101d63baeb350e5ad03f14243176
                    • Opcode Fuzzy Hash: 2ade974b1918976fb07034cebd10bdb016dadaaa0a1f16bdb6f80a5acf1ce111
                    • Instruction Fuzzy Hash: 59B1FE75A00209AFDB04DFA5D988DAEBBF9FF48314B1484A9F505EB261DB30EE45CB50
                    APIs
                    • GetKeyboardState.USER32(?), ref: 00B405A7
                    • SetKeyboardState.USER32(?), ref: 00B40612
                    • GetAsyncKeyState.USER32(000000A0), ref: 00B40632
                    • GetKeyState.USER32(000000A0), ref: 00B40649
                    • GetAsyncKeyState.USER32(000000A1), ref: 00B40678
                    • GetKeyState.USER32(000000A1), ref: 00B40689
                    • GetAsyncKeyState.USER32(00000011), ref: 00B406B5
                    • GetKeyState.USER32(00000011), ref: 00B406C3
                    • GetAsyncKeyState.USER32(00000012), ref: 00B406EC
                    • GetKeyState.USER32(00000012), ref: 00B406FA
                    • GetAsyncKeyState.USER32(0000005B), ref: 00B40723
                    • GetKeyState.USER32(0000005B), ref: 00B40731
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: State$Async$Keyboard
                    • String ID:
                    • API String ID: 541375521-0
                    • Opcode ID: ecc64ad2e6ebac8b6c75e32ad51054945f90eeff9b5faefc797b03095e703e92
                    • Instruction ID: e7e160d154fab40a80b644e17d48237f469da4407c1e15070ff2a1a1f512500d
                    • Opcode Fuzzy Hash: ecc64ad2e6ebac8b6c75e32ad51054945f90eeff9b5faefc797b03095e703e92
                    • Instruction Fuzzy Hash: 2D51C820A1478429FB35FBA484557EABFF4DF11380F0849D9DAC2571C2DA749B8CDB52
                    APIs
                    • GetDlgItem.USER32(?,00000001), ref: 00B3C746
                    • GetWindowRect.USER32(00000000,?), ref: 00B3C758
                    • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00B3C7B6
                    • GetDlgItem.USER32(?,00000002), ref: 00B3C7C1
                    • GetWindowRect.USER32(00000000,?), ref: 00B3C7D3
                    • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00B3C827
                    • GetDlgItem.USER32(?,000003E9), ref: 00B3C835
                    • GetWindowRect.USER32(00000000,?), ref: 00B3C846
                    • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00B3C889
                    • GetDlgItem.USER32(?,000003EA), ref: 00B3C897
                    • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00B3C8B4
                    • InvalidateRect.USER32(?,00000000,00000001), ref: 00B3C8C1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Window$ItemMoveRect$Invalidate
                    • String ID:
                    • API String ID: 3096461208-0
                    • Opcode ID: 213338ef6574a00a078333bb4607fe979fb7d5cc3f670e4187f68ecf403e24ec
                    • Instruction ID: bcf73902404cf128f15af1099a18760003c45e8da87314323ea170e8d54d29f1
                    • Opcode Fuzzy Hash: 213338ef6574a00a078333bb4607fe979fb7d5cc3f670e4187f68ecf403e24ec
                    • Instruction Fuzzy Hash: BD512171B00205ABDB18CFA9DD95ABEBBB6EB88311F14816DF515E72D0DBB49D00CB50
                    APIs
                      • Part of subcall function 00AE1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00AE2036,?,00000000,?,?,?,?,00AE16CB,00000000,?), ref: 00AE1B9A
                    • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00AE20D3
                    • KillTimer.USER32(-00000001,?,?,?,?,00AE16CB,00000000,?,?,00AE1AE2,?,?), ref: 00AE216E
                    • DestroyAcceleratorTable.USER32(00000000), ref: 00B1BEF6
                    • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00AE16CB,00000000,?,?,00AE1AE2,?,?), ref: 00B1BF27
                    • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00AE16CB,00000000,?,?,00AE1AE2,?,?), ref: 00B1BF3E
                    • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00AE16CB,00000000,?,?,00AE1AE2,?,?), ref: 00B1BF5A
                    • DeleteObject.GDI32(00000000), ref: 00B1BF6C
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                    • String ID:
                    • API String ID: 641708696-0
                    • Opcode ID: e0b229ad26ab8420dafbb8bd457aecf3e9c9e4bfb5606539f7fa91839f419572
                    • Instruction ID: cf6576b44f666b0040690a3d0dec25d4f0776f98ef13c1511eb5084e8d8b294f
                    • Opcode Fuzzy Hash: e0b229ad26ab8420dafbb8bd457aecf3e9c9e4bfb5606539f7fa91839f419572
                    • Instruction Fuzzy Hash: A661BA71100691DFCB359F16DD49B3AB7F9FB41312F54856AE442879A0CB79AC81CF80
                    APIs
                      • Part of subcall function 00AE25DB: GetWindowLongW.USER32(?,000000EB), ref: 00AE25EC
                    • GetSysColor.USER32(0000000F), ref: 00AE21D3
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ColorLongWindow
                    • String ID:
                    • API String ID: 259745315-0
                    • Opcode ID: 80cbfb4ed55bc054f2e5389cf931b59e3f847ee7d8612d55e4087704c710e22a
                    • Instruction ID: bb35bccfe8f7c326be2e4222836dbfef6c9347c8143f9d30248c2b178e726613
                    • Opcode Fuzzy Hash: 80cbfb4ed55bc054f2e5389cf931b59e3f847ee7d8612d55e4087704c710e22a
                    • Instruction Fuzzy Hash: B041B531040180AFDB255F29EC48BF93BA9FB06331F184265FE659B1E6CB758D82DB21
                    APIs
                    • CharLowerBuffW.USER32(?,?,00B6F910), ref: 00B4AB76
                    • GetDriveTypeW.KERNEL32(00000061,00B9A620,00000061), ref: 00B4AC40
                    • _wcscpy.LIBCMT ref: 00B4AC6A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: BuffCharDriveLowerType_wcscpy
                    • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                    • API String ID: 2820617543-1000479233
                    • Opcode ID: 4f6b454c9f2b379459a61df5ffb8fc1f9b23dc0f1661f914defd3fcca607a769
                    • Instruction ID: daee007eb659ddb083db78ffc9f7b3870d7b7ee035a7a8d6803a42c5d7e98eba
                    • Opcode Fuzzy Hash: 4f6b454c9f2b379459a61df5ffb8fc1f9b23dc0f1661f914defd3fcca607a769
                    • Instruction Fuzzy Hash: 5251AC31158341ABC710EF14C991AAEBBE5EF94300F5048ADF886972E2DB319E09DA53
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: __i64tow__itow__swprintf
                    • String ID: %.15g$0x%p$False$True
                    • API String ID: 421087845-2263619337
                    • Opcode ID: 3fc2b7ce6ebddb19a75afa7ec0792b5f2b2ac865bf6122be135c6c4266027c0b
                    • Instruction ID: 8c932cc3d6ed69352457dd72033b429f685d0f6dcc50a4a19b91967dfb12c05b
                    • Opcode Fuzzy Hash: 3fc2b7ce6ebddb19a75afa7ec0792b5f2b2ac865bf6122be135c6c4266027c0b
                    • Instruction Fuzzy Hash: 6741BF71604306AADB24AB39D842FBBB7F8EF44340F2044EEE549D72A2EA71D941DB11
                    APIs
                    • _memset.LIBCMT ref: 00B673D9
                    • CreateMenu.USER32 ref: 00B673F4
                    • SetMenu.USER32(?,00000000), ref: 00B67403
                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B67490
                    • IsMenu.USER32(?), ref: 00B674A6
                    • CreatePopupMenu.USER32 ref: 00B674B0
                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00B674DD
                    • DrawMenuBar.USER32 ref: 00B674E5
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                    • String ID: 0$F
                    • API String ID: 176399719-3044882817
                    • Opcode ID: 21d9206e9d4d278839f9300b2d95a147a8d0d3ae56d84c936d814c11999a627d
                    • Instruction ID: 8a646726804c1eea7e8736a42d92e313243918852d337978b71ff9c1d96e19f5
                    • Opcode Fuzzy Hash: 21d9206e9d4d278839f9300b2d95a147a8d0d3ae56d84c936d814c11999a627d
                    • Instruction Fuzzy Hash: FB414975A01205EFDB10DF64E888AAABBF9FF49304F144069E956973A0DF78AD10CF90
                    APIs
                    • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00B677CD
                    • CreateCompatibleDC.GDI32(00000000), ref: 00B677D4
                    • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00B677E7
                    • SelectObject.GDI32(00000000,00000000), ref: 00B677EF
                    • GetPixel.GDI32(00000000,00000000,00000000), ref: 00B677FA
                    • DeleteDC.GDI32(00000000), ref: 00B67803
                    • GetWindowLongW.USER32(?,000000EC), ref: 00B6780D
                    • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00B67821
                    • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00B6782D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                    • String ID: static
                    • API String ID: 2559357485-2160076837
                    • Opcode ID: 81d24ebab09ca7821eb84640d9ac6565c62c189144a4c5d85018cd4f1f97f961
                    • Instruction ID: 7754f68c5ce90e36181e2563076b71b89422b710866294133562feb326554bf4
                    • Opcode Fuzzy Hash: 81d24ebab09ca7821eb84640d9ac6565c62c189144a4c5d85018cd4f1f97f961
                    • Instruction Fuzzy Hash: 22318F31104115ABDF119FA5EC09FEA3BA9FF09325F100264FA15A70E0CB79DC11DBA4
                    APIs
                    • _memset.LIBCMT ref: 00B0707B
                      • Part of subcall function 00B08D68: __getptd_noexit.LIBCMT ref: 00B08D68
                    • __gmtime64_s.LIBCMT ref: 00B07114
                    • __gmtime64_s.LIBCMT ref: 00B0714A
                    • __gmtime64_s.LIBCMT ref: 00B07167
                    • __allrem.LIBCMT ref: 00B071BD
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B071D9
                    • __allrem.LIBCMT ref: 00B071F0
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B0720E
                    • __allrem.LIBCMT ref: 00B07225
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B07243
                    • __invoke_watson.LIBCMT ref: 00B072B4
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                    • String ID:
                    • API String ID: 384356119-0
                    • Opcode ID: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                    • Instruction ID: 2d08b8fb1f3e5f13dd67d2a5474c1b4fe1b1afe46fafb23360c0ddd991bc59ff
                    • Opcode Fuzzy Hash: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                    • Instruction Fuzzy Hash: B671C371E44716ABE7149E79CC81B9AFBE8EF11720F1442BAF414E62C1FB70EA408790
                    APIs
                    • _memset.LIBCMT ref: 00B42A31
                    • GetMenuItemInfoW.USER32(00BA6890,000000FF,00000000,00000030), ref: 00B42A92
                    • SetMenuItemInfoW.USER32(00BA6890,00000004,00000000,00000030), ref: 00B42AC8
                    • Sleep.KERNEL32(000001F4), ref: 00B42ADA
                    • GetMenuItemCount.USER32(?), ref: 00B42B1E
                    • GetMenuItemID.USER32(?,00000000), ref: 00B42B3A
                    • GetMenuItemID.USER32(?,-00000001), ref: 00B42B64
                    • GetMenuItemID.USER32(?,?), ref: 00B42BA9
                    • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00B42BEF
                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B42C03
                    • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B42C24
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                    • String ID:
                    • API String ID: 4176008265-0
                    • Opcode ID: 2b609247ff403adaa76cb81eab6dba506408cb648e0829ca0b6509f502d12fb9
                    • Instruction ID: a3c104eb4a0a29a3c607e3169276d8c03a6d933b777cd0383b7b78ecbb04aff8
                    • Opcode Fuzzy Hash: 2b609247ff403adaa76cb81eab6dba506408cb648e0829ca0b6509f502d12fb9
                    • Instruction Fuzzy Hash: 7B6190B0900249AFDF11CF64D888EBEBBF8EB45304F940599F84297291DB71AE45FB21
                    APIs
                    • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00B67214
                    • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00B67217
                    • GetWindowLongW.USER32(?,000000F0), ref: 00B6723B
                    • _memset.LIBCMT ref: 00B6724C
                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00B6725E
                    • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00B672D6
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: MessageSend$LongWindow_memset
                    • String ID:
                    • API String ID: 830647256-0
                    • Opcode ID: 1c1fbc664f641ce628ece3526af70b5ff0eb6d09db9b958f2fa179cca404ad31
                    • Instruction ID: 5cc27b43e204afa7ff088ce1595a565c6a4136ecebdddeb15c38ba2cc7211910
                    • Opcode Fuzzy Hash: 1c1fbc664f641ce628ece3526af70b5ff0eb6d09db9b958f2fa179cca404ad31
                    • Instruction Fuzzy Hash: FF616C71940208AFDB10DFA4CC81EEE77F8EB09714F14019AFA15A73A1DB74AD45DB64
                    APIs
                    • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00B37135
                    • SafeArrayAllocData.OLEAUT32(?), ref: 00B3718E
                    • VariantInit.OLEAUT32(?), ref: 00B371A0
                    • SafeArrayAccessData.OLEAUT32(?,?), ref: 00B371C0
                    • VariantCopy.OLEAUT32(?,?), ref: 00B37213
                    • SafeArrayUnaccessData.OLEAUT32(?), ref: 00B37227
                    • VariantClear.OLEAUT32(?), ref: 00B3723C
                    • SafeArrayDestroyData.OLEAUT32(?), ref: 00B37249
                    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00B37252
                    • VariantClear.OLEAUT32(?), ref: 00B37264
                    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00B3726F
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                    • String ID:
                    • API String ID: 2706829360-0
                    • Opcode ID: ec9e3b5b6544bdbdd28552c91380fa8043dedd9f669e9ce8bc0a03edde5876e2
                    • Instruction ID: 8aca950f4c1f54d635a97b02a0471b03e3fdc71195c1a45848368d93c3166602
                    • Opcode Fuzzy Hash: ec9e3b5b6544bdbdd28552c91380fa8043dedd9f669e9ce8bc0a03edde5876e2
                    • Instruction Fuzzy Hash: A3413A75A04219AFCF10DFA8DC489AEBBF8FF08354F1080A9E915A7361CF74A945CB90
                    APIs
                    • WSAStartup.WSOCK32(00000101,?), ref: 00B55AA6
                    • inet_addr.WSOCK32(?,?,?), ref: 00B55AEB
                    • gethostbyname.WSOCK32(?), ref: 00B55AF7
                    • IcmpCreateFile.IPHLPAPI ref: 00B55B05
                    • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00B55B75
                    • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00B55B8B
                    • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00B55C00
                    • WSACleanup.WSOCK32 ref: 00B55C06
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                    • String ID: Ping
                    • API String ID: 1028309954-2246546115
                    • Opcode ID: 789a1f9d22b346fa2793fae97362ea5e4bed288a805bf257ea279329fb185ec9
                    • Instruction ID: 6330e6ca962c0754dbfd29f397981d5b0b80a9a0ca0bd34011897b33687fee52
                    • Opcode Fuzzy Hash: 789a1f9d22b346fa2793fae97362ea5e4bed288a805bf257ea279329fb185ec9
                    • Instruction Fuzzy Hash: E151AF716047019FDB20AF25DD99B2AB7E4EF48312F1489AAF955DB2E1DB70EC04CB42
                    APIs
                    • SetErrorMode.KERNEL32(00000001), ref: 00B4B73B
                    • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00B4B7B1
                    • GetLastError.KERNEL32 ref: 00B4B7BB
                    • SetErrorMode.KERNEL32(00000000,READY), ref: 00B4B828
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Error$Mode$DiskFreeLastSpace
                    • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                    • API String ID: 4194297153-14809454
                    • Opcode ID: 3791b2b36c197d803c4a8f06acc6322fe2e563f223558b31db03245004e98e22
                    • Instruction ID: 2bc3cab7442b5a25a983484f1c325c29dccfcffe594098f1f8ff1dcddc27aa03
                    • Opcode Fuzzy Hash: 3791b2b36c197d803c4a8f06acc6322fe2e563f223558b31db03245004e98e22
                    • Instruction Fuzzy Hash: 73316135A00205AFDB10EF64D885EBE7BF8EF45740F1480A9E602E7291DB71DE42DB91
                    APIs
                      • Part of subcall function 00AE7F41: _memmove.LIBCMT ref: 00AE7F82
                      • Part of subcall function 00B3B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00B3B0E7
                    • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00B394F6
                    • GetDlgCtrlID.USER32 ref: 00B39501
                    • GetParent.USER32 ref: 00B3951D
                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 00B39520
                    • GetDlgCtrlID.USER32(?), ref: 00B39529
                    • GetParent.USER32(?), ref: 00B39545
                    • SendMessageW.USER32(00000000,?,?,00000111), ref: 00B39548
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: MessageSend$CtrlParent$ClassName_memmove
                    • String ID: ComboBox$ListBox
                    • API String ID: 1536045017-1403004172
                    • Opcode ID: bcfb8bd1efa11de204282f4f014908980ab31758dac0b0136ccd3677426d66b5
                    • Instruction ID: 3271bb3d107999d3e068c8db6e6caef28fcaa914712d19893b5e4ae19fec9ae3
                    • Opcode Fuzzy Hash: bcfb8bd1efa11de204282f4f014908980ab31758dac0b0136ccd3677426d66b5
                    • Instruction Fuzzy Hash: 6621C470D00204BBCF05AB65DC85DFEBBB8EF59300F204169F562972E1DBB95919DB20
                    APIs
                      • Part of subcall function 00AE7F41: _memmove.LIBCMT ref: 00AE7F82
                      • Part of subcall function 00B3B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00B3B0E7
                    • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00B395DF
                    • GetDlgCtrlID.USER32 ref: 00B395EA
                    • GetParent.USER32 ref: 00B39606
                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 00B39609
                    • GetDlgCtrlID.USER32(?), ref: 00B39612
                    • GetParent.USER32(?), ref: 00B3962E
                    • SendMessageW.USER32(00000000,?,?,00000111), ref: 00B39631
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: MessageSend$CtrlParent$ClassName_memmove
                    • String ID: ComboBox$ListBox
                    • API String ID: 1536045017-1403004172
                    • Opcode ID: c8a8dde02e6e452e1efe39f4d1399b2a7f4679a3f2f09aa301415fa7d7fba7f3
                    • Instruction ID: 3e7958647671e159eab07448b0cdbd3fa72852cbf46f2c9b09109e6c5878813d
                    • Opcode Fuzzy Hash: c8a8dde02e6e452e1efe39f4d1399b2a7f4679a3f2f09aa301415fa7d7fba7f3
                    • Instruction Fuzzy Hash: 9221C574900205BBDF05AB65DCC5EFEBBB8EF58300F204069F921971E1DBB99919DB20
                    APIs
                    • GetParent.USER32 ref: 00B39651
                    • GetClassNameW.USER32(00000000,?,00000100), ref: 00B39666
                    • _wcscmp.LIBCMT ref: 00B39678
                    • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00B396F3
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ClassMessageNameParentSend_wcscmp
                    • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                    • API String ID: 1704125052-3381328864
                    • Opcode ID: 4925aeefe1823fe66f6b17ae0ad526b89a4c67b52bad631866ba73e425131499
                    • Instruction ID: 2bbb02cfa7628cca767e52876f882f70a322339fc196858785b462964be08966
                    • Opcode Fuzzy Hash: 4925aeefe1823fe66f6b17ae0ad526b89a4c67b52bad631866ba73e425131499
                    • Instruction Fuzzy Hash: AA112C77649307BAFB012625EC0BDA777DCDB14760F3000EAF910A50E1FEE159108558
                    APIs
                    • VariantInit.OLEAUT32(?), ref: 00B58BEC
                    • CoInitialize.OLE32(00000000), ref: 00B58C19
                    • CoUninitialize.OLE32 ref: 00B58C23
                    • GetRunningObjectTable.OLE32(00000000,?), ref: 00B58D23
                    • SetErrorMode.KERNEL32(00000001,00000029), ref: 00B58E50
                    • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00B72C0C), ref: 00B58E84
                    • CoGetObject.OLE32(?,00000000,00B72C0C,?), ref: 00B58EA7
                    • SetErrorMode.KERNEL32(00000000), ref: 00B58EBA
                    • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00B58F3A
                    • VariantClear.OLEAUT32(?), ref: 00B58F4A
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                    • String ID:
                    • API String ID: 2395222682-0
                    • Opcode ID: 866a19b2a6435ae53183869a632886328bbfbaf6d8845b1560c111e6de56f5e2
                    • Instruction ID: 0648bf89e70674090180e444b386784dcb40a5fb50870be6f6cb0012b3e3e52f
                    • Opcode Fuzzy Hash: 866a19b2a6435ae53183869a632886328bbfbaf6d8845b1560c111e6de56f5e2
                    • Instruction Fuzzy Hash: 3EC11771204305AFD700DF64C884A2BB7E9FF89749F1049ADF98A9B261DB71ED09CB52
                    APIs
                    • __swprintf.LIBCMT ref: 00B4419D
                    • __swprintf.LIBCMT ref: 00B441AA
                      • Part of subcall function 00B038D8: __woutput_l.LIBCMT ref: 00B03931
                    • FindResourceW.KERNEL32(?,?,0000000E), ref: 00B441D4
                    • LoadResource.KERNEL32(?,00000000), ref: 00B441E0
                    • LockResource.KERNEL32(00000000), ref: 00B441ED
                    • FindResourceW.KERNEL32(?,?,00000003), ref: 00B4420D
                    • LoadResource.KERNEL32(?,00000000), ref: 00B4421F
                    • SizeofResource.KERNEL32(?,00000000), ref: 00B4422E
                    • LockResource.KERNEL32(?), ref: 00B4423A
                    • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 00B4429B
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                    • String ID:
                    • API String ID: 1433390588-0
                    • Opcode ID: bcca8881ebc26e56972e954b4cd87e0b81ad431f099af7cb4fdbfe46c4ef721c
                    • Instruction ID: 259aa2c4e1eec2f068d4a428eb9f5bc6330df2dc568a448962fb38e59e642844
                    • Opcode Fuzzy Hash: bcca8881ebc26e56972e954b4cd87e0b81ad431f099af7cb4fdbfe46c4ef721c
                    • Instruction Fuzzy Hash: C031A072A0521AAFCB119F60EC59EBB7BECFF05301F004565F901E3190DBB4DA619BA0
                    APIs
                    • GetCurrentThreadId.KERNEL32 ref: 00B41700
                    • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00B40778,?,00000001), ref: 00B41714
                    • GetWindowThreadProcessId.USER32(00000000), ref: 00B4171B
                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00B40778,?,00000001), ref: 00B4172A
                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 00B4173C
                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00B40778,?,00000001), ref: 00B41755
                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00B40778,?,00000001), ref: 00B41767
                    • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00B40778,?,00000001), ref: 00B417AC
                    • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00B40778,?,00000001), ref: 00B417C1
                    • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00B40778,?,00000001), ref: 00B417CC
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                    • String ID:
                    • API String ID: 2156557900-0
                    • Opcode ID: 94460e97431490c94ee3f01f4a86054edc98a3c47778cc334811b951e6734a89
                    • Instruction ID: f199669c8bd72421dc2e2a0293fcf19dc2550511e92858e67a3a2fa68e30765a
                    • Opcode Fuzzy Hash: 94460e97431490c94ee3f01f4a86054edc98a3c47778cc334811b951e6734a89
                    • Instruction Fuzzy Hash: 5331BFB5A48204BFEB119F58ED85B793BE9EB16711F1044A4F800C72A0EFB59F81DB61
                    APIs
                    • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00AEFC06
                    • OleUninitialize.OLE32(?,00000000), ref: 00AEFCA5
                    • UnregisterHotKey.USER32(?), ref: 00AEFDFC
                    • DestroyWindow.USER32(?), ref: 00B24A00
                    • FreeLibrary.KERNEL32(?), ref: 00B24A65
                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00B24A92
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                    • String ID: close all
                    • API String ID: 469580280-3243417748
                    • Opcode ID: 089af7e0f1c02d5765923c949cb4b1e88973a63b3a33e347d2274cb7a2287f2c
                    • Instruction ID: a716b0f17b651941eab2591e19217cb17ab0ce0c90700dba2ba3bb470d1db536
                    • Opcode Fuzzy Hash: 089af7e0f1c02d5765923c949cb4b1e88973a63b3a33e347d2274cb7a2287f2c
                    • Instruction Fuzzy Hash: 4FA18C30701222CFCB28EF15D998B69F7A4EF05700F2442EDE90AAB261DB30AD16CF54
                    APIs
                    • EnumChildWindows.USER32(?,00B3AA64), ref: 00B3A9A2
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ChildEnumWindows
                    • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                    • API String ID: 3555792229-1603158881
                    • Opcode ID: 6cd5b87ad62fab03afad84444a66cc1d415f4a6d5e22128a1b95c250414d53ad
                    • Instruction ID: 3bef1985756c6d1d735e95333349140b2587371b683c36f483e28b77ba9ba63a
                    • Opcode Fuzzy Hash: 6cd5b87ad62fab03afad84444a66cc1d415f4a6d5e22128a1b95c250414d53ad
                    • Instruction Fuzzy Hash: F4917331900646EADB18DF64C481BE9FBF4FF14344F3482A9D8DAA7191DF306959CBA1
                    APIs
                    • SetWindowLongW.USER32(?,000000EB), ref: 00AE2EAE
                      • Part of subcall function 00AE1DB3: GetClientRect.USER32(?,?), ref: 00AE1DDC
                      • Part of subcall function 00AE1DB3: GetWindowRect.USER32(?,?), ref: 00AE1E1D
                      • Part of subcall function 00AE1DB3: ScreenToClient.USER32(?,?), ref: 00AE1E45
                    • GetDC.USER32 ref: 00B1CF82
                    • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00B1CF95
                    • SelectObject.GDI32(00000000,00000000), ref: 00B1CFA3
                    • SelectObject.GDI32(00000000,00000000), ref: 00B1CFB8
                    • ReleaseDC.USER32(?,00000000), ref: 00B1CFC0
                    • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00B1D04B
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                    • String ID: U
                    • API String ID: 4009187628-3372436214
                    • Opcode ID: 0948b0dc8cf51a52a09d1a66258e012b95f3e10264db5a487af17d13b2081ecd
                    • Instruction ID: 6d2b970dc981136ca20d03ad7efee0012a5e780f49a85e48414e1c8bec3b91fe
                    • Opcode Fuzzy Hash: 0948b0dc8cf51a52a09d1a66258e012b95f3e10264db5a487af17d13b2081ecd
                    • Instruction Fuzzy Hash: 0571C071500245DFCF218F64C895AFA7FFAFF49350F1442AAED555A1A6CB318C82DB60
                    APIs
                      • Part of subcall function 00AE2612: GetWindowLongW.USER32(?,000000EB), ref: 00AE2623
                      • Part of subcall function 00AE2344: GetCursorPos.USER32(?), ref: 00AE2357
                      • Part of subcall function 00AE2344: ScreenToClient.USER32(00BA67B0,?), ref: 00AE2374
                      • Part of subcall function 00AE2344: GetAsyncKeyState.USER32(00000001), ref: 00AE2399
                      • Part of subcall function 00AE2344: GetAsyncKeyState.USER32(00000002), ref: 00AE23A7
                    • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 00B6C2E4
                    • ImageList_EndDrag.COMCTL32 ref: 00B6C2EA
                    • ReleaseCapture.USER32 ref: 00B6C2F0
                    • SetWindowTextW.USER32(?,00000000), ref: 00B6C39A
                    • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00B6C3AD
                    • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 00B6C48F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                    • String ID: @GUI_DRAGFILE$@GUI_DROPID
                    • API String ID: 1924731296-2107944366
                    • Opcode ID: 94350d720611c82f70865ff43a18857e9978edd119ff0618cca2a348ea0bb939
                    • Instruction ID: 41f77147bdf2f01b854ecdb0c1b9f3318196cb37d39a20f229a115b65db511d4
                    • Opcode Fuzzy Hash: 94350d720611c82f70865ff43a18857e9978edd119ff0618cca2a348ea0bb939
                    • Instruction Fuzzy Hash: 9D518B71208305AFD700EF24D896F7A7BE5EB88310F04856DF5A58B2E1DB78A944CB52
                    APIs
                    • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00B6F910), ref: 00B5903D
                    • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00B6F910), ref: 00B59071
                    • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00B591EB
                    • SysFreeString.OLEAUT32(?), ref: 00B59215
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Free$FileLibraryModuleNamePathQueryStringType
                    • String ID:
                    • API String ID: 560350794-0
                    • Opcode ID: a8e59affbb01ba6bdc6c4af5542eca43e06cbe73db39532a87509f0560da6e89
                    • Instruction ID: e3c97143e660f1a70e4fb85e4303a0c62a8aa2e31fc24920ec39611bf8f22d06
                    • Opcode Fuzzy Hash: a8e59affbb01ba6bdc6c4af5542eca43e06cbe73db39532a87509f0560da6e89
                    • Instruction Fuzzy Hash: 28F11971A00219EFDB04DF94C888EAEB7B9FF49315F1084D9F916AB291DB31AD49CB50
                    APIs
                    • _memset.LIBCMT ref: 00B5F9C9
                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00B5FB5C
                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00B5FB80
                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00B5FBC0
                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00B5FBE2
                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00B5FD5E
                    • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00B5FD90
                    • CloseHandle.KERNEL32(?), ref: 00B5FDBF
                    • CloseHandle.KERNEL32(?), ref: 00B5FE36
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                    • String ID:
                    • API String ID: 4090791747-0
                    • Opcode ID: f2943de632a116351f7964a41281727044532f7fb2861e4945239a3801c68632
                    • Instruction ID: aebb07514bbd586602966b170678c883de94bd245ce5a8760ca4d300d5cdf505
                    • Opcode Fuzzy Hash: f2943de632a116351f7964a41281727044532f7fb2861e4945239a3801c68632
                    • Instruction Fuzzy Hash: E8E190312043429FC714EF24C981B7ABBE1EF88354F1488ADF8999B2A2DB31DC45CB52
                    APIs
                      • Part of subcall function 00B448AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00B438D3,?), ref: 00B448C7
                      • Part of subcall function 00B448AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00B438D3,?), ref: 00B448E0
                      • Part of subcall function 00B44CD3: GetFileAttributesW.KERNEL32(?,00B43947), ref: 00B44CD4
                    • lstrcmpiW.KERNEL32(?,?), ref: 00B44FE2
                    • _wcscmp.LIBCMT ref: 00B44FFC
                    • MoveFileW.KERNEL32(?,?), ref: 00B45017
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                    • String ID:
                    • API String ID: 793581249-0
                    • Opcode ID: 49af181fb4e3f5074d8864fbd5917c17a4fcc9304ad72c935eed021850513425
                    • Instruction ID: c75e4d5d12c29b5b5a7ad4b02eed404f0bc63d408b16271c9f84d4aa5ab62d1c
                    • Opcode Fuzzy Hash: 49af181fb4e3f5074d8864fbd5917c17a4fcc9304ad72c935eed021850513425
                    • Instruction Fuzzy Hash: 915153B24087859BC725DB60D885ADFB7ECEF84340F10496EF189D3192EF74A68C8766
                    APIs
                    • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00B6896E
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: InvalidateRect
                    • String ID:
                    • API String ID: 634782764-0
                    • Opcode ID: 9a9b48f1628bb2b2061187a0c0525ce3b8270c072057ccf6e5b1ecc7666fb717
                    • Instruction ID: 013dedc5cfca5334e33110a425e47f82caf88d16fb409c134f5a0da0e8465cfb
                    • Opcode Fuzzy Hash: 9a9b48f1628bb2b2061187a0c0525ce3b8270c072057ccf6e5b1ecc7666fb717
                    • Instruction Fuzzy Hash: B351B430500208BFDF209F64DC85BA93BE5FB05310F6042A2FA15E71E1DFB9A980CB91
                    APIs
                    • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00B1C547
                    • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00B1C569
                    • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00B1C581
                    • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00B1C59F
                    • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00B1C5C0
                    • DestroyIcon.USER32(00000000), ref: 00B1C5CF
                    • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00B1C5EC
                    • DestroyIcon.USER32(?), ref: 00B1C5FB
                      • Part of subcall function 00B6A71E: DeleteObject.GDI32(00000000), ref: 00B6A757
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                    • String ID:
                    • API String ID: 2819616528-0
                    • Opcode ID: aec3ad984ad932716cb23db806702ddbc2031adeabd03fc872b03ea66c16241c
                    • Instruction ID: b836c97d8dc4386fa395a7cc624f2da24a9d6e2699f939cb384589bbdeedd740
                    • Opcode Fuzzy Hash: aec3ad984ad932716cb23db806702ddbc2031adeabd03fc872b03ea66c16241c
                    • Instruction Fuzzy Hash: CA515870A40249AFDB24DF25DC46FBA3BF9EB58310F104569F902972A0DBB4ED90DB60
                    APIs
                    • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00B38A84,00000B00,?,?), ref: 00B38E0C
                    • HeapAlloc.KERNEL32(00000000,?,00B38A84,00000B00,?,?), ref: 00B38E13
                    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00B38A84,00000B00,?,?), ref: 00B38E28
                    • GetCurrentProcess.KERNEL32(?,00000000,?,00B38A84,00000B00,?,?), ref: 00B38E30
                    • DuplicateHandle.KERNEL32(00000000,?,00B38A84,00000B00,?,?), ref: 00B38E33
                    • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00B38A84,00000B00,?,?), ref: 00B38E43
                    • GetCurrentProcess.KERNEL32(00B38A84,00000000,?,00B38A84,00000B00,?,?), ref: 00B38E4B
                    • DuplicateHandle.KERNEL32(00000000,?,00B38A84,00000B00,?,?), ref: 00B38E4E
                    • CreateThread.KERNEL32(00000000,00000000,00B38E74,00000000,00000000,00000000), ref: 00B38E68
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                    • String ID:
                    • API String ID: 1957940570-0
                    • Opcode ID: e3a38e866beeed91e8540345f101bbe3b852f87e247770bdf8c68f08f6e9bb44
                    • Instruction ID: 80887c669baa1f5c94553c19e5fedd08bc505c9916641f442a1f4544a6d7c257
                    • Opcode Fuzzy Hash: e3a38e866beeed91e8540345f101bbe3b852f87e247770bdf8c68f08f6e9bb44
                    • Instruction Fuzzy Hash: B601BBB5240309FFEB10ABA5EC4DF6B3BACEB89751F004421FA05DB1E1CAB59800CB20
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Variant$ClearInit$_memset
                    • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                    • API String ID: 2862541840-625585964
                    • Opcode ID: 9d13e2c9ac27a63778ddc01b540a03fa570f37fb93897a49c0b6a6f5a4577639
                    • Instruction ID: 78a4f958b8885590ff5f6c700aa5f8582b93708c03fec5582b335e189e964a1d
                    • Opcode Fuzzy Hash: 9d13e2c9ac27a63778ddc01b540a03fa570f37fb93897a49c0b6a6f5a4577639
                    • Instruction Fuzzy Hash: EE918C71A00215EBDF24DFA5D888FAEBBF8EF45711F1081D9F915AB290D7709909CBA0
                    APIs
                      • Part of subcall function 00B37652: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00B3758C,80070057,?,?,?,00B3799D), ref: 00B3766F
                      • Part of subcall function 00B37652: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00B3758C,80070057,?,?), ref: 00B3768A
                      • Part of subcall function 00B37652: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00B3758C,80070057,?,?), ref: 00B37698
                      • Part of subcall function 00B37652: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00B3758C,80070057,?), ref: 00B376A8
                    • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00B59B1B
                    • _memset.LIBCMT ref: 00B59B28
                    • _memset.LIBCMT ref: 00B59C6B
                    • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00B59C97
                    • CoTaskMemFree.OLE32(?), ref: 00B59CA2
                    Strings
                    • NULL Pointer assignment, xrefs: 00B59CF0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                    • String ID: NULL Pointer assignment
                    • API String ID: 1300414916-2785691316
                    • Opcode ID: 797f7a7067ab3f348b364e5bab0a5ddf98dc9b660bd2b2a94f9e629765b4a6f9
                    • Instruction ID: e2affbbb87a69c97bc7f6fdf104b2a620805c61fe3a39f50a4a206658c116afa
                    • Opcode Fuzzy Hash: 797f7a7067ab3f348b364e5bab0a5ddf98dc9b660bd2b2a94f9e629765b4a6f9
                    • Instruction Fuzzy Hash: 13912971D00219EBDF10DFA5DC85ADEBBB9EF08710F2041AAF919A7291DB715A44CFA0
                    APIs
                    • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00B67093
                    • SendMessageW.USER32(?,00001036,00000000,?), ref: 00B670A7
                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00B670C1
                    • _wcscat.LIBCMT ref: 00B6711C
                    • SendMessageW.USER32(?,00001057,00000000,?), ref: 00B67133
                    • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00B67161
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: MessageSend$Window_wcscat
                    • String ID: SysListView32
                    • API String ID: 307300125-78025650
                    • Opcode ID: 8116d91f27335df77063855dde2d1d23284ac5852b77fee28d087ca154cd562f
                    • Instruction ID: 9967a04e0df41658f7dca9c7415bfb3bbfad49e6ae15d7f119bed3aa220bd342
                    • Opcode Fuzzy Hash: 8116d91f27335df77063855dde2d1d23284ac5852b77fee28d087ca154cd562f
                    • Instruction Fuzzy Hash: B641E271944308AFEB21DFA4CC85BEE77E8EF08354F1004AAF544E72D2DA759D848B60
                    APIs
                      • Part of subcall function 00B43E91: CreateToolhelp32Snapshot.KERNEL32 ref: 00B43EB6
                      • Part of subcall function 00B43E91: Process32FirstW.KERNEL32(00000000,?), ref: 00B43EC4
                      • Part of subcall function 00B43E91: CloseHandle.KERNEL32(00000000), ref: 00B43F8E
                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00B5ECB8
                    • GetLastError.KERNEL32 ref: 00B5ECCB
                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00B5ECFA
                    • TerminateProcess.KERNEL32(00000000,00000000), ref: 00B5ED77
                    • GetLastError.KERNEL32(00000000), ref: 00B5ED82
                    • CloseHandle.KERNEL32(00000000), ref: 00B5EDB7
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                    • String ID: SeDebugPrivilege
                    • API String ID: 2533919879-2896544425
                    • Opcode ID: 50a252c36408f78999eefdd93654bd69a92a16f25a05a94cdf1845b478a391e9
                    • Instruction ID: 36aa85f035bf7c4ed6a22ea15fd54b81099d571884386bbccd11e222b709a5f3
                    • Opcode Fuzzy Hash: 50a252c36408f78999eefdd93654bd69a92a16f25a05a94cdf1845b478a391e9
                    • Instruction Fuzzy Hash: 7A419C712002019FDB14EF24CD95F7EB7E5AF80714F1880A9F9529B2D2DBB5E908CB96
                    APIs
                    • LoadIconW.USER32(00000000,00007F03), ref: 00B432C5
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: IconLoad
                    • String ID: blank$info$question$stop$warning
                    • API String ID: 2457776203-404129466
                    • Opcode ID: dc6baf27f4e4d028fe3fd0a1fd33b97d5aaa6439d4b934809b0eda74713f1b89
                    • Instruction ID: a25b7a7e10dc34e9f20eda0725eb06c8a5a9566b409061d7fcdcfb1a3d10cc89
                    • Opcode Fuzzy Hash: dc6baf27f4e4d028fe3fd0a1fd33b97d5aaa6439d4b934809b0eda74713f1b89
                    • Instruction Fuzzy Hash: 2611E731208356BAEB015B54EC83C6AB7DCEF19B70F2400EAF900A61C1EBE55F4059E5
                    APIs
                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00B4454E
                    • LoadStringW.USER32(00000000), ref: 00B44555
                    • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00B4456B
                    • LoadStringW.USER32(00000000), ref: 00B44572
                    • _wprintf.LIBCMT ref: 00B44598
                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00B445B6
                    Strings
                    • %s (%d) : ==> %s: %s %s, xrefs: 00B44593
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: HandleLoadModuleString$Message_wprintf
                    • String ID: %s (%d) : ==> %s: %s %s
                    • API String ID: 3648134473-3128320259
                    • Opcode ID: 7200fe25c944fcee115a901f6c1ec3bbd62cd89eb71919eb227f6ac4e060af89
                    • Instruction ID: e6cd81bca0b50c73306ba271dcc3eb6328b2f570d3a494032e2d20fd57feeb8b
                    • Opcode Fuzzy Hash: 7200fe25c944fcee115a901f6c1ec3bbd62cd89eb71919eb227f6ac4e060af89
                    • Instruction Fuzzy Hash: DF0144F2504209BFE7509794ED89EF677ACE708741F0005A5F745E3091EAB49E958F70
                    APIs
                      • Part of subcall function 00AE2612: GetWindowLongW.USER32(?,000000EB), ref: 00AE2623
                    • GetSystemMetrics.USER32(0000000F), ref: 00B6D78A
                    • GetSystemMetrics.USER32(0000000F), ref: 00B6D7AA
                    • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00B6D9E5
                    • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00B6DA03
                    • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00B6DA24
                    • ShowWindow.USER32(00000003,00000000), ref: 00B6DA43
                    • InvalidateRect.USER32(?,00000000,00000001), ref: 00B6DA68
                    • DefDlgProcW.USER32(?,00000005,?,?), ref: 00B6DA8B
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                    • String ID:
                    • API String ID: 1211466189-0
                    • Opcode ID: 7837e9f3e3b5849a5bddf199fc5d6ae6d2abbcf5c72bd956de491c90dc117e98
                    • Instruction ID: 4ea5580ca61a3bed2d88d9dd3bbed096c367efe45a3212db8a77e123dd458d70
                    • Opcode Fuzzy Hash: 7837e9f3e3b5849a5bddf199fc5d6ae6d2abbcf5c72bd956de491c90dc117e98
                    • Instruction Fuzzy Hash: B9B16871A04226ABDF14CF69C9C57BD7BF1FF44701F0881A9ED489B295DB38A950CB60
                    APIs
                    • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00B1C417,00000004,00000000,00000000,00000000), ref: 00AE2ACF
                    • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00B1C417,00000004,00000000,00000000,00000000,000000FF), ref: 00AE2B17
                    • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00B1C417,00000004,00000000,00000000,00000000), ref: 00B1C46A
                    • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00B1C417,00000004,00000000,00000000,00000000), ref: 00B1C4D6
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ShowWindow
                    • String ID:
                    • API String ID: 1268545403-0
                    • Opcode ID: 043ab491ebef16d34b42bd1459df94c3f898a17709a6a965a24fd0eb83764414
                    • Instruction ID: 9472f565303f3aa2701340c4d73f8a42ba61407775d865f4ae75a8ef2636c492
                    • Opcode Fuzzy Hash: 043ab491ebef16d34b42bd1459df94c3f898a17709a6a965a24fd0eb83764414
                    • Instruction Fuzzy Hash: 0A41FC312086C09AD7358B2ADC9CBBB7BEAEB46350F58847EE047876A1CA7598C1D711
                    APIs
                    • InterlockedExchange.KERNEL32(?,000001F5), ref: 00B4737F
                      • Part of subcall function 00B00FF6: std::exception::exception.LIBCMT ref: 00B0102C
                      • Part of subcall function 00B00FF6: __CxxThrowException@8.LIBCMT ref: 00B01041
                    • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00B473B6
                    • EnterCriticalSection.KERNEL32(?), ref: 00B473D2
                    • _memmove.LIBCMT ref: 00B47420
                    • _memmove.LIBCMT ref: 00B4743D
                    • LeaveCriticalSection.KERNEL32(?), ref: 00B4744C
                    • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00B47461
                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 00B47480
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                    • String ID:
                    • API String ID: 256516436-0
                    • Opcode ID: 25f50b22fc0cf057fc2e44c81179ec133e90856c6cf3bc8af9a4f85fd56bbfb7
                    • Instruction ID: 0c706a6230c06cdc13fb305de6e62bc440e84d0082412e2d32842435788fbe30
                    • Opcode Fuzzy Hash: 25f50b22fc0cf057fc2e44c81179ec133e90856c6cf3bc8af9a4f85fd56bbfb7
                    • Instruction Fuzzy Hash: E6316E31904206EBDF10EF58DD85AAA7BB8EF45710B1441A5F904AB286DF749A14DBA0
                    APIs
                    • DeleteObject.GDI32(00000000), ref: 00B6645A
                    • GetDC.USER32(00000000), ref: 00B66462
                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00B6646D
                    • ReleaseDC.USER32(00000000,00000000), ref: 00B66479
                    • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00B664B5
                    • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00B664C6
                    • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00B69299,?,?,000000FF,00000000,?,000000FF,?), ref: 00B66500
                    • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00B66520
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                    • String ID:
                    • API String ID: 3864802216-0
                    • Opcode ID: a42d9fccd552fa1dd7a1cbef2f5e2b37ec3252a68e563dc3d7821bcd866bd8bc
                    • Instruction ID: 0829ea0bc4c889fccd0f86852cd200979ea81183754961709d68c976c0581de9
                    • Opcode Fuzzy Hash: a42d9fccd552fa1dd7a1cbef2f5e2b37ec3252a68e563dc3d7821bcd866bd8bc
                    • Instruction Fuzzy Hash: 66315C72201214BFEB118F50DC4AFFA3BA9EB19761F044065FE099A2A1DAB99841CB64
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: _memcmp
                    • String ID:
                    • API String ID: 2931989736-0
                    • Opcode ID: e24b0071b8cd2a31f3764e1db092aa9bf4ae67003345e9107eb055598db859eb
                    • Instruction ID: 5c24a2912836af6940f4343431a522dea6b46ee290cde8bd737c5c139e4bf791
                    • Opcode Fuzzy Hash: e24b0071b8cd2a31f3764e1db092aa9bf4ae67003345e9107eb055598db859eb
                    • Instruction Fuzzy Hash: 97219861600605BBD628A6654D52FBF3FDCDF203D4F2440E0FD09B62E2EB52DD1193A5
                    APIs
                      • Part of subcall function 00AE9997: __itow.LIBCMT ref: 00AE99C2
                      • Part of subcall function 00AE9997: __swprintf.LIBCMT ref: 00AE9A0C
                      • Part of subcall function 00AFFEC6: _wcscpy.LIBCMT ref: 00AFFEE9
                    • _wcstok.LIBCMT ref: 00B4EEFF
                    • _wcscpy.LIBCMT ref: 00B4EF8E
                    • _memset.LIBCMT ref: 00B4EFC1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                    • String ID: X
                    • API String ID: 774024439-3081909835
                    • Opcode ID: c52d5ce8ec6acd16faf359070e8cd085e7baeb271d36494a87da27cd408203e3
                    • Instruction ID: c64c4c1d402c1bfd2fd6839d55eced33c96d3471f52c503d5668e86a9cfed71d
                    • Opcode Fuzzy Hash: c52d5ce8ec6acd16faf359070e8cd085e7baeb271d36494a87da27cd408203e3
                    • Instruction Fuzzy Hash: 55C17B715083419FD724EF24C985A6EB7E4FF88310F1049ADF8999B2A2DB70ED45CB82
                    APIs
                    • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00B56F14
                    • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00B56F35
                    • WSAGetLastError.WSOCK32(00000000), ref: 00B56F48
                    • htons.WSOCK32(?,?,?,00000000,?), ref: 00B56FFE
                    • inet_ntoa.WSOCK32(?), ref: 00B56FBB
                      • Part of subcall function 00B3AE14: _strlen.LIBCMT ref: 00B3AE1E
                      • Part of subcall function 00B3AE14: _memmove.LIBCMT ref: 00B3AE40
                    • _strlen.LIBCMT ref: 00B57058
                    • _memmove.LIBCMT ref: 00B570C1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                    • String ID:
                    • API String ID: 3619996494-0
                    • Opcode ID: 40894d616629921b6a0057b34652d47f6d27adc75d761ee5424ab9a6246b8ebf
                    • Instruction ID: 09852596b87407205d38d271009a70fd5081e82c3c18d4feec387561826911ce
                    • Opcode Fuzzy Hash: 40894d616629921b6a0057b34652d47f6d27adc75d761ee5424ab9a6246b8ebf
                    • Instruction Fuzzy Hash: EA81FE31608300ABC710EB24DC86F6BB7E9EF84714F14499CF9459B2E2DE709D08CB92
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7ec32e2ec659b025cd0e6c103b7b07606bdb39cff1228bbcc27eecd452bf70db
                    • Instruction ID: 74d3c84e170d53a2e840df74c7c7364a1e15dabcda345925fd05194067883048
                    • Opcode Fuzzy Hash: 7ec32e2ec659b025cd0e6c103b7b07606bdb39cff1228bbcc27eecd452bf70db
                    • Instruction Fuzzy Hash: BF716970900159EFCB148F99CC89EBEBBB9FF89310F148159F915AB291D734AA51CFA0
                    APIs
                    • IsWindow.USER32(00C45F58), ref: 00B6B6A5
                    • IsWindowEnabled.USER32(00C45F58), ref: 00B6B6B1
                    • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00B6B795
                    • SendMessageW.USER32(00C45F58,000000B0,?,?), ref: 00B6B7CC
                    • IsDlgButtonChecked.USER32(?,?), ref: 00B6B809
                    • GetWindowLongW.USER32(00C45F58,000000EC), ref: 00B6B82B
                    • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00B6B843
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                    • String ID:
                    • API String ID: 4072528602-0
                    • Opcode ID: 5d5dfc1d3b2baed060dfeba37f70ea664126e816c7cc006547d2372adbabd8e8
                    • Instruction ID: 3a090f7071b38ea1a19f8882e8906ef7fb410a39e336c18c535002f474c6298b
                    • Opcode Fuzzy Hash: 5d5dfc1d3b2baed060dfeba37f70ea664126e816c7cc006547d2372adbabd8e8
                    • Instruction Fuzzy Hash: E6717C74604205AFDB249F64C8D4FBABBF9FF4A300F1440A9E956D72A1CB39AD91CB50
                    APIs
                    • _memset.LIBCMT ref: 00B5F75C
                    • _memset.LIBCMT ref: 00B5F825
                    • ShellExecuteExW.SHELL32(?), ref: 00B5F86A
                      • Part of subcall function 00AE9997: __itow.LIBCMT ref: 00AE99C2
                      • Part of subcall function 00AE9997: __swprintf.LIBCMT ref: 00AE9A0C
                      • Part of subcall function 00AFFEC6: _wcscpy.LIBCMT ref: 00AFFEE9
                    • GetProcessId.KERNEL32(00000000), ref: 00B5F8E1
                    • CloseHandle.KERNEL32(00000000), ref: 00B5F910
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                    • String ID: @
                    • API String ID: 3522835683-2766056989
                    • Opcode ID: c384d8d2cc1f471da6610d7e67ff53714e11c72347cac6593b05835ea7781f0f
                    • Instruction ID: 00cccd5b320adad02f39f42d33ea048757b9627ecfc4f51b5a8de224115e64ee
                    • Opcode Fuzzy Hash: c384d8d2cc1f471da6610d7e67ff53714e11c72347cac6593b05835ea7781f0f
                    • Instruction Fuzzy Hash: A8618C75A0065ADFCB14EF55C580AAEFBF4FF48310F1484A9E846AB391CB30AD45CB90
                    APIs
                    • GetParent.USER32(?), ref: 00B4149C
                    • GetKeyboardState.USER32(?), ref: 00B414B1
                    • SetKeyboardState.USER32(?), ref: 00B41512
                    • PostMessageW.USER32(?,00000101,00000010,?), ref: 00B41540
                    • PostMessageW.USER32(?,00000101,00000011,?), ref: 00B4155F
                    • PostMessageW.USER32(?,00000101,00000012,?), ref: 00B415A5
                    • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00B415C8
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: MessagePost$KeyboardState$Parent
                    • String ID:
                    • API String ID: 87235514-0
                    • Opcode ID: 3c4fb671307f34ab6d578f75a0260e9a6c939d9c987adb22e975152979a3aa8f
                    • Instruction ID: b6db0c7f03e3bf3a46ea763867a7d18f265bcdb469fbc6045abe366d9227a506
                    • Opcode Fuzzy Hash: 3c4fb671307f34ab6d578f75a0260e9a6c939d9c987adb22e975152979a3aa8f
                    • Instruction Fuzzy Hash: 5E51D3A0E047D53DFB36462C8C45BBA7FE99B46304F0848C9E1D5568C2D6E8DEC4EB50
                    APIs
                    • GetParent.USER32(00000000), ref: 00B412B5
                    • GetKeyboardState.USER32(?), ref: 00B412CA
                    • SetKeyboardState.USER32(?), ref: 00B4132B
                    • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00B41357
                    • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00B41374
                    • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00B413B8
                    • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00B413D9
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: MessagePost$KeyboardState$Parent
                    • String ID:
                    • API String ID: 87235514-0
                    • Opcode ID: abd97e80fd4a99e877c7fd015d5d09cf44ab4cb739d2ee296a3e59c068b0dc6b
                    • Instruction ID: 166c1fcec39bd0ab740ff5dc6c28b7c613628491b579e834b2672fafa4471db6
                    • Opcode Fuzzy Hash: abd97e80fd4a99e877c7fd015d5d09cf44ab4cb739d2ee296a3e59c068b0dc6b
                    • Instruction Fuzzy Hash: A051F6A0D047D53DFB3287288C55B7A7FE99B06300F0889C9E1D8968C2D794AED4F765
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: _wcsncpy$LocalTime
                    • String ID:
                    • API String ID: 2945705084-0
                    • Opcode ID: c85730d6aa8e912bc5111a72e589b09996b4715440e7a3d48427a6f94a262a8a
                    • Instruction ID: 5049b6ff5544a3b96dd63232aa280d548b79d7eaca5d805ac2ead1cde081951d
                    • Opcode Fuzzy Hash: c85730d6aa8e912bc5111a72e589b09996b4715440e7a3d48427a6f94a262a8a
                    • Instruction Fuzzy Hash: 794193A5C20618B6CB10EBB4CC8A9DFBBECAF04710F508596F518E3162E734E715C7A9
                    APIs
                      • Part of subcall function 00B448AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00B438D3,?), ref: 00B448C7
                      • Part of subcall function 00B448AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00B438D3,?), ref: 00B448E0
                    • lstrcmpiW.KERNEL32(?,?), ref: 00B438F3
                    • _wcscmp.LIBCMT ref: 00B4390F
                    • MoveFileW.KERNEL32(?,?), ref: 00B43927
                    • _wcscat.LIBCMT ref: 00B4396F
                    • SHFileOperationW.SHELL32(?), ref: 00B439DB
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                    • String ID: \*.*
                    • API String ID: 1377345388-1173974218
                    • Opcode ID: fd463a7a5b0297579023bb1ad72e8eb62708cd850e048bb98693b3fff4c99dd8
                    • Instruction ID: 4f117027ba41385bb31012b93cbc3936ee9758920c2bf8b5145de30dfbaca0a7
                    • Opcode Fuzzy Hash: fd463a7a5b0297579023bb1ad72e8eb62708cd850e048bb98693b3fff4c99dd8
                    • Instruction Fuzzy Hash: B94181B140C3849AC751EF64D485AEFB7E8EF88740F5409AEB48AC3191EB74D788C752
                    APIs
                    • _memset.LIBCMT ref: 00B67519
                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B675C0
                    • IsMenu.USER32(?), ref: 00B675D8
                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00B67620
                    • DrawMenuBar.USER32 ref: 00B67633
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Menu$Item$DrawInfoInsert_memset
                    • String ID: 0
                    • API String ID: 3866635326-4108050209
                    • Opcode ID: 8aa834fbd5b01c142c1fcc40a4958b05c53dba6038d0a526e82faa3f2caf7563
                    • Instruction ID: 2868849f701c46c52fa4a40c64aa126514512105be57b27cc5f456a0490c50bf
                    • Opcode Fuzzy Hash: 8aa834fbd5b01c142c1fcc40a4958b05c53dba6038d0a526e82faa3f2caf7563
                    • Instruction Fuzzy Hash: 9C415C75A05609EFDB10DF54D884EAABBF8FF05324F1480A9F91697290DB34AD50CF90
                    APIs
                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00B6125C
                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00B61286
                    • FreeLibrary.KERNEL32(00000000), ref: 00B6133D
                      • Part of subcall function 00B6122D: RegCloseKey.ADVAPI32(?), ref: 00B612A3
                      • Part of subcall function 00B6122D: FreeLibrary.KERNEL32(?), ref: 00B612F5
                      • Part of subcall function 00B6122D: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00B61318
                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00B612E0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: EnumFreeLibrary$CloseDeleteOpen
                    • String ID:
                    • API String ID: 395352322-0
                    • Opcode ID: 2e234b0abd76592771b3fd795db613567819a0708e914c4a7e7671ac4c322cd3
                    • Instruction ID: 174a940506da77b5b77de1fd4b0be350cceaeb4ab72a309c5216ac63f23646e7
                    • Opcode Fuzzy Hash: 2e234b0abd76592771b3fd795db613567819a0708e914c4a7e7671ac4c322cd3
                    • Instruction Fuzzy Hash: 25312DB1901109BFDB14DF94EC99AFEB7BCEF08340F0405A9E502E3251DA789E459AA4
                    APIs
                    • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00B6655B
                    • GetWindowLongW.USER32(00C45F58,000000F0), ref: 00B6658E
                    • GetWindowLongW.USER32(00C45F58,000000F0), ref: 00B665C3
                    • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00B665F5
                    • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00B6661F
                    • GetWindowLongW.USER32(00000000,000000F0), ref: 00B66630
                    • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00B6664A
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: LongWindow$MessageSend
                    • String ID:
                    • API String ID: 2178440468-0
                    • Opcode ID: bf5c996bd5e91dea88062ecdd812ec76ec5e76bcf7e1b3919568fafd9e09ac8c
                    • Instruction ID: 625233d9e40d5799d55361af32f983b54394b7c44aaacca0df4f733938612611
                    • Opcode Fuzzy Hash: bf5c996bd5e91dea88062ecdd812ec76ec5e76bcf7e1b3919568fafd9e09ac8c
                    • Instruction Fuzzy Hash: F3310F70604255AFDB208F28EC86F653BE5FB5A710F1801A9F512CB2F6CB69AC40DB91
                    APIs
                      • Part of subcall function 00B580A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00B580CB
                    • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00B564D9
                    • WSAGetLastError.WSOCK32(00000000), ref: 00B564E8
                    • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00B56521
                    • connect.WSOCK32(00000000,?,00000010), ref: 00B5652A
                    • WSAGetLastError.WSOCK32 ref: 00B56534
                    • closesocket.WSOCK32(00000000), ref: 00B5655D
                    • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00B56576
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                    • String ID:
                    • API String ID: 910771015-0
                    • Opcode ID: f5f5f7c71bd916031c1e75a62838d41572e107eed895de8641346430cff718a5
                    • Instruction ID: 919b772f810201770cb7ae49cb75a5ca03c7ace89d795c258d6b796da43466c0
                    • Opcode Fuzzy Hash: f5f5f7c71bd916031c1e75a62838d41572e107eed895de8641346430cff718a5
                    • Instruction Fuzzy Hash: 9131AF71600218AFEB10AF24DC85BBE7BE8EF54711F4480A9FD05A7291DB74AD09CBA1
                    APIs
                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00B3E0FA
                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00B3E120
                    • SysAllocString.OLEAUT32(00000000), ref: 00B3E123
                    • SysAllocString.OLEAUT32 ref: 00B3E144
                    • SysFreeString.OLEAUT32 ref: 00B3E14D
                    • StringFromGUID2.OLE32(?,?,00000028), ref: 00B3E167
                    • SysAllocString.OLEAUT32(?), ref: 00B3E175
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                    • String ID:
                    • API String ID: 3761583154-0
                    • Opcode ID: 7d7188e0ae6232e4db9476b8e9c4d9338f6f2ca35b335606c9be53aa329c3107
                    • Instruction ID: 19f6bb8a822bf4101b040b884e62fc4fe7863ea87f272a3820d4dfeef9bc599f
                    • Opcode Fuzzy Hash: 7d7188e0ae6232e4db9476b8e9c4d9338f6f2ca35b335606c9be53aa329c3107
                    • Instruction Fuzzy Hash: 26219035204109AFDB10AFA8DC89CBB77ECEB09760B108166FA24DB2E0DE74DC418B60
                    APIs
                      • Part of subcall function 00AE1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00AE1D73
                      • Part of subcall function 00AE1D35: GetStockObject.GDI32(00000011), ref: 00AE1D87
                      • Part of subcall function 00AE1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00AE1D91
                    • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00B678A1
                    • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00B678AE
                    • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00B678B9
                    • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00B678C8
                    • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00B678D4
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: MessageSend$CreateObjectStockWindow
                    • String ID: Msctls_Progress32
                    • API String ID: 1025951953-3636473452
                    • Opcode ID: 7afe3f1ecaa59b4b3378973c5ffbdf81a4eb4fe7c28378ad1164c50f17378949
                    • Instruction ID: 7e204f2b22a0bbb50bc67781ea972f5704a2e08e3b445fb7c0223fdba9f2b3c9
                    • Opcode Fuzzy Hash: 7afe3f1ecaa59b4b3378973c5ffbdf81a4eb4fe7c28378ad1164c50f17378949
                    • Instruction Fuzzy Hash: 91118EB2150219BEEF159E61CC85EE77F6DEF08758F014115BA04A30A0CB769C21DBA0
                    APIs
                    • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00B04292,?), ref: 00B041E3
                    • GetProcAddress.KERNEL32(00000000), ref: 00B041EA
                    • EncodePointer.KERNEL32(00000000), ref: 00B041F6
                    • DecodePointer.KERNEL32(00000001,00B04292,?), ref: 00B04213
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                    • String ID: RoInitialize$combase.dll
                    • API String ID: 3489934621-340411864
                    • Opcode ID: 9c68b969f6f9729ed1d0c3107c067d8967177f8a964e578233f578d5431f30d4
                    • Instruction ID: 1a6da2d791bce1f967b2763745e116102a2c3a8ec9364cf0389ecd958d5f6d07
                    • Opcode Fuzzy Hash: 9c68b969f6f9729ed1d0c3107c067d8967177f8a964e578233f578d5431f30d4
                    • Instruction Fuzzy Hash: 54E0E5B0690301AEEB205BB0EC0AB243EE5FBA2B02F108474F521E71E0DFF944919E04
                    APIs
                    • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00B041B8), ref: 00B042B8
                    • GetProcAddress.KERNEL32(00000000), ref: 00B042BF
                    • EncodePointer.KERNEL32(00000000), ref: 00B042CA
                    • DecodePointer.KERNEL32(00B041B8), ref: 00B042E5
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                    • String ID: RoUninitialize$combase.dll
                    • API String ID: 3489934621-2819208100
                    • Opcode ID: 750fe8156e4105e9373b971e6f7c4a9f5111643f6fe2795e40a71ce6bb1ca5c9
                    • Instruction ID: e9157eb584c491adcac3a3d7083f439ecaff3469c6b83407ebe5474f7d298f2e
                    • Opcode Fuzzy Hash: 750fe8156e4105e9373b971e6f7c4a9f5111643f6fe2795e40a71ce6bb1ca5c9
                    • Instruction Fuzzy Hash: 2DE092B8691202AFEA109B60FE0AB243EA4BB65B42F204064F111F31E0CFF845448A18
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: _memmove$__itow__swprintf
                    • String ID:
                    • API String ID: 3253778849-0
                    • Opcode ID: f6e37033759929decb2087947801ab21ceb05d87debeb2e0ea76df718db484de
                    • Instruction ID: 285c55adc2f3a765545ee618557bed7944abdec63eccf0af16359ee8ed277110
                    • Opcode Fuzzy Hash: f6e37033759929decb2087947801ab21ceb05d87debeb2e0ea76df718db484de
                    • Instruction Fuzzy Hash: 2A61CE3050069A9BCF15EF25CD81EFE3BE4EF49308F044599F8955B292EB309E45DB51
                    APIs
                      • Part of subcall function 00AE7F41: _memmove.LIBCMT ref: 00AE7F82
                      • Part of subcall function 00B610A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B60038,?,?), ref: 00B610BC
                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B60548
                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00B60588
                    • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00B605AB
                    • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00B605D4
                    • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00B60617
                    • RegCloseKey.ADVAPI32(00000000), ref: 00B60624
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                    • String ID:
                    • API String ID: 4046560759-0
                    • Opcode ID: 94494cc337dd9c78c0f838fb70c61642bf5193a594a7f4874fb5e585041a0ac8
                    • Instruction ID: 6e3e6a62db0e9ae5eee215fa94dd02a8968a566e6d14d43324c515be65cec5c5
                    • Opcode Fuzzy Hash: 94494cc337dd9c78c0f838fb70c61642bf5193a594a7f4874fb5e585041a0ac8
                    • Instruction Fuzzy Hash: 33516631218240AFCB14EF65D985E6FBBE8FF88314F04496DF586872A2DB75E904CB52
                    APIs
                    • GetMenu.USER32(?), ref: 00B65A82
                    • GetMenuItemCount.USER32(00000000), ref: 00B65AB9
                    • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00B65AE1
                    • GetMenuItemID.USER32(?,?), ref: 00B65B50
                    • GetSubMenu.USER32(?,?), ref: 00B65B5E
                    • PostMessageW.USER32(?,00000111,?,00000000), ref: 00B65BAF
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Menu$Item$CountMessagePostString
                    • String ID:
                    • API String ID: 650687236-0
                    • Opcode ID: c649d6d524a4887f505992c3a83bdbd8d7d2f9d9373037a95164a4b9d6dcbc94
                    • Instruction ID: fc03bad50c058f8cc4182cf59a3844c900b44655462dfb9eb2bcae35fb003c29
                    • Opcode Fuzzy Hash: c649d6d524a4887f505992c3a83bdbd8d7d2f9d9373037a95164a4b9d6dcbc94
                    • Instruction Fuzzy Hash: C4519135A00615EFCF21DFA4C945AAEB7F4EF48310F1444A9E941B7391CB74AE41CB90
                    APIs
                    • VariantInit.OLEAUT32(?), ref: 00B3F3F7
                    • VariantClear.OLEAUT32(00000013), ref: 00B3F469
                    • VariantClear.OLEAUT32(00000000), ref: 00B3F4C4
                    • _memmove.LIBCMT ref: 00B3F4EE
                    • VariantClear.OLEAUT32(?), ref: 00B3F53B
                    • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00B3F569
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Variant$Clear$ChangeInitType_memmove
                    • String ID:
                    • API String ID: 1101466143-0
                    • Opcode ID: a438e34ba837db4dca4a1c0f33b8a945e42f0657fbbdf8a3bb63fee693392ada
                    • Instruction ID: f3c205479d91911df4c8badd95a2d99bd9b227bdda25895f29b0a03cf083dc21
                    • Opcode Fuzzy Hash: a438e34ba837db4dca4a1c0f33b8a945e42f0657fbbdf8a3bb63fee693392ada
                    • Instruction Fuzzy Hash: 90514BB5A0020AAFCB14CF58D884AAAB7F8FF4C354F15856AE959DB350D734E911CFA0
                    APIs
                    • _memset.LIBCMT ref: 00B42747
                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B42792
                    • IsMenu.USER32(00000000), ref: 00B427B2
                    • CreatePopupMenu.USER32 ref: 00B427E6
                    • GetMenuItemCount.USER32(000000FF), ref: 00B42844
                    • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00B42875
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                    • String ID:
                    • API String ID: 3311875123-0
                    • Opcode ID: 7ee15d0348069d777c49b0939e42490630c103cf007a2728f1f6ef7a0fb8d2e4
                    • Instruction ID: 882715d3c3e3e53f0acc34ccc034f3c221bd32f0302822f17baf0cfb82c06da8
                    • Opcode Fuzzy Hash: 7ee15d0348069d777c49b0939e42490630c103cf007a2728f1f6ef7a0fb8d2e4
                    • Instruction Fuzzy Hash: D8519E70A0020AEBDF25CF68D988BAEBBF5EF54314F5041A9F8119B291D7709E44EB61
                    APIs
                      • Part of subcall function 00AE2612: GetWindowLongW.USER32(?,000000EB), ref: 00AE2623
                    • BeginPaint.USER32(?,?,?,?,?,?), ref: 00AE179A
                    • GetWindowRect.USER32(?,?), ref: 00AE17FE
                    • ScreenToClient.USER32(?,?), ref: 00AE181B
                    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00AE182C
                    • EndPaint.USER32(?,?), ref: 00AE1876
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: PaintWindow$BeginClientLongRectScreenViewport
                    • String ID:
                    • API String ID: 1827037458-0
                    • Opcode ID: 24fb301384d6e68b46fbb3d6180ee8d882baa058602df1dccdcb5924acc55618
                    • Instruction ID: 64a924fbf4e588c4542c9bcb1d584332e989a2c70378e4ccd72548839d55c048
                    • Opcode Fuzzy Hash: 24fb301384d6e68b46fbb3d6180ee8d882baa058602df1dccdcb5924acc55618
                    • Instruction Fuzzy Hash: 8341DB70100351AFC710DF26DC84FBA3BF8EB4A724F140669FAA5872A1CB749845CB61
                    APIs
                    • ShowWindow.USER32(00BA67B0,00000000,00C45F58,?,?,00BA67B0,?,00B6B862,?,?), ref: 00B6B9CC
                    • EnableWindow.USER32(00000000,00000000), ref: 00B6B9F0
                    • ShowWindow.USER32(00BA67B0,00000000,00C45F58,?,?,00BA67B0,?,00B6B862,?,?), ref: 00B6BA50
                    • ShowWindow.USER32(00000000,00000004,?,00B6B862,?,?), ref: 00B6BA62
                    • EnableWindow.USER32(00000000,00000001), ref: 00B6BA86
                    • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00B6BAA9
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Window$Show$Enable$MessageSend
                    • String ID:
                    • API String ID: 642888154-0
                    • Opcode ID: ccaa7da5f9effefe6e12499ef81fc0fe571c576db0ad77fd250175f3190532e3
                    • Instruction ID: 22caddb13f6d3cd72fc70163555421da4763a498afc8cf6e1d4076af9222395d
                    • Opcode Fuzzy Hash: ccaa7da5f9effefe6e12499ef81fc0fe571c576db0ad77fd250175f3190532e3
                    • Instruction Fuzzy Hash: DC415030600241AFDB25CF94D489FA57BF1FB05314F1842F9EA48CF2A2CB79A885CB51
                    APIs
                    • GetForegroundWindow.USER32(?,?,?,?,?,?,00B55134,?,?,00000000,00000001), ref: 00B573BF
                      • Part of subcall function 00B53C94: GetWindowRect.USER32(?,?), ref: 00B53CA7
                    • GetDesktopWindow.USER32 ref: 00B573E9
                    • GetWindowRect.USER32(00000000), ref: 00B573F0
                    • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00B57422
                      • Part of subcall function 00B454E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00B4555E
                    • GetCursorPos.USER32(?), ref: 00B5744E
                    • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00B574AC
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                    • String ID:
                    • API String ID: 4137160315-0
                    • Opcode ID: 2de930f1899900409145e9d349b007f17d9fdd1995e25f98f36fc1b0e5930ff6
                    • Instruction ID: cf0f587d83e2e92f907f71d90b6899918a3b4bd105741faf2f0dac99a299648c
                    • Opcode Fuzzy Hash: 2de930f1899900409145e9d349b007f17d9fdd1995e25f98f36fc1b0e5930ff6
                    • Instruction Fuzzy Hash: 6131E872508306ABD720DF14E849F6BBBD9FF88314F000959F98597291CB74EE48CB92
                    APIs
                      • Part of subcall function 00B385F1: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00B38608
                      • Part of subcall function 00B385F1: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00B38612
                      • Part of subcall function 00B385F1: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00B38621
                      • Part of subcall function 00B385F1: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00B38628
                      • Part of subcall function 00B385F1: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00B3863E
                    • GetLengthSid.ADVAPI32(?,00000000,00B38977), ref: 00B38DAC
                    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00B38DB8
                    • HeapAlloc.KERNEL32(00000000), ref: 00B38DBF
                    • CopySid.ADVAPI32(00000000,00000000,?), ref: 00B38DD8
                    • GetProcessHeap.KERNEL32(00000000,00000000,00B38977), ref: 00B38DEC
                    • HeapFree.KERNEL32(00000000), ref: 00B38DF3
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                    • String ID:
                    • API String ID: 3008561057-0
                    • Opcode ID: f13972605876618edad8aad581e49a25c2ff01aa21d6218b44543f632ebb70c2
                    • Instruction ID: 2e370f00a01e7dda8f42715f7c3f994c77f2b09aa12f36609be664ac013593e9
                    • Opcode Fuzzy Hash: f13972605876618edad8aad581e49a25c2ff01aa21d6218b44543f632ebb70c2
                    • Instruction Fuzzy Hash: 2F11AC32500606FFDB109FA8DC09BBE7BA9FF55355F2040ADF945A7290CB76AA04CB61
                    APIs
                    • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00B38B2A
                    • OpenProcessToken.ADVAPI32(00000000), ref: 00B38B31
                    • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00B38B40
                    • CloseHandle.KERNEL32(00000004), ref: 00B38B4B
                    • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00B38B7A
                    • DestroyEnvironmentBlock.USERENV(00000000), ref: 00B38B8E
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                    • String ID:
                    • API String ID: 1413079979-0
                    • Opcode ID: 811197733cc0efffba45abfb7661ff25e2d46d6eddda0535e35fbb9e930649df
                    • Instruction ID: f75f0b12745f326d382d939200e1fa3d9b218a3e24d4e89d97e14a483baf823d
                    • Opcode Fuzzy Hash: 811197733cc0efffba45abfb7661ff25e2d46d6eddda0535e35fbb9e930649df
                    • Instruction Fuzzy Hash: 4D112EB250124AEBDF018F94ED49FEA7BE9EF08304F144065FE04A21A0DB769D609B61
                    APIs
                      • Part of subcall function 00AE12F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00AE134D
                      • Part of subcall function 00AE12F3: SelectObject.GDI32(?,00000000), ref: 00AE135C
                      • Part of subcall function 00AE12F3: BeginPath.GDI32(?), ref: 00AE1373
                      • Part of subcall function 00AE12F3: SelectObject.GDI32(?,00000000), ref: 00AE139C
                    • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 00B6C1C4
                    • LineTo.GDI32(00000000,00000003,?), ref: 00B6C1D8
                    • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00B6C1E6
                    • LineTo.GDI32(00000000,00000000,?), ref: 00B6C1F6
                    • EndPath.GDI32(00000000), ref: 00B6C206
                    • StrokePath.GDI32(00000000), ref: 00B6C216
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                    • String ID:
                    • API String ID: 43455801-0
                    • Opcode ID: 804c90cf422aebf56c4c1dec0948f23c4740f22b908d6f9f76b5cdb5f4513f89
                    • Instruction ID: 8cd16e08d27883a4dd74c8fe41a46401590a7902ea04cbdbeaf2257261b6db4f
                    • Opcode Fuzzy Hash: 804c90cf422aebf56c4c1dec0948f23c4740f22b908d6f9f76b5cdb5f4513f89
                    • Instruction Fuzzy Hash: 90113C7600010DBFDB019F90EC48EAA3FACEB08390F048021FA08561A1CB759D54DBA0
                    APIs
                    • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00B003D3
                    • MapVirtualKeyW.USER32(00000010,00000000), ref: 00B003DB
                    • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00B003E6
                    • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00B003F1
                    • MapVirtualKeyW.USER32(00000011,00000000), ref: 00B003F9
                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00B00401
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Virtual
                    • String ID:
                    • API String ID: 4278518827-0
                    • Opcode ID: 517ca263281c53b5cd76e9ce5941c5d4189d80b806d2477d0c36f1bf6c04b451
                    • Instruction ID: ff4cedb1693c875f1a013169fe2dec4a48fc6155a1e19358d6e329776e9987ff
                    • Opcode Fuzzy Hash: 517ca263281c53b5cd76e9ce5941c5d4189d80b806d2477d0c36f1bf6c04b451
                    • Instruction Fuzzy Hash: 3E016CB090175A7DE3008F5A8C85B52FFA8FF19354F00411BE15C47941C7F5A864CBE5
                    APIs
                    • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00B4569B
                    • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00B456B1
                    • GetWindowThreadProcessId.USER32(?,?), ref: 00B456C0
                    • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00B456CF
                    • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00B456D9
                    • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00B456E0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                    • String ID:
                    • API String ID: 839392675-0
                    • Opcode ID: 5650ad6f6cd7c755f8c0bf028e9a44cf6ce20cb531c20c2dd5312dc4d320ca95
                    • Instruction ID: 414e3891e124c2dcebdd22455ef94b2be46caf95dfff19e51f03648cdc339fc3
                    • Opcode Fuzzy Hash: 5650ad6f6cd7c755f8c0bf028e9a44cf6ce20cb531c20c2dd5312dc4d320ca95
                    • Instruction Fuzzy Hash: 20F01D3224155ABBE7215BA2EC0DEBB7A7CEBC7B51F000169FA04D20919AE91A01C6B5
                    APIs
                    • InterlockedExchange.KERNEL32(?,?), ref: 00B474E5
                    • EnterCriticalSection.KERNEL32(?,?,00AF1044,?,?), ref: 00B474F6
                    • TerminateThread.KERNEL32(00000000,000001F6,?,00AF1044,?,?), ref: 00B47503
                    • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00AF1044,?,?), ref: 00B47510
                      • Part of subcall function 00B46ED7: CloseHandle.KERNEL32(00000000,?,00B4751D,?,00AF1044,?,?), ref: 00B46EE1
                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 00B47523
                    • LeaveCriticalSection.KERNEL32(?,?,00AF1044,?,?), ref: 00B4752A
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                    • String ID:
                    • API String ID: 3495660284-0
                    • Opcode ID: 36380af025cf90736b0197be00d42c6664bb98cefdc1ed7b02c4f98e18a067de
                    • Instruction ID: e45742552b8170f26015bfaca98c85827c40262993935010d84e829a77c4c7dc
                    • Opcode Fuzzy Hash: 36380af025cf90736b0197be00d42c6664bb98cefdc1ed7b02c4f98e18a067de
                    • Instruction Fuzzy Hash: 71F03A3A184613ABDB112B64FC989EA776AFF45302B000571F202A60E0CFB95901DE50
                    APIs
                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00B38E7F
                    • UnloadUserProfile.USERENV(?,?), ref: 00B38E8B
                    • CloseHandle.KERNEL32(?), ref: 00B38E94
                    • CloseHandle.KERNEL32(?), ref: 00B38E9C
                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00B38EA5
                    • HeapFree.KERNEL32(00000000), ref: 00B38EAC
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                    • String ID:
                    • API String ID: 146765662-0
                    • Opcode ID: bfe19bd48bbae22b9b19d0ef5651086657162256bd9caa8a02ed807c39cd1e8b
                    • Instruction ID: a60ee33ee980f88e76009cce13fc4a0b19a4efabfa0329e68f67ceacbe9d9318
                    • Opcode Fuzzy Hash: bfe19bd48bbae22b9b19d0ef5651086657162256bd9caa8a02ed807c39cd1e8b
                    • Instruction Fuzzy Hash: 28E0C236004002FBDA011FE1FC0C92ABB69FB8A362B108230F229921B0CFBA9420DB50
                    APIs
                    • VariantInit.OLEAUT32(?), ref: 00B58928
                    • CharUpperBuffW.USER32(?,?), ref: 00B58A37
                    • VariantClear.OLEAUT32(?), ref: 00B58BAF
                      • Part of subcall function 00B47804: VariantInit.OLEAUT32(00000000), ref: 00B47844
                      • Part of subcall function 00B47804: VariantCopy.OLEAUT32(00000000,?), ref: 00B4784D
                      • Part of subcall function 00B47804: VariantClear.OLEAUT32(00000000), ref: 00B47859
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Variant$ClearInit$BuffCharCopyUpper
                    • String ID: AUTOIT.ERROR$Incorrect Parameter format
                    • API String ID: 4237274167-1221869570
                    • Opcode ID: 5276a2a1b09ac066f74529037035114c9d20a0f5025c17703876dcaecacd5b6c
                    • Instruction ID: d7ac0d8a3a7de9126755d73319bcc9e129ec0fa91666bb92b302c5dca5909c0c
                    • Opcode Fuzzy Hash: 5276a2a1b09ac066f74529037035114c9d20a0f5025c17703876dcaecacd5b6c
                    • Instruction Fuzzy Hash: 8C919F71608341DFC700DF25C584A6BBBE4EF88355F1449AEF88A9B362DB31E909CB52
                    APIs
                      • Part of subcall function 00AFFEC6: _wcscpy.LIBCMT ref: 00AFFEE9
                    • _memset.LIBCMT ref: 00B43077
                    • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00B430A6
                    • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00B43159
                    • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00B43187
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ItemMenu$Info$Default_memset_wcscpy
                    • String ID: 0
                    • API String ID: 4152858687-4108050209
                    • Opcode ID: 67562b1fc41169da8702d48797cfac68badce9eb41ee7b1732385239eb7f277d
                    • Instruction ID: 387458985d4b54453d5ba32eac353bf471625a13e5ba4e4de78561f7548988ee
                    • Opcode Fuzzy Hash: 67562b1fc41169da8702d48797cfac68badce9eb41ee7b1732385239eb7f277d
                    • Instruction Fuzzy Hash: A751E1716083009AD7159F28D845B6BBBE8EF55B20F080AAEF895E32D0DB74CF44E752
                    APIs
                    • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00B3DAC5
                    • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00B3DAFB
                    • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00B3DB0C
                    • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00B3DB8E
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ErrorMode$AddressCreateInstanceProc
                    • String ID: DllGetClassObject
                    • API String ID: 753597075-1075368562
                    • Opcode ID: ec9082dfa0ee425150dfef1e222d95c18613cbb9642b286471704e08b0087d39
                    • Instruction ID: 694890c346971b5ad84e53875edd2f9e66751e790753c1cea28f98dfed08b712
                    • Opcode Fuzzy Hash: ec9082dfa0ee425150dfef1e222d95c18613cbb9642b286471704e08b0087d39
                    • Instruction Fuzzy Hash: 8F417171600208EFDF15CF54E884A9ABBE9EF48350F2580E9ED059F255E7B1DA44CBA0
                    APIs
                    • _memset.LIBCMT ref: 00B42CAF
                    • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00B42CCB
                    • DeleteMenu.USER32(?,00000007,00000000), ref: 00B42D11
                    • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00BA6890,00000000), ref: 00B42D5A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Menu$Delete$InfoItem_memset
                    • String ID: 0
                    • API String ID: 1173514356-4108050209
                    • Opcode ID: 5888acecf46db86ce24dbf2761150a2621e447bad6d5b6d94e5cdef6f79a5b48
                    • Instruction ID: eb325c61fbd3b0ae531568d3209b618326d36afcd0d8c8003ee5d21ed921cbbc
                    • Opcode Fuzzy Hash: 5888acecf46db86ce24dbf2761150a2621e447bad6d5b6d94e5cdef6f79a5b48
                    • Instruction Fuzzy Hash: F741A3705043029FDB10DF24DC85B1AB7E4EF85324F5446ADF966972D1DB70EA04EB92
                    APIs
                    • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00B5DAD9
                      • Part of subcall function 00AE79AB: _memmove.LIBCMT ref: 00AE79F9
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: BuffCharLower_memmove
                    • String ID: cdecl$none$stdcall$winapi
                    • API String ID: 3425801089-567219261
                    • Opcode ID: 65d1ddc9789ab44cd91342bcf0d7075767f6203e2a033c6c09bb51661aee0626
                    • Instruction ID: 21d8e8ca3c3b95c7f377fff0a27016f41529c479432b0f30e604cb4060c5c21a
                    • Opcode Fuzzy Hash: 65d1ddc9789ab44cd91342bcf0d7075767f6203e2a033c6c09bb51661aee0626
                    • Instruction Fuzzy Hash: 3531A17190421AABCF10EF64CD81AAEB7F5FF15310F1087A9E865976D1CB71A909CB90
                    APIs
                      • Part of subcall function 00AE7F41: _memmove.LIBCMT ref: 00AE7F82
                      • Part of subcall function 00B3B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00B3B0E7
                    • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00B393F6
                    • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00B39409
                    • SendMessageW.USER32(?,00000189,?,00000000), ref: 00B39439
                      • Part of subcall function 00AE7D2C: _memmove.LIBCMT ref: 00AE7D66
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: MessageSend$_memmove$ClassName
                    • String ID: ComboBox$ListBox
                    • API String ID: 365058703-1403004172
                    • Opcode ID: ae5917a111b6278fa8b42477471c6b46ec415fb51fa115dbf994c7ba52388998
                    • Instruction ID: d0e13a275eb2e43b5ff0b9bd6c0254cddbee0f68d988972b96647054a67e7069
                    • Opcode Fuzzy Hash: ae5917a111b6278fa8b42477471c6b46ec415fb51fa115dbf994c7ba52388998
                    • Instruction Fuzzy Hash: C221B171904104BADB28AB75DC85CFFB7A8DF45360F2041A9F926972E1DBB94E0A9620
                    APIs
                    • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00B51B40
                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00B51B66
                    • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00B51B96
                    • InternetCloseHandle.WININET(00000000), ref: 00B51BDD
                      • Part of subcall function 00B52777: GetLastError.KERNEL32(?,?,00B51B0B,00000000,00000000,00000001), ref: 00B5278C
                      • Part of subcall function 00B52777: SetEvent.KERNEL32(?,?,00B51B0B,00000000,00000000,00000001), ref: 00B527A1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                    • String ID:
                    • API String ID: 3113390036-3916222277
                    • Opcode ID: fdabef68c7b9660d2f9d10b136b3df20b074a8fdd397d08d9e13c8d6ffdc144c
                    • Instruction ID: 11837403e21247b366bff5038e7933658333a944a160fa964306ac7ba924e693
                    • Opcode Fuzzy Hash: fdabef68c7b9660d2f9d10b136b3df20b074a8fdd397d08d9e13c8d6ffdc144c
                    • Instruction Fuzzy Hash: 2E21BEB1500209BFEB119F289CC5FBB77ECEB4974AF1005EAF905A7240EA649D089761
                    APIs
                      • Part of subcall function 00AE1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00AE1D73
                      • Part of subcall function 00AE1D35: GetStockObject.GDI32(00000011), ref: 00AE1D87
                      • Part of subcall function 00AE1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00AE1D91
                    • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00B666D0
                    • LoadLibraryW.KERNEL32(?), ref: 00B666D7
                    • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00B666EC
                    • DestroyWindow.USER32(?), ref: 00B666F4
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                    • String ID: SysAnimate32
                    • API String ID: 4146253029-1011021900
                    • Opcode ID: 08ba6a998a96465365f09b250ef2ebf5506fb336186588103ccbf016bd42d694
                    • Instruction ID: 3b6437d2b6022df26a1e712c451f2e9d689d439a6d7b86be537003df8483fcbc
                    • Opcode Fuzzy Hash: 08ba6a998a96465365f09b250ef2ebf5506fb336186588103ccbf016bd42d694
                    • Instruction Fuzzy Hash: DD216AB1600206ABEF104F64EC81EFB77EDEB59368F104669FA11931A0DBB9DC519760
                    APIs
                    • GetStdHandle.KERNEL32(0000000C), ref: 00B4705E
                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00B47091
                    • GetStdHandle.KERNEL32(0000000C), ref: 00B470A3
                    • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00B470DD
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: CreateHandle$FilePipe
                    • String ID: nul
                    • API String ID: 4209266947-2873401336
                    • Opcode ID: dbf56367c000ddac8b3fc686775ee6e8b0e569a035069d7e6d6f50187b6fff1a
                    • Instruction ID: a3b734090e98891a498dc30cec303d0cd25346353e379bf40c1d6b43cbe511d5
                    • Opcode Fuzzy Hash: dbf56367c000ddac8b3fc686775ee6e8b0e569a035069d7e6d6f50187b6fff1a
                    • Instruction Fuzzy Hash: 3221817454520AABDF209F78DC05A9A77E8FF45720F204AA9FCA0D73D0DBB09A40DB51
                    APIs
                    • GetStdHandle.KERNEL32(000000F6), ref: 00B4712B
                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00B4715D
                    • GetStdHandle.KERNEL32(000000F6), ref: 00B4716E
                    • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00B471A8
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: CreateHandle$FilePipe
                    • String ID: nul
                    • API String ID: 4209266947-2873401336
                    • Opcode ID: d4c8018f9d968666574bdefa0d0cdd8dc805a3399157393c670fab7fc03ddb46
                    • Instruction ID: a7df1dbf79c6c7ef89e76c0bb35a75470dc82e945c2c0a3c04fe8e5906049a20
                    • Opcode Fuzzy Hash: d4c8018f9d968666574bdefa0d0cdd8dc805a3399157393c670fab7fc03ddb46
                    • Instruction Fuzzy Hash: 2021C5755843069BDF209F689C44AAAB7E8EF55730F200A99FCB0E32D0DF709A41DB51
                    APIs
                    • SetErrorMode.KERNEL32(00000001), ref: 00B4AEBF
                    • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00B4AF13
                    • __swprintf.LIBCMT ref: 00B4AF2C
                    • SetErrorMode.KERNEL32(00000000,00000001,00000000,00B6F910), ref: 00B4AF6A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ErrorMode$InformationVolume__swprintf
                    • String ID: %lu
                    • API String ID: 3164766367-685833217
                    • Opcode ID: 1a239c70344bfa97c3c275c6b2bc7a4052fd9063cd2521002630941a4ae92d6c
                    • Instruction ID: afd56fec415a2b000895479b4f2f6b301c47a28df144d1dfd4b553c468a21e9b
                    • Opcode Fuzzy Hash: 1a239c70344bfa97c3c275c6b2bc7a4052fd9063cd2521002630941a4ae92d6c
                    • Instruction Fuzzy Hash: 28214130A00249AFCB10DF65DD85DEE7BF8EF49704B1040A9F909EB251DB71EA45DB61
                    APIs
                      • Part of subcall function 00AE7D2C: _memmove.LIBCMT ref: 00AE7D66
                      • Part of subcall function 00B3A37C: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00B3A399
                      • Part of subcall function 00B3A37C: GetWindowThreadProcessId.USER32(?,00000000), ref: 00B3A3AC
                      • Part of subcall function 00B3A37C: GetCurrentThreadId.KERNEL32 ref: 00B3A3B3
                      • Part of subcall function 00B3A37C: AttachThreadInput.USER32(00000000), ref: 00B3A3BA
                    • GetFocus.USER32 ref: 00B3A554
                      • Part of subcall function 00B3A3C5: GetParent.USER32(?), ref: 00B3A3D3
                    • GetClassNameW.USER32(?,?,00000100), ref: 00B3A59D
                    • EnumChildWindows.USER32(?,00B3A615), ref: 00B3A5C5
                    • __swprintf.LIBCMT ref: 00B3A5DF
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                    • String ID: %s%d
                    • API String ID: 1941087503-1110647743
                    • Opcode ID: ef0385e5388935738956f4a4337184a798aeaf260b71b9ff749c93044f19530e
                    • Instruction ID: 5b6bfa6168142791da5d3a4b6fd5ca06d6cdb920050563161b84fcb09941249e
                    • Opcode Fuzzy Hash: ef0385e5388935738956f4a4337184a798aeaf260b71b9ff749c93044f19530e
                    • Instruction Fuzzy Hash: 5811AF71604209ABDF10BF64EC8AFFA37B8AF48700F2440B5F948AA192CA7559458B75
                    APIs
                    • CharUpperBuffW.USER32(?,?), ref: 00B42048
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: BuffCharUpper
                    • String ID: APPEND$EXISTS$KEYS$REMOVE
                    • API String ID: 3964851224-769500911
                    • Opcode ID: e896710dd04b178d483ddc0b11166a243969051f0e8fcbfd849e36628c37565f
                    • Instruction ID: fbe40cdae612deef70cabbc877a89c788a378115e0f420adfc94a39915cf13b5
                    • Opcode Fuzzy Hash: e896710dd04b178d483ddc0b11166a243969051f0e8fcbfd849e36628c37565f
                    • Instruction Fuzzy Hash: CF1139319101199FCF00EFA4D9815AEB7F4FF26304F5085E8E855A7392EB326A06EB50
                    APIs
                    • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00B5EF1B
                    • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00B5EF4B
                    • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00B5F07E
                    • CloseHandle.KERNEL32(?), ref: 00B5F0FF
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Process$CloseCountersHandleInfoMemoryOpen
                    • String ID:
                    • API String ID: 2364364464-0
                    • Opcode ID: c0861e24de3c23b7f27f3c648de6e407ccb46b034dcbf89fa479578e76e244e8
                    • Instruction ID: a9fbab13bff9741229de76450bcbb317e60808341128039bd938723391102156
                    • Opcode Fuzzy Hash: c0861e24de3c23b7f27f3c648de6e407ccb46b034dcbf89fa479578e76e244e8
                    • Instruction Fuzzy Hash: 90816FB16043019FD720EF29C986B2AB7E5EF48710F14886DF999DB292DBB0ED058B51
                    APIs
                      • Part of subcall function 00AE7F41: _memmove.LIBCMT ref: 00AE7F82
                      • Part of subcall function 00B610A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B60038,?,?), ref: 00B610BC
                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B60388
                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00B603C7
                    • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00B6040E
                    • RegCloseKey.ADVAPI32(?,?), ref: 00B6043A
                    • RegCloseKey.ADVAPI32(00000000), ref: 00B60447
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                    • String ID:
                    • API String ID: 3440857362-0
                    • Opcode ID: 07e2483a62de7a5eb5e89a911a040ed83f2af1b6e5adf356ade2dda83e231835
                    • Instruction ID: c846f851292bf3601ecff966e150963381672cd6bfa6ebe90f5017908d74012f
                    • Opcode Fuzzy Hash: 07e2483a62de7a5eb5e89a911a040ed83f2af1b6e5adf356ade2dda83e231835
                    • Instruction Fuzzy Hash: B6516731218245AFD704EF65D981E6FB7E8FF88304F04896DF596872A2DB74E904CB52
                    APIs
                      • Part of subcall function 00AE9997: __itow.LIBCMT ref: 00AE99C2
                      • Part of subcall function 00AE9997: __swprintf.LIBCMT ref: 00AE9A0C
                    • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00B5DC3B
                    • GetProcAddress.KERNEL32(00000000,?), ref: 00B5DCBE
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00B5DCDA
                    • GetProcAddress.KERNEL32(00000000,?), ref: 00B5DD1B
                    • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00B5DD35
                      • Part of subcall function 00AE5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00B47B20,?,?,00000000), ref: 00AE5B8C
                      • Part of subcall function 00AE5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00B47B20,?,?,00000000,?,?), ref: 00AE5BB0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                    • String ID:
                    • API String ID: 327935632-0
                    • Opcode ID: e15f6714e37449ce999a58b5a70fb092829f05293e4119b6b36e3353a50e70cb
                    • Instruction ID: 6797020acafb76e12e079a78e87e6c3d6ecf95f4900afd77668056551b8b78ae
                    • Opcode Fuzzy Hash: e15f6714e37449ce999a58b5a70fb092829f05293e4119b6b36e3353a50e70cb
                    • Instruction Fuzzy Hash: 53514935A00205DFCB10EF68C584AAEB7F4FF49311B1481A9E815AB362DB70ED45CF90
                    APIs
                    • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00B4E88A
                    • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00B4E8B3
                    • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00B4E8F2
                      • Part of subcall function 00AE9997: __itow.LIBCMT ref: 00AE99C2
                      • Part of subcall function 00AE9997: __swprintf.LIBCMT ref: 00AE9A0C
                    • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00B4E917
                    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00B4E91F
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                    • String ID:
                    • API String ID: 1389676194-0
                    • Opcode ID: e9c9eebe82e0a3f79b05c29d347db237c563404ff8feebd8304a79bc6ff7145c
                    • Instruction ID: 2e95a3a261a1c0145d9a821767a96f67e26fdf79dab3a75d28e0f89a5a67f007
                    • Opcode Fuzzy Hash: e9c9eebe82e0a3f79b05c29d347db237c563404ff8feebd8304a79bc6ff7145c
                    • Instruction Fuzzy Hash: 6F510A35A00245EFCF05EF65C9819AEBBF5FF48314B1480A9E949AB3A2DB31ED11DB50
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5099b1a8b1b46bda84eda4c344958c7fbdf517669aa0e874dafa0b4c04b4a218
                    • Instruction ID: 2fb22d3cb1523ca05b60b045093cb877aaa6537bd471f0c4a9ef22de2fdf578c
                    • Opcode Fuzzy Hash: 5099b1a8b1b46bda84eda4c344958c7fbdf517669aa0e874dafa0b4c04b4a218
                    • Instruction Fuzzy Hash: 4541B235900104ABDB10DF28DC98FB9BBE8FB09310F1441A5E866B73E1DB78AD41DE55
                    APIs
                    • GetCursorPos.USER32(?), ref: 00AE2357
                    • ScreenToClient.USER32(00BA67B0,?), ref: 00AE2374
                    • GetAsyncKeyState.USER32(00000001), ref: 00AE2399
                    • GetAsyncKeyState.USER32(00000002), ref: 00AE23A7
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: AsyncState$ClientCursorScreen
                    • String ID:
                    • API String ID: 4210589936-0
                    • Opcode ID: a09779fe503f6c2126f166f0c112dfd92ef8f2b1c879ec1dd6134f56320d03d2
                    • Instruction ID: ab58e08fca7b8fd5c3fa5c55aea6935eddaff53c95b9c550040853c6fcc3abc7
                    • Opcode Fuzzy Hash: a09779fe503f6c2126f166f0c112dfd92ef8f2b1c879ec1dd6134f56320d03d2
                    • Instruction Fuzzy Hash: 44418E3150415AFBDF159F69C844BE9BBB8FB05320F20436AF829A62A0C774AD90DF91
                    APIs
                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00B3695D
                    • TranslateAcceleratorW.USER32(?,?,?), ref: 00B369A9
                    • TranslateMessage.USER32(?), ref: 00B369D2
                    • DispatchMessageW.USER32(?), ref: 00B369DC
                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00B369EB
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Message$PeekTranslate$AcceleratorDispatch
                    • String ID:
                    • API String ID: 2108273632-0
                    • Opcode ID: 3da3e5031b56dba6ce852ffd0be1ec18658f0fdf8c686ae89892864efd3075d6
                    • Instruction ID: 8abca749482a7b9912b7c7e58bcc4435181b8622ebc81368579737f2d08baaf9
                    • Opcode Fuzzy Hash: 3da3e5031b56dba6ce852ffd0be1ec18658f0fdf8c686ae89892864efd3075d6
                    • Instruction Fuzzy Hash: 5831E571904246BADB21CF74DC85BB67BECEB16300F2482A5E421C71A0DB74D885D790
                    APIs
                    • GetWindowRect.USER32(?,?), ref: 00B38F12
                    • PostMessageW.USER32(?,00000201,00000001), ref: 00B38FBC
                    • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00B38FC4
                    • PostMessageW.USER32(?,00000202,00000000), ref: 00B38FD2
                    • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00B38FDA
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: MessagePostSleep$RectWindow
                    • String ID:
                    • API String ID: 3382505437-0
                    • Opcode ID: aa1819a4e56e37303691b3835a64007582147734f37220e2fea185486aa474bc
                    • Instruction ID: d1a69ae2a42c37ede75609c29da105fedc79f4d9f58537aa8d619e80ee305b35
                    • Opcode Fuzzy Hash: aa1819a4e56e37303691b3835a64007582147734f37220e2fea185486aa474bc
                    • Instruction Fuzzy Hash: 9B31E07150021AEFDF00CF68D94CAAE7BB6FB04315F204669F924EB1D0CBB49910CB91
                    APIs
                    • IsWindowVisible.USER32(?), ref: 00B3B6C7
                    • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00B3B6E4
                    • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00B3B71C
                    • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00B3B742
                    • _wcsstr.LIBCMT ref: 00B3B74C
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                    • String ID:
                    • API String ID: 3902887630-0
                    • Opcode ID: fced4b920132af128fe77f144e3defaa179f5b69d013efdd27acd3c4a64bdfa1
                    • Instruction ID: 2747b0c480f4b58001abf48848958848dae971312b8e0260a0969b3074f5002c
                    • Opcode Fuzzy Hash: fced4b920132af128fe77f144e3defaa179f5b69d013efdd27acd3c4a64bdfa1
                    • Instruction Fuzzy Hash: C5210732204204BAEB255B39EC4AE7B7BD8DF85710F2040ADF905CA1A5EF65CC4092A0
                    APIs
                      • Part of subcall function 00AE2612: GetWindowLongW.USER32(?,000000EB), ref: 00AE2623
                    • GetWindowLongW.USER32(?,000000F0), ref: 00B6B44C
                    • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 00B6B471
                    • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00B6B489
                    • GetSystemMetrics.USER32(00000004), ref: 00B6B4B2
                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00B51184,00000000), ref: 00B6B4D0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Window$Long$MetricsSystem
                    • String ID:
                    • API String ID: 2294984445-0
                    • Opcode ID: 7f5704a267e931129c011b26a29b24b24cf7402de3bc978d66d5a2afdda7faf2
                    • Instruction ID: 9ac40388bdcf1d9bd3ea6cd9a0d34d733a2e701f4c0c334ed571482142944c1e
                    • Opcode Fuzzy Hash: 7f5704a267e931129c011b26a29b24b24cf7402de3bc978d66d5a2afdda7faf2
                    • Instruction Fuzzy Hash: 8A216071514256AFCB109F389C44E6A37E4FB05720B144779F926D72E1EF389890DB90
                    APIs
                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00B39802
                      • Part of subcall function 00AE7D2C: _memmove.LIBCMT ref: 00AE7D66
                    • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00B39834
                    • __itow.LIBCMT ref: 00B3984C
                    • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00B39874
                    • __itow.LIBCMT ref: 00B39885
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: MessageSend$__itow$_memmove
                    • String ID:
                    • API String ID: 2983881199-0
                    • Opcode ID: 5cb11c68208e2760b12a209a0620253aefdb127d7e8056376f3812501a8aa664
                    • Instruction ID: 0fa226f9fadd5026301607061ffe05d7e27fcde736c9f93f891e4519335fedc3
                    • Opcode Fuzzy Hash: 5cb11c68208e2760b12a209a0620253aefdb127d7e8056376f3812501a8aa664
                    • Instruction Fuzzy Hash: 7D21C531B00244BBDB109A65DC8AEAE7BE8EF8A750F1400A9F904DB291DAB08D41C7A1
                    APIs
                    • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00AE134D
                    • SelectObject.GDI32(?,00000000), ref: 00AE135C
                    • BeginPath.GDI32(?), ref: 00AE1373
                    • SelectObject.GDI32(?,00000000), ref: 00AE139C
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ObjectSelect$BeginCreatePath
                    • String ID:
                    • API String ID: 3225163088-0
                    • Opcode ID: a131847c3b908001d029bbc27369447c25539c5af05acd15460c0e841515d202
                    • Instruction ID: 0b89d42393cb608581bd8ca65b81d5e85d2d74006a87ea4fdf93366104a67f2a
                    • Opcode Fuzzy Hash: a131847c3b908001d029bbc27369447c25539c5af05acd15460c0e841515d202
                    • Instruction Fuzzy Hash: A12160B0900256EFDB108F26EC057A97BBDFB11721F184226F8109B1E0DBB99891DB90
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: _memcmp
                    • String ID:
                    • API String ID: 2931989736-0
                    • Opcode ID: d2163d3ce5a9684874646cc4fa77f9cbf629a2a9a09df5fe0fa9f6a28731af51
                    • Instruction ID: 4da7c571c91ca85e603397d853411738e6b78722d5eeacdd2cfb12f62d04f480
                    • Opcode Fuzzy Hash: d2163d3ce5a9684874646cc4fa77f9cbf629a2a9a09df5fe0fa9f6a28731af51
                    • Instruction Fuzzy Hash: 8D01B9726046057BD218A6645C52F7B7FDCDB213D4F1480A1FD14B6293EB61EE11A3E4
                    APIs
                    • GetCurrentThreadId.KERNEL32 ref: 00B44D5C
                    • __beginthreadex.LIBCMT ref: 00B44D7A
                    • MessageBoxW.USER32(?,?,?,?), ref: 00B44D8F
                    • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00B44DA5
                    • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00B44DAC
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                    • String ID:
                    • API String ID: 3824534824-0
                    • Opcode ID: d1df664ec6a9f0fe3aaa2722c34c584d970eddd3505b5a4d1d5d1b23e0a67e81
                    • Instruction ID: e27f1f5b792eea81f23f97dadcbbc2556c71c19cd2be221b9219f857bf0691a7
                    • Opcode Fuzzy Hash: d1df664ec6a9f0fe3aaa2722c34c584d970eddd3505b5a4d1d5d1b23e0a67e81
                    • Instruction Fuzzy Hash: 521108B2D04245BBC7119FA8EC04BAB7FECEB46320F1442B9F914D3291DBB58D1087A0
                    APIs
                    • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00B38766
                    • GetLastError.KERNEL32(?,00B3822A,?,?,?), ref: 00B38770
                    • GetProcessHeap.KERNEL32(00000008,?,?,00B3822A,?,?,?), ref: 00B3877F
                    • HeapAlloc.KERNEL32(00000000,?,00B3822A,?,?,?), ref: 00B38786
                    • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00B3879D
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                    • String ID:
                    • API String ID: 842720411-0
                    • Opcode ID: 5d0e6bd4494906c63e6dd9779e41df2380384ad8e0eedc1c04933d706b98d2e4
                    • Instruction ID: 93ef8699e65a717b676c4bfcc437ab95ff550f8e9eb576fbf32cbab62bda8b1f
                    • Opcode Fuzzy Hash: 5d0e6bd4494906c63e6dd9779e41df2380384ad8e0eedc1c04933d706b98d2e4
                    • Instruction Fuzzy Hash: CC014F71600205EFDB104FA5EC48D677BADFF86395B200469F949C3260DE758C10CA60
                    APIs
                    • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00B45502
                    • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00B45510
                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00B45518
                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00B45522
                    • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00B4555E
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: PerformanceQuery$CounterSleep$Frequency
                    • String ID:
                    • API String ID: 2833360925-0
                    • Opcode ID: 4389b844d0347753cf5e079553695ea9eb01f8a7c2b99ace8590d6e90e07f61d
                    • Instruction ID: 7de786e574efed333247297c9a5b81ecba3262e016c2898c56e4a613db46309c
                    • Opcode Fuzzy Hash: 4389b844d0347753cf5e079553695ea9eb01f8a7c2b99ace8590d6e90e07f61d
                    • Instruction Fuzzy Hash: 91010936D00A1EDBCF109BE8E888AFDBBB9FB19711F400096E905B2151DB745654DBA1
                    APIs
                    • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00B3758C,80070057,?,?,?,00B3799D), ref: 00B3766F
                    • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00B3758C,80070057,?,?), ref: 00B3768A
                    • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00B3758C,80070057,?,?), ref: 00B37698
                    • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00B3758C,80070057,?), ref: 00B376A8
                    • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00B3758C,80070057,?,?), ref: 00B376B4
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: From$Prog$FreeStringTasklstrcmpi
                    • String ID:
                    • API String ID: 3897988419-0
                    • Opcode ID: a50a525222cfb2857c32c71201424e425fb65fcd8ba9538b2e0b534798071ce9
                    • Instruction ID: 7c3cc9905375e8db397964e4806cea9867d0115d9a945e3b472ff736fc324252
                    • Opcode Fuzzy Hash: a50a525222cfb2857c32c71201424e425fb65fcd8ba9538b2e0b534798071ce9
                    • Instruction Fuzzy Hash: 5301B1B2604605BBDB208F99EC45AAA7BECEB44751F2040A8FD04D3211EF75DD0087A0
                    APIs
                    • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00B38608
                    • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00B38612
                    • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00B38621
                    • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00B38628
                    • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00B3863E
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: HeapInformationToken$AllocErrorLastProcess
                    • String ID:
                    • API String ID: 44706859-0
                    • Opcode ID: bcd8dc414f8079873e8c81cd30f8015ea36db8788162472c7c4063b395e2c1aa
                    • Instruction ID: 944597a9d90be6f922da197278c37633567ca48de5a2fa01e5f5a3f3386a7238
                    • Opcode Fuzzy Hash: bcd8dc414f8079873e8c81cd30f8015ea36db8788162472c7c4063b395e2c1aa
                    • Instruction Fuzzy Hash: 50F04931241305AFEB100FA5EC8AE7B3BACEF8A794F100469FA49D7190CFA59C41DA61
                    APIs
                    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00B38669
                    • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00B38673
                    • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00B38682
                    • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00B38689
                    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00B3869F
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: HeapInformationToken$AllocErrorLastProcess
                    • String ID:
                    • API String ID: 44706859-0
                    • Opcode ID: 46d52ff915d62103fe86bb4d80a5300352aa4e00e586a1dc43ad1b73c1159fd5
                    • Instruction ID: fe0662423256520705804e57f0e8d30e6af9a68b99a55758700e5eaca07566b3
                    • Opcode Fuzzy Hash: 46d52ff915d62103fe86bb4d80a5300352aa4e00e586a1dc43ad1b73c1159fd5
                    • Instruction Fuzzy Hash: 54F04FB1200305AFEB111FA5EC89E773BACEF8A754F200065F945D7190CEA9D941DA61
                    APIs
                    • GetDlgItem.USER32(?,000003E9), ref: 00B3C6BA
                    • GetWindowTextW.USER32(00000000,?,00000100), ref: 00B3C6D1
                    • MessageBeep.USER32(00000000), ref: 00B3C6E9
                    • KillTimer.USER32(?,0000040A), ref: 00B3C705
                    • EndDialog.USER32(?,00000001), ref: 00B3C71F
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: BeepDialogItemKillMessageTextTimerWindow
                    • String ID:
                    • API String ID: 3741023627-0
                    • Opcode ID: 770482a12882d8a54e2bdda421fbf91ffe9a7cdb82f215e11f41b0de9cca8187
                    • Instruction ID: f036a800a66dac23d333ff3df05a24c539d141ea4f0b9b0e607cfd11d7cec952
                    • Opcode Fuzzy Hash: 770482a12882d8a54e2bdda421fbf91ffe9a7cdb82f215e11f41b0de9cca8187
                    • Instruction Fuzzy Hash: 8D014F30500705ABEB21AB64ED8EBA67BB8FB00745F1006A9F542A24E1DBE5AD54CF90
                    APIs
                    • EndPath.GDI32(?), ref: 00AE13BF
                    • StrokeAndFillPath.GDI32(?,?,00B1BAD8,00000000,?), ref: 00AE13DB
                    • SelectObject.GDI32(?,00000000), ref: 00AE13EE
                    • DeleteObject.GDI32 ref: 00AE1401
                    • StrokePath.GDI32(?), ref: 00AE141C
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Path$ObjectStroke$DeleteFillSelect
                    • String ID:
                    • API String ID: 2625713937-0
                    • Opcode ID: 3811e276d042b2e6a93f0eab4b10873850ee937fce218d860687b28765043c03
                    • Instruction ID: c247d33ce331849defb4b50e7e2715744c18dbcc165954448e9dd4ddc82bd3b7
                    • Opcode Fuzzy Hash: 3811e276d042b2e6a93f0eab4b10873850ee937fce218d860687b28765043c03
                    • Instruction Fuzzy Hash: 4DF0FFB4004349EBDB155F26EC0D7683FA9A712726F08C226F4298A1F1CF794995DF51
                    APIs
                    • CoInitialize.OLE32(00000000), ref: 00B4C69D
                    • CoCreateInstance.OLE32(00B72D6C,00000000,00000001,00B72BDC,?), ref: 00B4C6B5
                      • Part of subcall function 00AE7F41: _memmove.LIBCMT ref: 00AE7F82
                    • CoUninitialize.OLE32 ref: 00B4C922
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: CreateInitializeInstanceUninitialize_memmove
                    • String ID: .lnk
                    • API String ID: 2683427295-24824748
                    • Opcode ID: 6c942b0c09e2a6a7ac5f8be56038f71b8d48d443e8fd475b57c34531afcf1cc3
                    • Instruction ID: 1463151c15a2d2e4ed3ad9989889e6f940f22dc6883d9466e5e532f0c27e5ff5
                    • Opcode Fuzzy Hash: 6c942b0c09e2a6a7ac5f8be56038f71b8d48d443e8fd475b57c34531afcf1cc3
                    • Instruction Fuzzy Hash: 3DA13DB1108345AFD700EF65C991EAFB7E8EF94744F00496CF1569B1A2EB70EA09CB52
                    APIs
                      • Part of subcall function 00B00FF6: std::exception::exception.LIBCMT ref: 00B0102C
                      • Part of subcall function 00B00FF6: __CxxThrowException@8.LIBCMT ref: 00B01041
                      • Part of subcall function 00AE7F41: _memmove.LIBCMT ref: 00AE7F82
                      • Part of subcall function 00AE7BB1: _memmove.LIBCMT ref: 00AE7C0B
                    • __swprintf.LIBCMT ref: 00AF302D
                    Strings
                    • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00AF2EC6
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                    • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                    • API String ID: 1943609520-557222456
                    • Opcode ID: 71571d0fbd4c13b32df1f2ba9b027477d1f72918b1bccd1e5af8153f41041aee
                    • Instruction ID: 9ad0a96ad3f96fe8ea8b05c7dbfcb93cacc06d2eb795829139ef23f65868edb0
                    • Opcode Fuzzy Hash: 71571d0fbd4c13b32df1f2ba9b027477d1f72918b1bccd1e5af8153f41041aee
                    • Instruction Fuzzy Hash: 8F918D325083559FCB18EF64DA85C7EB7E4EF85740F00495EF9869B2A1EA20EE44CB52
                    APIs
                      • Part of subcall function 00AE48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00AE48A1,?,?,00AE37C0,?), ref: 00AE48CE
                    • CoInitialize.OLE32(00000000), ref: 00B4BC26
                    • CoCreateInstance.OLE32(00B72D6C,00000000,00000001,00B72BDC,?), ref: 00B4BC3F
                    • CoUninitialize.OLE32 ref: 00B4BC5C
                      • Part of subcall function 00AE9997: __itow.LIBCMT ref: 00AE99C2
                      • Part of subcall function 00AE9997: __swprintf.LIBCMT ref: 00AE9A0C
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                    • String ID: .lnk
                    • API String ID: 2126378814-24824748
                    • Opcode ID: bd28a97321b08e2124a42e979b8e562425352c4c7fdccc79c477b5127596cd7c
                    • Instruction ID: f6357d2599319e39d0cc36befe0f5fc9026bd5a86ee31a4752455230402513fc
                    • Opcode Fuzzy Hash: bd28a97321b08e2124a42e979b8e562425352c4c7fdccc79c477b5127596cd7c
                    • Instruction Fuzzy Hash: A4A154756043419FCB00DF25C584E6ABBE5FF88314F148998F99A9B3A2CB31EE45CB91
                    APIs
                    • __startOneArgErrorHandling.LIBCMT ref: 00B052DD
                      • Part of subcall function 00B10340: __87except.LIBCMT ref: 00B1037B
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ErrorHandling__87except__start
                    • String ID: pow
                    • API String ID: 2905807303-2276729525
                    • Opcode ID: ebf5dee7f7a5d27c6ac60a8430355a4c6073794e1134fa6f854dc745e1f9ead2
                    • Instruction ID: c3f0686ad4dde34c881bf8281b47e2eb12191facd80092f98a037301ef603311
                    • Opcode Fuzzy Hash: ebf5dee7f7a5d27c6ac60a8430355a4c6073794e1134fa6f854dc745e1f9ead2
                    • Instruction Fuzzy Hash: 8E513B21A2D60187D7317724D9813BF2FE4DF00750FA049D8E09A866E5EEB48CD49E4A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID:
                    • String ID: #$+
                    • API String ID: 0-2552117581
                    • Opcode ID: 43a8e6954e139e522e74beacaf0189725226d10e3f21262a9506228d70dddb39
                    • Instruction ID: 5d4e9c75761b9263e1a667f68873513168546bccd020d622f4acf610b4574abf
                    • Opcode Fuzzy Hash: 43a8e6954e139e522e74beacaf0189725226d10e3f21262a9506228d70dddb39
                    • Instruction Fuzzy Hash: FA5101755046469FDF26AF29D888AFE7BE4FF19310F2440A5EC919B2E0DB349D42CB60
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: _memset$_memmove
                    • String ID: ERCP
                    • API String ID: 2532777613-1384759551
                    • Opcode ID: 9cff7d90b3edefcbedddc6009d94ec0d46b6d91dc42e5744e8a00d128476c3ac
                    • Instruction ID: ae2c22e81e36854755efee6a740aacf2128a7987e1b0caddfa66bc9b6f4f8740
                    • Opcode Fuzzy Hash: 9cff7d90b3edefcbedddc6009d94ec0d46b6d91dc42e5744e8a00d128476c3ac
                    • Instruction Fuzzy Hash: 6551A5719007099BDB24DF95C981BEABBF8EF04715F2085AEEA4ADB241E771D584CB40
                    APIs
                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00B6F910,00000000,?,?,?,?), ref: 00B67C4E
                    • GetWindowLongW.USER32 ref: 00B67C6B
                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00B67C7B
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Window$Long
                    • String ID: SysTreeView32
                    • API String ID: 847901565-1698111956
                    • Opcode ID: a01bf71fd0abf4bc1594198557fb3b02c0bff71912bf1dce3ac4e0bb623b08cd
                    • Instruction ID: 02ff54d31defc5d78dca0117606a7c2d10764faa0dd34c855dd8c8e06ad24695
                    • Opcode Fuzzy Hash: a01bf71fd0abf4bc1594198557fb3b02c0bff71912bf1dce3ac4e0bb623b08cd
                    • Instruction Fuzzy Hash: B3319C31244206ABDB118F38DC45BEA77E9EB49328F244765F875A32E0DB39EC919B50
                    APIs
                    • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00B676D0
                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00B676E4
                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00B67708
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: MessageSend$Window
                    • String ID: SysMonthCal32
                    • API String ID: 2326795674-1439706946
                    • Opcode ID: dd135e73f5253f3dd1dd28d1a4e2db2101d518efb61590fe558f65311d0d96eb
                    • Instruction ID: e4dfebb0af720eae67136ba89d7507b5796bacfcf47b5b71079701f95d9cf0ba
                    • Opcode Fuzzy Hash: dd135e73f5253f3dd1dd28d1a4e2db2101d518efb61590fe558f65311d0d96eb
                    • Instruction Fuzzy Hash: 4A21D132544219BBDF11CFA4CC86FEA3BB9EF48718F110254FE156B1D0DAB5AC508BA0
                    APIs
                    • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00B66FAA
                    • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00B66FBA
                    • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00B66FDF
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: MessageSend$MoveWindow
                    • String ID: Listbox
                    • API String ID: 3315199576-2633736733
                    • Opcode ID: aca76ee4f15a160f4680b79f94eb3513477bcd731495ba963a7f0d925746b0b8
                    • Instruction ID: 8e1be360e57057e1fb1a99a728ed958d6a073f2b8e2ce1c0016f99f2e09a76d7
                    • Opcode Fuzzy Hash: aca76ee4f15a160f4680b79f94eb3513477bcd731495ba963a7f0d925746b0b8
                    • Instruction Fuzzy Hash: 7D21A172610118BFDF118F54EC85FBB3BAAEF89764F018164FA149B1A0CA75AC51CBA0
                    APIs
                    • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00B679E1
                    • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00B679F6
                    • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00B67A03
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID: msctls_trackbar32
                    • API String ID: 3850602802-1010561917
                    • Opcode ID: e01dbfedd46639750f31f50128811a1df2f53d88217163de0a73ee7ad9f45187
                    • Instruction ID: 94c8f9b565d32d8dab937902f6ef040a16d0ac1ea58243a25838fdfd8d8071c2
                    • Opcode Fuzzy Hash: e01dbfedd46639750f31f50128811a1df2f53d88217163de0a73ee7ad9f45187
                    • Instruction Fuzzy Hash: F211E772294208BADF109F70CC45FAB37E9EF89768F110519FA41A70E0D6759851CB60
                    APIs
                    • LoadLibraryA.KERNEL32(kernel32.dll,?,00AE4C2E), ref: 00AE4CA3
                    • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00AE4CB5
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: GetNativeSystemInfo$kernel32.dll
                    • API String ID: 2574300362-192647395
                    • Opcode ID: ae78e103a9072c715cd90e514ce4c5a5ce414fd68712f2c0ffb9763b5ead8d6b
                    • Instruction ID: 961b373b067470ea6a2e4ca6a1ddb77357daf7c7e44338afbed0a6aeb64919e5
                    • Opcode Fuzzy Hash: ae78e103a9072c715cd90e514ce4c5a5ce414fd68712f2c0ffb9763b5ead8d6b
                    • Instruction Fuzzy Hash: 44D05B30510723CFD7209F32ED5871676D9AF05791B25CC7DD885D71A0DBB8D480C650
                    APIs
                    • LoadLibraryA.KERNEL32(kernel32.dll,?,00AE4CE1,?), ref: 00AE4DA2
                    • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00AE4DB4
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                    • API String ID: 2574300362-1355242751
                    • Opcode ID: efabf278cbcba020795a061cfa151a61db1097236187ba5013bea9c2ab3be3aa
                    • Instruction ID: e81970fa7f96051af6408d891ebe2fd32f4e755e1f86689a5e90b9e1cae49b4c
                    • Opcode Fuzzy Hash: efabf278cbcba020795a061cfa151a61db1097236187ba5013bea9c2ab3be3aa
                    • Instruction Fuzzy Hash: 5AD01231550713CFD7209F31EC4879676D8AF09395B158879D8C5D61A0DBB4D480C650
                    APIs
                    • LoadLibraryA.KERNEL32(kernel32.dll,?,00AE4D2E,?,00AE4F4F,?,00BA62F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00AE4D6F
                    • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00AE4D81
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                    • API String ID: 2574300362-3689287502
                    • Opcode ID: 90bc526678b3d974d2ed80ce7a431afc6b3ff18cd68c54b441c85ce90e8f7100
                    • Instruction ID: ab134ef772330e332d65d35ea9094aa66300b3dffabf0f6d3ada002062bf616d
                    • Opcode Fuzzy Hash: 90bc526678b3d974d2ed80ce7a431afc6b3ff18cd68c54b441c85ce90e8f7100
                    • Instruction Fuzzy Hash: 99D01230510753CFD7209F31EC4876676D8BF1A391B158879D486D66A0DAB4D480CA50
                    APIs
                    • LoadLibraryA.KERNEL32(advapi32.dll,?,00B612C1), ref: 00B61080
                    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00B61092
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: RegDeleteKeyExW$advapi32.dll
                    • API String ID: 2574300362-4033151799
                    • Opcode ID: 7f5afdec3733b0844c8078e6abfc5eb4b47a198e5b15da5f1563daa52a0074a7
                    • Instruction ID: a3eb2e0a6d4b3d2fad2ef996e2185fe2989a73109381b9fc70ee8aea8cb78abe
                    • Opcode Fuzzy Hash: 7f5afdec3733b0844c8078e6abfc5eb4b47a198e5b15da5f1563daa52a0074a7
                    • Instruction Fuzzy Hash: 1CD01231510713CFDB205F35E918A2676E4EF05791B15DC79E585D61A0DBB8C4C0C650
                    APIs
                    • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00B59009,?,00B6F910), ref: 00B59403
                    • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00B59415
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: GetModuleHandleExW$kernel32.dll
                    • API String ID: 2574300362-199464113
                    • Opcode ID: a9aaf494437667c0b579ae24ca2e5d41b27e4ae9ce2cb6cfd859f01ec653f6dc
                    • Instruction ID: f4ef858ec8468322d6a32f72f0c36b92b5aaffb22828e17cdd6f8a4f00d5badc
                    • Opcode Fuzzy Hash: a9aaf494437667c0b579ae24ca2e5d41b27e4ae9ce2cb6cfd859f01ec653f6dc
                    • Instruction Fuzzy Hash: F5D01734514713CFDB209F31E90971676E5EF06392B15C8BAE886E66A0EAB8C884DA50
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: LocalTime__swprintf
                    • String ID: %.3d$WIN_XPe
                    • API String ID: 2070861257-2409531811
                    • Opcode ID: 3a0c8c9c2155c705731cf54ee1d29ceb5d89b27a0f7dc7a0ca1cb27ae3c89afe
                    • Instruction ID: c07b68cde15da104a931ffedfb1af1484e95cc77a999d0d09a55c11ecb18db68
                    • Opcode Fuzzy Hash: 3a0c8c9c2155c705731cf54ee1d29ceb5d89b27a0f7dc7a0ca1cb27ae3c89afe
                    • Instruction Fuzzy Hash: 40D01271C08168EACB049B94AC888F977FCAB18311F1049E2F90A92040F2749B859B21
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7af0f85e6ad9413c4e28454049037190cd52bf66e1cd0bce691a31c7451c9669
                    • Instruction ID: 46ad21119fbe3951d4964e5acfbffe6b980953710c658191b0f9e63e8ac3b3d4
                    • Opcode Fuzzy Hash: 7af0f85e6ad9413c4e28454049037190cd52bf66e1cd0bce691a31c7451c9669
                    • Instruction Fuzzy Hash: 36C12AB5A44216EFCB24CF94C884AAEB7F5FF48714B2186D9E805EB251DB30DD41DB90
                    APIs
                    • CharLowerBuffW.USER32(?,?), ref: 00B5E3D2
                    • CharLowerBuffW.USER32(?,?), ref: 00B5E415
                      • Part of subcall function 00B5DAB9: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00B5DAD9
                    • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 00B5E615
                    • _memmove.LIBCMT ref: 00B5E628
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: BuffCharLower$AllocVirtual_memmove
                    • String ID:
                    • API String ID: 3659485706-0
                    • Opcode ID: 6f871fd23712f36f9fa5a70cbeebbd50d964a4afded71a191fe9fedc642eb7c1
                    • Instruction ID: 0d40eb06b7f30e4f6b88423d22ccf05e0a991b4f7fe072514947f8ff4a7a31b9
                    • Opcode Fuzzy Hash: 6f871fd23712f36f9fa5a70cbeebbd50d964a4afded71a191fe9fedc642eb7c1
                    • Instruction Fuzzy Hash: 0BC16E716083519FC714DF28C480A6ABBE4FF48714F1489ADF8A99B351D771EA49CF82
                    APIs
                    • CoInitialize.OLE32(00000000), ref: 00B583D8
                    • CoUninitialize.OLE32 ref: 00B583E3
                      • Part of subcall function 00B3DA5D: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00B3DAC5
                    • VariantInit.OLEAUT32(?), ref: 00B583EE
                    • VariantClear.OLEAUT32(?), ref: 00B586BF
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                    • String ID:
                    • API String ID: 780911581-0
                    • Opcode ID: c4ee31dd4444de55f5c143eb680898727195754424dc4a5f2b38d92de285736c
                    • Instruction ID: bc3bacf87ce59e9eb88ce345283954a762e9a4ad0a89af83c076656020fdd512
                    • Opcode Fuzzy Hash: c4ee31dd4444de55f5c143eb680898727195754424dc4a5f2b38d92de285736c
                    • Instruction Fuzzy Hash: 06A138752047419FDB10EF15C581B2AB7E4FF88355F144499F99AAB3A2DB30ED04CB92
                    APIs
                    • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00B72C7C,?), ref: 00B37C32
                    • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00B72C7C,?), ref: 00B37C4A
                    • CLSIDFromProgID.OLE32(?,?,00000000,00B6FB80,000000FF,?,00000000,00000800,00000000,?,00B72C7C,?), ref: 00B37C6F
                    • _memcmp.LIBCMT ref: 00B37C90
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: FromProg$FreeTask_memcmp
                    • String ID:
                    • API String ID: 314563124-0
                    • Opcode ID: 71652806e55dcf5b3d2b01084ac8ba6e50e6f8fcd2cf6f3e868fcf336a20bf1f
                    • Instruction ID: 0580430ede6ec63d305d1729a194f53b921de634b15d8120947333508c138565
                    • Opcode Fuzzy Hash: 71652806e55dcf5b3d2b01084ac8ba6e50e6f8fcd2cf6f3e868fcf336a20bf1f
                    • Instruction Fuzzy Hash: EE811B75A00109EFCB14DF94C994EEEB7F9FF89315F208198E515AB250DB71AE05CB60
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Variant$AllocClearCopyInitString
                    • String ID:
                    • API String ID: 2808897238-0
                    • Opcode ID: aaeeb6c3fe0460dda47b8b4dd4b18efcc936c390785019cef40d0ddbf1740842
                    • Instruction ID: 18c7c8d946595dd0f374338f15548202ead568223d4ac85b5db8ec95c3322778
                    • Opcode Fuzzy Hash: aaeeb6c3fe0460dda47b8b4dd4b18efcc936c390785019cef40d0ddbf1740842
                    • Instruction Fuzzy Hash: F551E374658302AADB34AF69D8D5A3EB3E4EF48310F30C85FE596DB691DF7098449B01
                    APIs
                    • GetWindowRect.USER32(00C4EFA8,?), ref: 00B69AD2
                    • ScreenToClient.USER32(00000002,00000002), ref: 00B69B05
                    • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00B69B72
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Window$ClientMoveRectScreen
                    • String ID:
                    • API String ID: 3880355969-0
                    • Opcode ID: b42b58221e872786aa25e2fe1b11cad22d6d362c6f7219a7e8879f5b91c594a6
                    • Instruction ID: e3f9292b2c5113088b50d3fef46fdb427a41661e5a788c99ba78a46ab06aef99
                    • Opcode Fuzzy Hash: b42b58221e872786aa25e2fe1b11cad22d6d362c6f7219a7e8879f5b91c594a6
                    • Instruction Fuzzy Hash: 2E515374A00209EFCF10DF64D9819AE7BF9FF55760F1481A9F8259B2A0D774AD41CB50
                    APIs
                    • socket.WSOCK32(00000002,00000002,00000011), ref: 00B56CE4
                    • WSAGetLastError.WSOCK32(00000000), ref: 00B56CF4
                      • Part of subcall function 00AE9997: __itow.LIBCMT ref: 00AE99C2
                      • Part of subcall function 00AE9997: __swprintf.LIBCMT ref: 00AE9A0C
                    • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00B56D58
                    • WSAGetLastError.WSOCK32(00000000), ref: 00B56D64
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ErrorLast$__itow__swprintfsocket
                    • String ID:
                    • API String ID: 2214342067-0
                    • Opcode ID: c9c065983f39e988a569054ecf0b594e73f0d522d26f64dcfef3b6cd69ba14c5
                    • Instruction ID: d15af0c4aa295c3fda9538ed2f9c901a8c86d711bbbc40eba8616e732bbf0d8a
                    • Opcode Fuzzy Hash: c9c065983f39e988a569054ecf0b594e73f0d522d26f64dcfef3b6cd69ba14c5
                    • Instruction Fuzzy Hash: 9141B474740300AFEB20AF25DD86F3A77E5EF48B10F4484A8FA599B2D2DAB49C008791
                    APIs
                    • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,00B6F910), ref: 00B567BA
                    • _strlen.LIBCMT ref: 00B567EC
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: _strlen
                    • String ID:
                    • API String ID: 4218353326-0
                    • Opcode ID: 4bfaab9e345672cc62553544a1e86b8cd5835c8d28c9859efc638332fdd15078
                    • Instruction ID: 9bc3209db138c25907fe2269156ae668b21d7c2706585a2a7a93ddc2261696d5
                    • Opcode Fuzzy Hash: 4bfaab9e345672cc62553544a1e86b8cd5835c8d28c9859efc638332fdd15078
                    • Instruction Fuzzy Hash: 0B41C231A00204AFCB14EB65DDC5FAEB7E8EF58314F6481E9F8169B292DB30AD04C750
                    APIs
                    • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00B4BB09
                    • GetLastError.KERNEL32(?,00000000), ref: 00B4BB2F
                    • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00B4BB54
                    • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00B4BB80
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: CreateHardLink$DeleteErrorFileLast
                    • String ID:
                    • API String ID: 3321077145-0
                    • Opcode ID: 597cf25d6fc8f58c7a7d84db7afc700f903e950fc8f7d06538b9a8f072f46a11
                    • Instruction ID: 26644e1e0b6ef7ba58a353546be6fe6163d6098e543b85cb6c473746785411f9
                    • Opcode Fuzzy Hash: 597cf25d6fc8f58c7a7d84db7afc700f903e950fc8f7d06538b9a8f072f46a11
                    • Instruction Fuzzy Hash: 99412639200651DFCB10EF16C684A5EBBE1EF89310B198498F94A9B362CB34FD01DB91
                    APIs
                    • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00B68B4D
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: InvalidateRect
                    • String ID:
                    • API String ID: 634782764-0
                    • Opcode ID: 6aaef161731937ec2e1aa22beace1994b7d8d0d4a0cbe2a0a98687a66f24e01e
                    • Instruction ID: abde132d305ed000db8088a69b3687d8bcc1a85baede9f486f289bea0ce9bfe1
                    • Opcode Fuzzy Hash: 6aaef161731937ec2e1aa22beace1994b7d8d0d4a0cbe2a0a98687a66f24e01e
                    • Instruction Fuzzy Hash: 2C31C6B4604204BFEF209F58DC99FA937E5EB0A310F284796FA51D72E0CE7AA9409751
                    APIs
                    • ClientToScreen.USER32(?,?), ref: 00B6AE1A
                    • GetWindowRect.USER32(?,?), ref: 00B6AE90
                    • PtInRect.USER32(?,?,00B6C304), ref: 00B6AEA0
                    • MessageBeep.USER32(00000000), ref: 00B6AF11
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Rect$BeepClientMessageScreenWindow
                    • String ID:
                    • API String ID: 1352109105-0
                    • Opcode ID: e0bf70e12609bd632dd2269faa0e7c8d8c45aa2b72ee42ca5cdf0253aeee5416
                    • Instruction ID: d3d408702d16d216539ff60a079007f1b13fef55247b212730b7576b2fe4908b
                    • Opcode Fuzzy Hash: e0bf70e12609bd632dd2269faa0e7c8d8c45aa2b72ee42ca5cdf0253aeee5416
                    • Instruction Fuzzy Hash: 4E417C70600119DFCF11DF58D885A69BBF5FB49740F2881A9E419EB291DB39A901CF92
                    APIs
                    • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00B41037
                    • SetKeyboardState.USER32(00000080,?,00000001), ref: 00B41053
                    • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00B410B9
                    • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00B4110B
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: KeyboardState$InputMessagePostSend
                    • String ID:
                    • API String ID: 432972143-0
                    • Opcode ID: 4fd23db7dd16ce90bf92e9802d03043fe6eed989c840534836657e3d4056457f
                    • Instruction ID: f9900cb58a98c31039288a3e66c40f6ef9b3b44f912efde1260ecded46f3e532
                    • Opcode Fuzzy Hash: 4fd23db7dd16ce90bf92e9802d03043fe6eed989c840534836657e3d4056457f
                    • Instruction Fuzzy Hash: 8C314830E40688AEFF348B6D8C05BF9BBE9EB54310F04469AE591522D1C3748FC0B752
                    APIs
                    • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 00B41176
                    • SetKeyboardState.USER32(00000080,?,00008000), ref: 00B41192
                    • PostMessageW.USER32(00000000,00000101,00000000), ref: 00B411F1
                    • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 00B41243
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: KeyboardState$InputMessagePostSend
                    • String ID:
                    • API String ID: 432972143-0
                    • Opcode ID: b0aa1c14f892fd4b42b4e950eec54bf1cf22890478689e6b07d3a905dc24e275
                    • Instruction ID: 4619fb0d459d0f05b41a81f8a041138e02030f88efd23b29526e1f22960df8a6
                    • Opcode Fuzzy Hash: b0aa1c14f892fd4b42b4e950eec54bf1cf22890478689e6b07d3a905dc24e275
                    • Instruction Fuzzy Hash: 3531E730E407186AEF20DB6D88097FA7BFAEB49310F044B9AE695A21D1C3784FD5A751
                    APIs
                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00B1644B
                    • __isleadbyte_l.LIBCMT ref: 00B16479
                    • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00B164A7
                    • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00B164DD
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                    • String ID:
                    • API String ID: 3058430110-0
                    • Opcode ID: 1225fef7fea8ee32df0c449a5c3965ff625078ba648ce5e9ecccf395b191966e
                    • Instruction ID: ecd32a87e3a528b7540f6566095908c579cf34567d97dfdce29b2fdc0fb6907c
                    • Opcode Fuzzy Hash: 1225fef7fea8ee32df0c449a5c3965ff625078ba648ce5e9ecccf395b191966e
                    • Instruction Fuzzy Hash: F831EF31600256AFDB21CF69CC84BFA7BE9FF41310F5540A9E864872A0EB31D990DB90
                    APIs
                    • GetForegroundWindow.USER32 ref: 00B65189
                      • Part of subcall function 00B4387D: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00B43897
                      • Part of subcall function 00B4387D: GetCurrentThreadId.KERNEL32 ref: 00B4389E
                      • Part of subcall function 00B4387D: AttachThreadInput.USER32(00000000,?,00B452A7), ref: 00B438A5
                    • GetCaretPos.USER32(?), ref: 00B6519A
                    • ClientToScreen.USER32(00000000,?), ref: 00B651D5
                    • GetForegroundWindow.USER32 ref: 00B651DB
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                    • String ID:
                    • API String ID: 2759813231-0
                    • Opcode ID: 022fe638ec98703ee93eabaadee479c0fcb108ffb2dd035cba63ff19951166d5
                    • Instruction ID: 73ab733be9f919ca3309dbae34db9e5a8e7b4c3dc008057f68a5c59ab390e74c
                    • Opcode Fuzzy Hash: 022fe638ec98703ee93eabaadee479c0fcb108ffb2dd035cba63ff19951166d5
                    • Instruction Fuzzy Hash: 7831F0B1900248AFDB10EFA5DD859EFB7F9EF98300F1040AAE415E7251EA759E45CBA0
                    APIs
                      • Part of subcall function 00AE2612: GetWindowLongW.USER32(?,000000EB), ref: 00AE2623
                    • GetCursorPos.USER32(?), ref: 00B6C7C2
                    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00B1BBFB,?,?,?,?,?), ref: 00B6C7D7
                    • GetCursorPos.USER32(?), ref: 00B6C824
                    • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00B1BBFB,?,?,?), ref: 00B6C85E
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Cursor$LongMenuPopupProcTrackWindow
                    • String ID:
                    • API String ID: 2864067406-0
                    • Opcode ID: 53054d03954daa9bfe9543269fe7db497f9db59003c6191642ef71c1e565641d
                    • Instruction ID: 943c33076804059a11f459f4f759633aa14a900eeb83d7f4fbbdf89fe8ad93ff
                    • Opcode Fuzzy Hash: 53054d03954daa9bfe9543269fe7db497f9db59003c6191642ef71c1e565641d
                    • Instruction Fuzzy Hash: 11317436600018AFCB25CF59D898EFA7FFAEB49710F0481A9F9458B2A1C7399D50DF60
                    APIs
                      • Part of subcall function 00B38652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00B38669
                      • Part of subcall function 00B38652: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00B38673
                      • Part of subcall function 00B38652: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00B38682
                      • Part of subcall function 00B38652: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00B38689
                      • Part of subcall function 00B38652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00B3869F
                    • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00B38BEB
                    • _memcmp.LIBCMT ref: 00B38C0E
                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00B38C44
                    • HeapFree.KERNEL32(00000000), ref: 00B38C4B
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                    • String ID:
                    • API String ID: 1592001646-0
                    • Opcode ID: 584e2572523d6d9a41a234fee6b6515f1a0188f3326ed0d0b57e9c8c492e563e
                    • Instruction ID: ba476d31aa104a0f6c94b7104e6f2213611aad75e28f95e2cb5974fc5e22e031
                    • Opcode Fuzzy Hash: 584e2572523d6d9a41a234fee6b6515f1a0188f3326ed0d0b57e9c8c492e563e
                    • Instruction Fuzzy Hash: 1D21AC71E01209EFCB00CFA4C955BEEB7F8EF40340F644099E554A7240EB75AE06CB61
                    APIs
                    • __setmode.LIBCMT ref: 00B00BF2
                      • Part of subcall function 00AE5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00B47B20,?,?,00000000), ref: 00AE5B8C
                      • Part of subcall function 00AE5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00B47B20,?,?,00000000,?,?), ref: 00AE5BB0
                    • _fprintf.LIBCMT ref: 00B00C29
                    • OutputDebugStringW.KERNEL32(?), ref: 00B36331
                      • Part of subcall function 00B04CDA: _flsall.LIBCMT ref: 00B04CF3
                    • __setmode.LIBCMT ref: 00B00C5E
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                    • String ID:
                    • API String ID: 521402451-0
                    • Opcode ID: 1f2f1f0095dcc4cec0dc7af73b04f314ecaf62ffca501c34fbc85307eeae5608
                    • Instruction ID: 3e61ef3332ff1028db49140622369d58750dd1e2ea44ee2951adf2ba4813e04f
                    • Opcode Fuzzy Hash: 1f2f1f0095dcc4cec0dc7af73b04f314ecaf62ffca501c34fbc85307eeae5608
                    • Instruction Fuzzy Hash: 8A1136729042047EDB14B7B9AC83ABE7FE8DF45320F1441EAF204971E2DF605D819795
                    APIs
                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00B51A97
                      • Part of subcall function 00B51B21: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00B51B40
                      • Part of subcall function 00B51B21: InternetCloseHandle.WININET(00000000), ref: 00B51BDD
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Internet$CloseConnectHandleOpen
                    • String ID:
                    • API String ID: 1463438336-0
                    • Opcode ID: b43e1c6aff52642442f693a0874e3eaa08e656bb127c4622d487e7f96ef11153
                    • Instruction ID: a3a54a688ea6424f55e61200a96e03b8c1890a1be87c9546922a447ff7c6a0a9
                    • Opcode Fuzzy Hash: b43e1c6aff52642442f693a0874e3eaa08e656bb127c4622d487e7f96ef11153
                    • Instruction Fuzzy Hash: 4721A135201601BFEB129F649C41FBAB7EDFF48702F14489AFE1196690EB71D8199BA0
                    APIs
                      • Part of subcall function 00B3F5AD: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00B3E1C4,?,?,?,00B3EFB7,00000000,000000EF,00000119,?,?), ref: 00B3F5BC
                      • Part of subcall function 00B3F5AD: lstrcpyW.KERNEL32(00000000,?), ref: 00B3F5E2
                      • Part of subcall function 00B3F5AD: lstrcmpiW.KERNEL32(00000000,?,00B3E1C4,?,?,?,00B3EFB7,00000000,000000EF,00000119,?,?), ref: 00B3F613
                    • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00B3EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 00B3E1DD
                    • lstrcpyW.KERNEL32(00000000,?), ref: 00B3E203
                    • lstrcmpiW.KERNEL32(00000002,cdecl,?,00B3EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 00B3E237
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: lstrcmpilstrcpylstrlen
                    • String ID: cdecl
                    • API String ID: 4031866154-3896280584
                    • Opcode ID: 1f3f17a48eedb3095a99f4deb378e8645b77d8b66a4a7e0b9129fc56638cf98b
                    • Instruction ID: 2bc4aacc7403d0385bd6e70c2bd8d33622cdad797c3da4738d2b85682a56d787
                    • Opcode Fuzzy Hash: 1f3f17a48eedb3095a99f4deb378e8645b77d8b66a4a7e0b9129fc56638cf98b
                    • Instruction Fuzzy Hash: 25117C36200246EFCB25AF64DC45A7A77E9FF85350F50406AF816CB2A0EB71D85197A0
                    APIs
                    • _free.LIBCMT ref: 00B15351
                      • Part of subcall function 00B0594C: __FF_MSGBANNER.LIBCMT ref: 00B05963
                      • Part of subcall function 00B0594C: __NMSG_WRITE.LIBCMT ref: 00B0596A
                      • Part of subcall function 00B0594C: RtlAllocateHeap.NTDLL(00C30000,00000000,00000001,00000000,?,?,?,00B01013,?), ref: 00B0598F
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: AllocateHeap_free
                    • String ID:
                    • API String ID: 614378929-0
                    • Opcode ID: 7327a4a365135e57d398200337be830b629918c0e995769377ed7aee2e484b06
                    • Instruction ID: 112af60bd330b5efad37ce6e00cf22fd459141d7790801eed3403caa22541a62
                    • Opcode Fuzzy Hash: 7327a4a365135e57d398200337be830b629918c0e995769377ed7aee2e484b06
                    • Instruction Fuzzy Hash: 0F112B32404A05EFCB312F70BC4569D3BD8AF903E0B6046BAF456D71D0DFB48A809758
                    APIs
                    • _memset.LIBCMT ref: 00AE4560
                      • Part of subcall function 00AE410D: _memset.LIBCMT ref: 00AE418D
                      • Part of subcall function 00AE410D: _wcscpy.LIBCMT ref: 00AE41E1
                      • Part of subcall function 00AE410D: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00AE41F1
                    • KillTimer.USER32(?,00000001,?,?), ref: 00AE45B5
                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00AE45C4
                    • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00B1D6CE
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                    • String ID:
                    • API String ID: 1378193009-0
                    • Opcode ID: a22c094a71bffb9a857dd9f64cb9b735a0d420ff7f236607b4c2a71ff02f3f79
                    • Instruction ID: 1d676b0e8d2551e128f040a4480d117ad45372cf8ef2a53c8e0bf6c07f48f0f0
                    • Opcode Fuzzy Hash: a22c094a71bffb9a857dd9f64cb9b735a0d420ff7f236607b4c2a71ff02f3f79
                    • Instruction Fuzzy Hash: A521A4B0904794AFEB328B24DC95BFBBBEC9F05308F44009EE69E57281C7B45E849B51
                    APIs
                      • Part of subcall function 00AE5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00B47B20,?,?,00000000), ref: 00AE5B8C
                      • Part of subcall function 00AE5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00B47B20,?,?,00000000,?,?), ref: 00AE5BB0
                    • gethostbyname.WSOCK32(?,?,?), ref: 00B566AC
                    • WSAGetLastError.WSOCK32(00000000), ref: 00B566B7
                    • _memmove.LIBCMT ref: 00B566E4
                    • inet_ntoa.WSOCK32(?), ref: 00B566EF
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                    • String ID:
                    • API String ID: 1504782959-0
                    • Opcode ID: 319298e7f82e7b89aea2533dd5a977f9bca97ffafed963cb59b536d0e1666e5f
                    • Instruction ID: 64dd76a0e3782dfd066717969bcbd9b1bac5394e83fe577d6b18dd5f16c94f9e
                    • Opcode Fuzzy Hash: 319298e7f82e7b89aea2533dd5a977f9bca97ffafed963cb59b536d0e1666e5f
                    • Instruction Fuzzy Hash: B8116035900509AFCB04EBA5EE86DEEB7B8EF48315B1440A5F906A71A1DF70AE04CB61
                    APIs
                    • SendMessageW.USER32(?,000000B0,?,?), ref: 00B39043
                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00B39055
                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00B3906B
                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00B39086
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID:
                    • API String ID: 3850602802-0
                    • Opcode ID: bc923fea257c710168e751a87ba1695bcd09334a65d7bc7396e3f2133814e421
                    • Instruction ID: 8fc3c433ebc54917c623648ba786a58fc22c8dd28a37e6b77e695a42b272e342
                    • Opcode Fuzzy Hash: bc923fea257c710168e751a87ba1695bcd09334a65d7bc7396e3f2133814e421
                    • Instruction Fuzzy Hash: E5112E79901218FFDB11DFA5CD85EADBBB4FB48710F204095E904B7290D6716E50DB94
                    APIs
                      • Part of subcall function 00AE2612: GetWindowLongW.USER32(?,000000EB), ref: 00AE2623
                    • DefDlgProcW.USER32(?,00000020,?), ref: 00AE12D8
                    • GetClientRect.USER32(?,?), ref: 00B1B84B
                    • GetCursorPos.USER32(?), ref: 00B1B855
                    • ScreenToClient.USER32(?,?), ref: 00B1B860
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Client$CursorLongProcRectScreenWindow
                    • String ID:
                    • API String ID: 4127811313-0
                    • Opcode ID: c551057a020ed67b37da770552268b385e9952fbd753f248f92bbf2dcde03965
                    • Instruction ID: 7dca236a59ed3cc1f23b626d0ca23c5183f76a6a885bac5386e92b78f7bf8245
                    • Opcode Fuzzy Hash: c551057a020ed67b37da770552268b385e9952fbd753f248f92bbf2dcde03965
                    • Instruction Fuzzy Hash: AE11283590006AABCB00DF95DC859FE77B8FB05300F1004A6FA11E7150CB74BA528BA5
                    APIs
                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00B401FD,?,00B41250,?,00008000), ref: 00B4166F
                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00B401FD,?,00B41250,?,00008000), ref: 00B41694
                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00B401FD,?,00B41250,?,00008000), ref: 00B4169E
                    • Sleep.KERNEL32(?,?,?,?,?,?,?,00B401FD,?,00B41250,?,00008000), ref: 00B416D1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: CounterPerformanceQuerySleep
                    • String ID:
                    • API String ID: 2875609808-0
                    • Opcode ID: 97ecf11aebee225ada30420e5eebcfe7d0a3e913fed1d9e86bf20e819e1efaa6
                    • Instruction ID: 2470bcd13c9db3226db277cd06118e18992711576ec26db09e7a9d71b98418f0
                    • Opcode Fuzzy Hash: 97ecf11aebee225ada30420e5eebcfe7d0a3e913fed1d9e86bf20e819e1efaa6
                    • Instruction Fuzzy Hash: DB113031C0151DD7CF009FA9E984AFEBBB8FF09751F064495D940B6180CB749690AB95
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                    • String ID:
                    • API String ID: 3016257755-0
                    • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                    • Instruction ID: fe5fb4c47473e8db816b6e24c9bac1773000a4dbbf5a8eff2f6a0eb9acdd3b5a
                    • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                    • Instruction Fuzzy Hash: 2501833208414ABBCF125E84DC41CEE3FB2FF2A350B948595FA1856031CA37C9B2AB81
                    APIs
                    • GetWindowRect.USER32(?,?), ref: 00B6B59E
                    • ScreenToClient.USER32(?,?), ref: 00B6B5B6
                    • ScreenToClient.USER32(?,?), ref: 00B6B5DA
                    • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00B6B5F5
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ClientRectScreen$InvalidateWindow
                    • String ID:
                    • API String ID: 357397906-0
                    • Opcode ID: d863e93303c86fded5daac16233debf2eb3440d871c0c93d8a33ecf736aac8c8
                    • Instruction ID: 5469daecd0f32b4b52c115811a33fdc510cf178a81b6e4de7fc20f8cc5486d8f
                    • Opcode Fuzzy Hash: d863e93303c86fded5daac16233debf2eb3440d871c0c93d8a33ecf736aac8c8
                    • Instruction Fuzzy Hash: 331164B5D0020AEFDB01DF99D4449EEBBF9FB18310F104166E915E3260D775AA51CF50
                    APIs
                    • _memset.LIBCMT ref: 00B6B8FE
                    • _memset.LIBCMT ref: 00B6B90D
                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00BA7F20,00BA7F64), ref: 00B6B93C
                    • CloseHandle.KERNEL32 ref: 00B6B94E
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: _memset$CloseCreateHandleProcess
                    • String ID:
                    • API String ID: 3277943733-0
                    • Opcode ID: 226e37064d3f91b93836efc34057c3af7621d1bf81ff870883610c7d0ebba3b3
                    • Instruction ID: c321da806bd86b548593c9d52f0d0291935c508b840ea67891ac81121196398c
                    • Opcode Fuzzy Hash: 226e37064d3f91b93836efc34057c3af7621d1bf81ff870883610c7d0ebba3b3
                    • Instruction Fuzzy Hash: 46F0F4B258C3957FE2106765AC4AF7B7ADCDB0A754F004061FA08D62D1EF765A1087A8
                    APIs
                    • EnterCriticalSection.KERNEL32(?), ref: 00B46E88
                      • Part of subcall function 00B4794E: _memset.LIBCMT ref: 00B47983
                    • _memmove.LIBCMT ref: 00B46EAB
                    • _memset.LIBCMT ref: 00B46EB8
                    • LeaveCriticalSection.KERNEL32(?), ref: 00B46EC8
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: CriticalSection_memset$EnterLeave_memmove
                    • String ID:
                    • API String ID: 48991266-0
                    • Opcode ID: 8aee7bac81a3d7da60c96ed3a085a04e3d4ac3d46ddcf602f7d8e1b0b807fe88
                    • Instruction ID: 1ee9e9d9cda023490a5d297dc34efa06e76e8be079eead73101bcf3e0c3cd3aa
                    • Opcode Fuzzy Hash: 8aee7bac81a3d7da60c96ed3a085a04e3d4ac3d46ddcf602f7d8e1b0b807fe88
                    • Instruction Fuzzy Hash: 57F0543A104210BBCF016F55EC85A59BB69EF45320B0480A1FE085F256CB75A911DBB4
                    APIs
                      • Part of subcall function 00AE12F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00AE134D
                      • Part of subcall function 00AE12F3: SelectObject.GDI32(?,00000000), ref: 00AE135C
                      • Part of subcall function 00AE12F3: BeginPath.GDI32(?), ref: 00AE1373
                      • Part of subcall function 00AE12F3: SelectObject.GDI32(?,00000000), ref: 00AE139C
                    • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00B6C030
                    • LineTo.GDI32(00000000,?,?), ref: 00B6C03D
                    • EndPath.GDI32(00000000), ref: 00B6C04D
                    • StrokePath.GDI32(00000000), ref: 00B6C05B
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                    • String ID:
                    • API String ID: 1539411459-0
                    • Opcode ID: 87dd5e4ea60c584ce43e04515a6bf92906390de53dd9c60f8e54d2693575b98e
                    • Instruction ID: 9c138d8a6a5b68d71202e8b7bd39d6b53cb24069aa7d9324d6f5c630ccfa64da
                    • Opcode Fuzzy Hash: 87dd5e4ea60c584ce43e04515a6bf92906390de53dd9c60f8e54d2693575b98e
                    • Instruction Fuzzy Hash: D6F0BE3100525ABBDB122F51AC0AFEE3F98AF06310F044011FA11620E28BBD0550CFE5
                    APIs
                    • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00B3A399
                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 00B3A3AC
                    • GetCurrentThreadId.KERNEL32 ref: 00B3A3B3
                    • AttachThreadInput.USER32(00000000), ref: 00B3A3BA
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                    • String ID:
                    • API String ID: 2710830443-0
                    • Opcode ID: 23f85a4531b5114d610ee98d583248c7b770aab80b7d0b19688df76eb56a12c2
                    • Instruction ID: 4831b1530dab8663f2a2af69dd35c73df4e941837471dcf4a978cdc3b79a2f3b
                    • Opcode Fuzzy Hash: 23f85a4531b5114d610ee98d583248c7b770aab80b7d0b19688df76eb56a12c2
                    • Instruction Fuzzy Hash: 6DE06D31141328BADB201FA2EC0CEE73F5CFF167A1F108034F508960A0CAB5C540CBA1
                    APIs
                    • GetSysColor.USER32(00000008), ref: 00AE2231
                    • SetTextColor.GDI32(?,000000FF), ref: 00AE223B
                    • SetBkMode.GDI32(?,00000001), ref: 00AE2250
                    • GetStockObject.GDI32(00000005), ref: 00AE2258
                    • GetWindowDC.USER32(?,00000000), ref: 00B1C0D3
                    • GetPixel.GDI32(00000000,00000000,00000000), ref: 00B1C0E0
                    • GetPixel.GDI32(00000000,?,00000000), ref: 00B1C0F9
                    • GetPixel.GDI32(00000000,00000000,?), ref: 00B1C112
                    • GetPixel.GDI32(00000000,?,?), ref: 00B1C132
                    • ReleaseDC.USER32(?,00000000), ref: 00B1C13D
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                    • String ID:
                    • API String ID: 1946975507-0
                    • Opcode ID: 6461151ac5600d5ceb7ce49ccd0f3668d6d1df2d92e1d8e4673b7049de0659f8
                    • Instruction ID: 62099b0ac864c57e1cb30678e060175d441d1c896474889a5c17a75805b5b185
                    • Opcode Fuzzy Hash: 6461151ac5600d5ceb7ce49ccd0f3668d6d1df2d92e1d8e4673b7049de0659f8
                    • Instruction Fuzzy Hash: 64E06D32544245EBDB215FA4FC0D7E83F14EB16336F0083A6FA69A80E18BB549D0DB12
                    APIs
                    • GetCurrentThread.KERNEL32 ref: 00B38C63
                    • OpenThreadToken.ADVAPI32(00000000,?,?,?,00B3882E), ref: 00B38C6A
                    • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00B3882E), ref: 00B38C77
                    • OpenProcessToken.ADVAPI32(00000000,?,?,?,00B3882E), ref: 00B38C7E
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: CurrentOpenProcessThreadToken
                    • String ID:
                    • API String ID: 3974789173-0
                    • Opcode ID: 65e9f77b6a9c837475c206f7388a6f7ee90331d58d0f23ecd5d7cdd13d7d7572
                    • Instruction ID: 41b6713dcfddffc9a6167eb5e948d4a17ba9ad3c924ae016129747b7e868d4ec
                    • Opcode Fuzzy Hash: 65e9f77b6a9c837475c206f7388a6f7ee90331d58d0f23ecd5d7cdd13d7d7572
                    • Instruction Fuzzy Hash: D1E04F36646312ABD7205FB07D0CB663BA8EF50792F244868F245CA080DE7894418B61
                    APIs
                    • GetDesktopWindow.USER32 ref: 00B22187
                    • GetDC.USER32(00000000), ref: 00B22191
                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00B221B1
                    • ReleaseDC.USER32(?), ref: 00B221D2
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: CapsDesktopDeviceReleaseWindow
                    • String ID:
                    • API String ID: 2889604237-0
                    • Opcode ID: 64e4e960941807193e2a4d32d4bb2c56de005708e66fcebfa82327f7720efdcd
                    • Instruction ID: b6539ec16c0addbb4f24641ee44c5a45fa22a89c1565e96ccb77cd38874ad740
                    • Opcode Fuzzy Hash: 64e4e960941807193e2a4d32d4bb2c56de005708e66fcebfa82327f7720efdcd
                    • Instruction Fuzzy Hash: A7E0E5B5800215EFDB019F61E808AAD7BF1FF4C351F108425F95AE72A0CBB88142DF40
                    APIs
                    • GetDesktopWindow.USER32 ref: 00B2219B
                    • GetDC.USER32(00000000), ref: 00B221A5
                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00B221B1
                    • ReleaseDC.USER32(?), ref: 00B221D2
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: CapsDesktopDeviceReleaseWindow
                    • String ID:
                    • API String ID: 2889604237-0
                    • Opcode ID: f8c7a4aaf6c8d6949149aa8c77ec17225598578ba935ae80973667c85c24399f
                    • Instruction ID: c202ec543e5c8a45960fa228de9be8c94c1115524db7aecdcd6631b303d5c74b
                    • Opcode Fuzzy Hash: f8c7a4aaf6c8d6949149aa8c77ec17225598578ba935ae80973667c85c24399f
                    • Instruction Fuzzy Hash: 98E0E5B5800205AFCB019F61E8086AD7BB1BB4C351F108025F95A972A0CBB89142DF40
                    APIs
                    • OleSetContainedObject.OLE32(?,00000001), ref: 00B3B981
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ContainedObject
                    • String ID: AutoIt3GUI$Container
                    • API String ID: 3565006973-3941886329
                    • Opcode ID: 2825126e1cf55ba01f695ed5059f24d7d9d54c5f51e670a32e96375966e0bde9
                    • Instruction ID: 0e7a6a1646860f60caead7d8de122ba6a993dfd48ceece76da493eb32b21c17a
                    • Opcode Fuzzy Hash: 2825126e1cf55ba01f695ed5059f24d7d9d54c5f51e670a32e96375966e0bde9
                    • Instruction Fuzzy Hash: 75914C706006019FDB64DF68C884F66BBE9FF48710F2485ADFA49CB695DB70E841CB50
                    APIs
                      • Part of subcall function 00AFFEC6: _wcscpy.LIBCMT ref: 00AFFEE9
                      • Part of subcall function 00AE9997: __itow.LIBCMT ref: 00AE99C2
                      • Part of subcall function 00AE9997: __swprintf.LIBCMT ref: 00AE9A0C
                    • __wcsnicmp.LIBCMT ref: 00B4B298
                    • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00B4B361
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                    • String ID: LPT
                    • API String ID: 3222508074-1350329615
                    • Opcode ID: 0bc9fa6b312ea8421aef66cc1dd1eb656a422401e20f236f793392e5e24f0a21
                    • Instruction ID: bedd92bc4a63c909dbe5f33f5a2317176b076f0c52a01ea8e2cda5db80e5c791
                    • Opcode Fuzzy Hash: 0bc9fa6b312ea8421aef66cc1dd1eb656a422401e20f236f793392e5e24f0a21
                    • Instruction Fuzzy Hash: FA615175A00215AFCB14DF99C985EAEB7F4EF08310F1540AAFA46AB291DB70EE40DB54
                    APIs
                    • Sleep.KERNEL32(00000000), ref: 00AF2AC8
                    • GlobalMemoryStatusEx.KERNEL32(?), ref: 00AF2AE1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: GlobalMemorySleepStatus
                    • String ID: @
                    • API String ID: 2783356886-2766056989
                    • Opcode ID: 922fdfe5e37ad1e4c08fce7d504b4b2388abc231e82c1eae9a4717f44150d183
                    • Instruction ID: 2082879b3d17b2096268a0232eeb0e053c0b79d56db875d79dfdf97c76c6bcf5
                    • Opcode Fuzzy Hash: 922fdfe5e37ad1e4c08fce7d504b4b2388abc231e82c1eae9a4717f44150d183
                    • Instruction Fuzzy Hash: D25149B14187859BD320AF15DD86BAFBBE8FF84310F82485DF1D9521A1DF308929CB16
                    APIs
                      • Part of subcall function 00AE506B: __fread_nolock.LIBCMT ref: 00AE5089
                    • _wcscmp.LIBCMT ref: 00B49AAE
                    • _wcscmp.LIBCMT ref: 00B49AC1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: _wcscmp$__fread_nolock
                    • String ID: FILE
                    • API String ID: 4029003684-3121273764
                    • Opcode ID: 256946da5479d424fe5ba4cab19d12b4088f0c62082dd4a10dd6338433069638
                    • Instruction ID: ddbe1e93ec4ecbc76577c4b40e80adbde957c20130feb9638dd54ff39461483b
                    • Opcode Fuzzy Hash: 256946da5479d424fe5ba4cab19d12b4088f0c62082dd4a10dd6338433069638
                    • Instruction Fuzzy Hash: 3D41F471A00609BEDF219EA1DC86FEFBBFDDF45714F0000B9F900A7181DA75AA0497A1
                    APIs
                    • _memset.LIBCMT ref: 00B52892
                    • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00B528C8
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: CrackInternet_memset
                    • String ID: |
                    • API String ID: 1413715105-2343686810
                    • Opcode ID: 9b4875ba153317725ee296984fe8983d2ac34013e57a0cbc6a206b562c7901ad
                    • Instruction ID: c5f4a409dc829da2c195a203fbf71b3b1b94271aeead000487d0560d3fd6849b
                    • Opcode Fuzzy Hash: 9b4875ba153317725ee296984fe8983d2ac34013e57a0cbc6a206b562c7901ad
                    • Instruction Fuzzy Hash: DA313D71801119AFCF41DFA1DC85EEEBFB9FF19300F1040A9F815A6265DB315A56DBA0
                    APIs
                    • DestroyWindow.USER32(?,?,?,?), ref: 00B66D86
                    • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00B66DC2
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Window$DestroyMove
                    • String ID: static
                    • API String ID: 2139405536-2160076837
                    • Opcode ID: b17a39037d1b7d3b327ff2f5cf3ad13f1f4bded4ccd471bb5b6106463da6e73a
                    • Instruction ID: e87b91654631e855bd4825c5aa2c2882d4f7fc3323ba5b9d7472c65446517fab
                    • Opcode Fuzzy Hash: b17a39037d1b7d3b327ff2f5cf3ad13f1f4bded4ccd471bb5b6106463da6e73a
                    • Instruction Fuzzy Hash: 26317C71210604AADB109F68DC80AFB77F9FF48760F109629F9A697190DA75AC91CB60
                    APIs
                    • _memset.LIBCMT ref: 00B42E00
                    • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00B42E3B
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: InfoItemMenu_memset
                    • String ID: 0
                    • API String ID: 2223754486-4108050209
                    • Opcode ID: a3ee461a952230715bc6d9eda88fedaac6f65c5d2842283d33ad466babee5d00
                    • Instruction ID: 9fe83fb8fab37f76b50367cafd4915ab7c2299bbbf1a6cfaec8eff86dc1e98b7
                    • Opcode Fuzzy Hash: a3ee461a952230715bc6d9eda88fedaac6f65c5d2842283d33ad466babee5d00
                    • Instruction Fuzzy Hash: EE31C131A40309ABEB248F58D985BAEBBF9EF05350F5404AAF985971A0E7709B44FB50
                    APIs
                    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00B669D0
                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00B669DB
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID: Combobox
                    • API String ID: 3850602802-2096851135
                    • Opcode ID: 671cb55c6015d38bfeea34e26626b72b1bbbac11228722a125e78fd1f894bd85
                    • Instruction ID: 7f6fc428091b7a5600a94b3a91c83ff440e011d1c99abd2ba8fda6a3755bea01
                    • Opcode Fuzzy Hash: 671cb55c6015d38bfeea34e26626b72b1bbbac11228722a125e78fd1f894bd85
                    • Instruction Fuzzy Hash: F511C4717002097FEF159F64DC80EBB3BAAEB893A4F110264FD58972E0D6799C518BA0
                    APIs
                      • Part of subcall function 00AE1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00AE1D73
                      • Part of subcall function 00AE1D35: GetStockObject.GDI32(00000011), ref: 00AE1D87
                      • Part of subcall function 00AE1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00AE1D91
                    • GetWindowRect.USER32(00000000,?), ref: 00B66EE0
                    • GetSysColor.USER32(00000012), ref: 00B66EFA
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Window$ColorCreateMessageObjectRectSendStock
                    • String ID: static
                    • API String ID: 1983116058-2160076837
                    • Opcode ID: aae94415ea6e66fe12c9fba52bac4f5afefc2ba481ffacbf4ecd74d8161678b6
                    • Instruction ID: aadbabd5d6da0e13758371033dba13cd84f5d9250ba778b6bb728e915130f3a5
                    • Opcode Fuzzy Hash: aae94415ea6e66fe12c9fba52bac4f5afefc2ba481ffacbf4ecd74d8161678b6
                    • Instruction Fuzzy Hash: 7A21597261020AAFDB04DFA8DD45AFA7BF8FB08314F004668FD55D3250D679E861DB50
                    APIs
                    • GetWindowTextLengthW.USER32(00000000), ref: 00B66C11
                    • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00B66C20
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: LengthMessageSendTextWindow
                    • String ID: edit
                    • API String ID: 2978978980-2167791130
                    • Opcode ID: 895a53f7998769b41c45bacbb7c8f32f664b5db78ef162d5a1edbfc8f7a206e2
                    • Instruction ID: 570cf79158325f34edfd7529e8b008eef4851eedf3108bf912e1ca2054c251a8
                    • Opcode Fuzzy Hash: 895a53f7998769b41c45bacbb7c8f32f664b5db78ef162d5a1edbfc8f7a206e2
                    • Instruction Fuzzy Hash: 11116A71505208ABEB108F64DC82ABA37AAEB15368F244764F961D71E0CA79DC919B60
                    APIs
                    • _memset.LIBCMT ref: 00B42F11
                    • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00B42F30
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: InfoItemMenu_memset
                    • String ID: 0
                    • API String ID: 2223754486-4108050209
                    • Opcode ID: 273289b46692830742115d01fed412ec55924967f182d360a0348a47ff59a5fc
                    • Instruction ID: 334fc44396cf795accab6e73ab4fe403e296ff41d6afaab1d27c0a8276e55573
                    • Opcode Fuzzy Hash: 273289b46692830742115d01fed412ec55924967f182d360a0348a47ff59a5fc
                    • Instruction Fuzzy Hash: 1C11B672901124ABDF21DB98DC84BAD77F9EB15310F9800E5F855A72A0DBB0AF08F791
                    APIs
                    • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00B52520
                    • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00B52549
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Internet$OpenOption
                    • String ID: <local>
                    • API String ID: 942729171-4266983199
                    • Opcode ID: bbbce9a2b9e3289eee72325cd8b9361daa1bd9d6bc19b3d7c528987c26e54532
                    • Instruction ID: 79b9d5fdcebce600d659c904d664c863e1c1d2c05d40a5fc0914849051f3f3b0
                    • Opcode Fuzzy Hash: bbbce9a2b9e3289eee72325cd8b9361daa1bd9d6bc19b3d7c528987c26e54532
                    • Instruction Fuzzy Hash: 5711E070102225BADB248F519CD9FBBFFE8FB27352F1081EAFE4542140E2706949DAE0
                    APIs
                      • Part of subcall function 00B5830B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,00B580C8,?,00000000,?,?), ref: 00B58322
                    • inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00B580CB
                    • htons.WSOCK32(00000000,?,00000000), ref: 00B58108
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ByteCharMultiWidehtonsinet_addr
                    • String ID: 255.255.255.255
                    • API String ID: 2496851823-2422070025
                    • Opcode ID: c95d620326fce9beeef0ccf47fea4870421c67ec61aac0df6244c61ce7dcd0e1
                    • Instruction ID: 4c621c1ea0fea3624a5f0893c0b1e5773da116e8c04bfa468d4f4d041022b28f
                    • Opcode Fuzzy Hash: c95d620326fce9beeef0ccf47fea4870421c67ec61aac0df6244c61ce7dcd0e1
                    • Instruction Fuzzy Hash: 3611A135600245ABDB20AF64DC86FBDB3B4FF04321F2085AAFD11A72D1DE72A819C795
                    APIs
                      • Part of subcall function 00AE7F41: _memmove.LIBCMT ref: 00AE7F82
                      • Part of subcall function 00B3B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00B3B0E7
                    • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00B39355
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ClassMessageNameSend_memmove
                    • String ID: ComboBox$ListBox
                    • API String ID: 372448540-1403004172
                    • Opcode ID: cbc75ad07dc99693ee478ec5e2a4758b86fd7adfb0611b35c21fc82703934d86
                    • Instruction ID: 7e3bcba3b4d17327d6fc52ec1ddae1a39ff5489aec9575d16c514ca43d47a3c1
                    • Opcode Fuzzy Hash: cbc75ad07dc99693ee478ec5e2a4758b86fd7adfb0611b35c21fc82703934d86
                    • Instruction Fuzzy Hash: C501B571A45215ABCB04EB65CC91CFE77A9FF46320F240699F932572D1DB715908C650
                    APIs
                      • Part of subcall function 00AE7F41: _memmove.LIBCMT ref: 00AE7F82
                      • Part of subcall function 00B3B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00B3B0E7
                    • SendMessageW.USER32(?,00000180,00000000,?), ref: 00B3924D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ClassMessageNameSend_memmove
                    • String ID: ComboBox$ListBox
                    • API String ID: 372448540-1403004172
                    • Opcode ID: 474dd245255b7b3a9fee5d26dae318c9eb763f810572af9b43ce036b1429c730
                    • Instruction ID: 1f5c117b689f76b41f67fb583360d695de1d62f36a8d25890bd9cd0c57d3285c
                    • Opcode Fuzzy Hash: 474dd245255b7b3a9fee5d26dae318c9eb763f810572af9b43ce036b1429c730
                    • Instruction Fuzzy Hash: ED018F71A412087BCB08EBA4CD96EFFB3E8DF55340F2400A9B91267291EA556E0C96B1
                    APIs
                      • Part of subcall function 00AE7F41: _memmove.LIBCMT ref: 00AE7F82
                      • Part of subcall function 00B3B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00B3B0E7
                    • SendMessageW.USER32(?,00000182,?,00000000), ref: 00B392D0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ClassMessageNameSend_memmove
                    • String ID: ComboBox$ListBox
                    • API String ID: 372448540-1403004172
                    • Opcode ID: 4879e2b8bb61a344a218bc9710775802df280255a40efbc9ba5e5ea59b15638c
                    • Instruction ID: 96cc6b11af0780454d8571619ba5fffc2e3076f0a4e7e0d0303a09751626b0b9
                    • Opcode Fuzzy Hash: 4879e2b8bb61a344a218bc9710775802df280255a40efbc9ba5e5ea59b15638c
                    • Instruction Fuzzy Hash: 5E01A271A4120877CF04EAA4CD82EFF77EC9F15340F2401A9B91267292DA615E0C9671
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: ClassName_wcscmp
                    • String ID: #32770
                    • API String ID: 2292705959-463685578
                    • Opcode ID: e57923a28512d69b57fdd99977d6b00f60d979643c794481b5b7b1f448591503
                    • Instruction ID: e492041353e4fdbba2a464c05348b55abf9f9247d518ef7037518ec6cf8ef9f2
                    • Opcode Fuzzy Hash: e57923a28512d69b57fdd99977d6b00f60d979643c794481b5b7b1f448591503
                    • Instruction Fuzzy Hash: 9CE0D17390422D27D7209B95AC49FA7F7ECEB55B71F0001A7FD14D3051D9609E4587E1
                    APIs
                    • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00B381CA
                      • Part of subcall function 00B03598: _doexit.LIBCMT ref: 00B035A2
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: Message_doexit
                    • String ID: AutoIt$Error allocating memory.
                    • API String ID: 1993061046-4017498283
                    • Opcode ID: a0569d8aecebfa061c4070b858c303c3e9f1bf475da1c7f1e0e2d697e8aef96f
                    • Instruction ID: 7d8c7fa156a02f907410adc4325da2c0bef817c5162615d7fc485980dfae809f
                    • Opcode Fuzzy Hash: a0569d8aecebfa061c4070b858c303c3e9f1bf475da1c7f1e0e2d697e8aef96f
                    • Instruction Fuzzy Hash: E8D02B323C431832D21532FD6D0BFC539CC8B09F51F0044A6FB48551E38DD5488142ED
                    APIs
                      • Part of subcall function 00B1B564: _memset.LIBCMT ref: 00B1B571
                      • Part of subcall function 00B00B84: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00B1B540,?,?,?,00AE100A), ref: 00B00B89
                    • IsDebuggerPresent.KERNEL32(?,?,?,00AE100A), ref: 00B1B544
                    • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00AE100A), ref: 00B1B553
                    Strings
                    • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00B1B54E
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                    • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                    • API String ID: 3158253471-631824599
                    • Opcode ID: 96adb746af73d0b8a2eb18eecec5b122b3fc9eb2359d956c44fad6ec30538e79
                    • Instruction ID: eeb4c698504525d8501b881fc3eee881b90a41a0d6df7b6da5c541e3e16300e9
                    • Opcode Fuzzy Hash: 96adb746af73d0b8a2eb18eecec5b122b3fc9eb2359d956c44fad6ec30538e79
                    • Instruction Fuzzy Hash: 69E06DB16103528BD720EF28E414B827BE0EB14705F0489ACE446C36A0DBB8D484CBA1
                    APIs
                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00B65BF5
                    • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00B65C08
                      • Part of subcall function 00B454E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00B4555E
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2000294492.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                    • Associated: 00000000.00000002.2000276077.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000341533.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000379055.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2000393054.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ae0000_2aFb7hE00o.jbxd
                    Similarity
                    • API ID: FindMessagePostSleepWindow
                    • String ID: Shell_TrayWnd
                    • API String ID: 529655941-2988720461
                    • Opcode ID: a1e60799c2aa156950cb52674a4f56d1717c764798da19ce13e87465eaaf32d4
                    • Instruction ID: e0f7930928e1317cba0b2b025edc9d1eb614a62f879d42a09bcf58b791131a06
                    • Opcode Fuzzy Hash: a1e60799c2aa156950cb52674a4f56d1717c764798da19ce13e87465eaaf32d4
                    • Instruction Fuzzy Hash: A7D0A931388312B7E774AB30BC0BFA32A50AB00B00F000835B306AA1E1CCE85800C240