Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
whiteee.exe

Overview

General Information

Sample name:whiteee.exe
Analysis ID:1465940
MD5:9a961cdb405219d714347c06a7a6a995
SHA1:2bf6f2e31d453c52685f8ffeaa52056aa727674d
SHA256:2cbc13099ee1ba4b8c671bfca525bb2c5c057c2fc13df105dec2852a8b672e50
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Snake Keylogger
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • whiteee.exe (PID: 7320 cmdline: "C:\Users\user\Desktop\whiteee.exe" MD5: 9A961CDB405219D714347C06A7A6A995)
    • RegSvcs.exe (PID: 7336 cmdline: "C:\Users\user\Desktop\whiteee.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Username": "mmcc1@cash4cars.nz", "Password": "TeZIDzFWyl7%", "Host": "mail.cash4cars.nz", "Port": "26"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1641198053.0000000001100000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000000.00000002.1641198053.0000000001100000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      00000000.00000002.1641198053.0000000001100000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
        00000000.00000002.1641198053.0000000001100000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0x149c0:$a1: get_encryptedPassword
        • 0x14cac:$a2: get_encryptedUsername
        • 0x147cc:$a3: get_timePasswordChanged
        • 0x148c7:$a4: get_passwordField
        • 0x149d6:$a5: set_encryptedPassword
        • 0x15fbd:$a7: get_logins
        • 0x15f20:$a10: KeyLoggerEventArgs
        • 0x15bb9:$a11: KeyLoggerEventArgsEventHandler
        00000000.00000002.1641198053.0000000001100000.00000004.00001000.00020000.00000000.sdmpMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
        • 0x1c293:$a2: \Comodo\Dragon\User Data\Default\Login Data
        • 0x1b4c5:$a3: \Google\Chrome\User Data\Default\Login Data
        • 0x1b8f8:$a4: \Orbitum\User Data\Default\Login Data
        • 0x1c937:$a5: \Kometa\User Data\Default\Login Data
        Click to see the 16 entries
        SourceRuleDescriptionAuthorStrings
        0.2.whiteee.exe.1100000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          0.2.whiteee.exe.1100000.1.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
            0.2.whiteee.exe.1100000.1.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
            • 0x12bc0:$a1: get_encryptedPassword
            • 0x12eac:$a2: get_encryptedUsername
            • 0x129cc:$a3: get_timePasswordChanged
            • 0x12ac7:$a4: get_passwordField
            • 0x12bd6:$a5: set_encryptedPassword
            • 0x141bd:$a7: get_logins
            • 0x14120:$a10: KeyLoggerEventArgs
            • 0x13db9:$a11: KeyLoggerEventArgsEventHandler
            0.2.whiteee.exe.1100000.1.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
            • 0x1a493:$a2: \Comodo\Dragon\User Data\Default\Login Data
            • 0x196c5:$a3: \Google\Chrome\User Data\Default\Login Data
            • 0x19af8:$a4: \Orbitum\User Data\Default\Login Data
            • 0x1ab37:$a5: \Kometa\User Data\Default\Login Data
            0.2.whiteee.exe.1100000.1.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
            • 0x13731:$s1: UnHook
            • 0x13738:$s2: SetHook
            • 0x13740:$s3: CallNextHook
            • 0x1374d:$s4: _hook
            Click to see the 15 entries
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000001.00000002.4093146194.0000000002B11000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "mmcc1@cash4cars.nz", "Password": "TeZIDzFWyl7%", "Host": "mail.cash4cars.nz", "Port": "26"}
            Source: whiteee.exeVirustotal: Detection: 41%Perma Link
            Source: whiteee.exeReversingLabs: Detection: 36%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: whiteee.exeJoe Sandbox ML: detected

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: whiteee.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49731 version: TLS 1.0
            Source: Binary string: wntdll.pdbUGP source: whiteee.exe, 00000000.00000003.1639829625.0000000003C20000.00000004.00001000.00020000.00000000.sdmp, whiteee.exe, 00000000.00000003.1640059539.0000000003A80000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: whiteee.exe, 00000000.00000003.1639829625.0000000003C20000.00000004.00001000.00020000.00000000.sdmp, whiteee.exe, 00000000.00000003.1640059539.0000000003A80000.00000004.00001000.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003DDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_003DDBBE
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003E68EE FindFirstFileW,FindClose,0_2_003E68EE
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003E698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_003E698F
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003DD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_003DD076
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003DD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_003DD3A9
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003E9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_003E9642
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003E979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_003E979D
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003E9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_003E9B2B
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003E5C97 FindFirstFileW,FindNextFileW,FindClose,0_2_003E5C97
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00E3F1F6h1_2_00E3F007
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00E3FB80h1_2_00E3F007
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h1_2_00E3E528
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h1_2_00E3EB5B
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h1_2_00E3ED3C
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06568945h1_2_06568608
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 065658C1h1_2_06565618
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06566171h1_2_06565EC8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06566A21h1_2_06566778
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06560741h1_2_06560498
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06567751h1_2_065674A8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06568001h1_2_06567D58
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06560FF1h1_2_06560D48
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06565D19h1_2_06565A70
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 065665C9h1_2_06566320
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06566E79h1_2_06566BD0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]1_2_065633B8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]1_2_065633A8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 065672FAh1_2_06567050
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 065602E9h1_2_06560040
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06560B99h1_2_065608F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06567BA9h1_2_06567900
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06565441h1_2_06565198
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06568459h1_2_065681B0

            Networking

            barindex
            Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.whiteee.exe.1100000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.1641198053.0000000001100000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
            Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
            Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
            Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49731 version: TLS 1.0
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003ECE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_003ECE44
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: global trafficDNS traffic detected: DNS query: 56.126.166.20.in-addr.arpa
            Source: RegSvcs.exe, 00000001.00000002.4093146194.0000000002CD3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C97000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002BDB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C6E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C89000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002CC4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
            Source: RegSvcs.exe, 00000001.00000002.4093146194.0000000002CD3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C97000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002BDB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C6E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002CA5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C1E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C89000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002CC4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002BCF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: RegSvcs.exe, 00000001.00000002.4093146194.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: whiteee.exe, 00000000.00000002.1641198053.0000000001100000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4088822876.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
            Source: RegSvcs.exe, 00000001.00000002.4093146194.0000000002CD3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C97000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C6E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002BF3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C89000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002CC4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
            Source: RegSvcs.exe, 00000001.00000002.4093146194.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: RegSvcs.exe, 00000001.00000002.4093146194.0000000002CD3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C97000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002BDB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C6E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C1E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C89000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002CC4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: whiteee.exe, 00000000.00000002.1641198053.0000000001100000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002BDB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4088822876.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: RegSvcs.exe, 00000001.00000002.4093146194.0000000002C7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33
            Source: RegSvcs.exe, 00000001.00000002.4093146194.0000000002CD3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C97000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C6E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C1E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C89000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002CC4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33$
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
            Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
            Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
            Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
            Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
            Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003EEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_003EEAFF
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003EED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_003EED6A
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003EEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_003EEAFF
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003DAA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_003DAA57
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_00409576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00409576

            System Summary

            barindex
            Source: 0.2.whiteee.exe.1100000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.whiteee.exe.1100000.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.whiteee.exe.1100000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.whiteee.exe.1100000.1.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.whiteee.exe.1100000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.whiteee.exe.1100000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.whiteee.exe.1100000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.whiteee.exe.1100000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 00000000.00000002.1641198053.0000000001100000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000000.00000002.1641198053.0000000001100000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 00000000.00000002.1641198053.0000000001100000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 00000000.00000002.1641198053.0000000001100000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 00000001.00000002.4088822876.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000001.00000002.4088822876.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: Process Memory Space: whiteee.exe PID: 7320, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: whiteee.exe PID: 7320, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: Process Memory Space: RegSvcs.exe PID: 7336, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: RegSvcs.exe PID: 7336, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: whiteee.exeString found in binary or memory: This is a third-party compiled AutoIt script.
            Source: whiteee.exe, 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_0c7e4f4c-c
            Source: whiteee.exe, 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_32a79b55-9
            Source: whiteee.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_9ff9c25d-8
            Source: whiteee.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_e65ee30f-0
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003DD5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_003DD5EB
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003D1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_003D1201
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003DE8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_003DE8F6
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_0037BF400_2_0037BF40
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003780600_2_00378060
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003E20460_2_003E2046
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003D82980_2_003D8298
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003AE4FF0_2_003AE4FF
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003A676B0_2_003A676B
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_004048730_2_00404873
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_0039CAA00_2_0039CAA0
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_0037CAF00_2_0037CAF0
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_0038CC390_2_0038CC39
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003A6DD90_2_003A6DD9
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_0038B1190_2_0038B119
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003791C00_2_003791C0
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003913940_2_00391394
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003917060_2_00391706
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_0039781B0_2_0039781B
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003779200_2_00377920
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_0038997D0_2_0038997D
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003919B00_2_003919B0
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_00397A4A0_2_00397A4A
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_00391C770_2_00391C77
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_00397CA70_2_00397CA7
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003FBE440_2_003FBE44
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003A9EEE0_2_003A9EEE
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_00391F320_2_00391F32
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_010F36000_2_010F3600
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00E3F0071_2_00E3F007
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00E3C1901_2_00E3C190
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00E361081_2_00E36108
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00E3B3281_2_00E3B328
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00E3C4701_2_00E3C470
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00E3C7521_2_00E3C752
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00E368801_2_00E36880
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00E398581_2_00E39858
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00E34AD91_2_00E34AD9
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00E3CA321_2_00E3CA32
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00E3BBD21_2_00E3BBD2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00E3BEB01_2_00E3BEB0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00E3B4F21_2_00E3B4F2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00E335721_2_00E33572
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00E3E5281_2_00E3E528
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00E3E5171_2_00E3E517
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0656D6701_2_0656D670
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_065686081_2_06568608
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0656B6E81_2_0656B6E8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06568C511_2_06568C51
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0656A4081_2_0656A408
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0656BD381_2_0656BD38
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0656AA581_2_0656AA58
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0656C3881_2_0656C388
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0656D0281_2_0656D028
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0656B0A01_2_0656B0A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0656C9D81_2_0656C9D8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_065611A01_2_065611A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0656D6621_2_0656D662
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_065656111_2_06565611
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_065656181_2_06565618
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0656B6D91_2_0656B6D9
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06565EC31_2_06565EC3
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06565EC81_2_06565EC8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_065667731_2_06566773
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_065667781_2_06566778
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_065637301_2_06563730
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_065644301_2_06564430
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_065604931_2_06560493
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_065604981_2_06560498
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_065674A31_2_065674A3
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_065674A81_2_065674A8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06567D531_2_06567D53
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06567D581_2_06567D58
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06560D481_2_06560D48
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06560D3B1_2_06560D3B
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0656BD281_2_0656BD28
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_065685F81_2_065685F8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0656AA481_2_0656AA48
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06565A701_2_06565A70
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06565A601_2_06565A60
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0656C3781_2_0656C378
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0656631B1_2_0656631B
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_065663201_2_06566320
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06566BD01_2_06566BD0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06566BCB1_2_06566BCB
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0656A3F81_2_0656A3F8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_065633B81_2_065633B8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_065633A81_2_065633A8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_065670501_2_06567050
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_065600401_2_06560040
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0656704B1_2_0656704B
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_065628181_2_06562818
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0656D0181_2_0656D018
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_065628071_2_06562807
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0656003B1_2_0656003B
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_065608F01_2_065608F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_065678F01_2_065678F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_065608E31_2_065608E3
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0656B08F1_2_0656B08F
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_065679001_2_06567900
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0656C9C81_2_0656C9C8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_065651981_2_06565198
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0656518B1_2_0656518B
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_065681B01_2_065681B0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_065681AB1_2_065681AB
            Source: C:\Users\user\Desktop\whiteee.exeCode function: String function: 0038F9F2 appears 31 times
            Source: C:\Users\user\Desktop\whiteee.exeCode function: String function: 00390A30 appears 46 times
            Source: whiteee.exe, 00000000.00000003.1639829625.0000000003D4D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs whiteee.exe
            Source: whiteee.exe, 00000000.00000003.1638542273.0000000003BA3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs whiteee.exe
            Source: whiteee.exe, 00000000.00000002.1641198053.0000000001100000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs whiteee.exe
            Source: whiteee.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: 0.2.whiteee.exe.1100000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.whiteee.exe.1100000.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.whiteee.exe.1100000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.whiteee.exe.1100000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.whiteee.exe.1100000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.whiteee.exe.1100000.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.whiteee.exe.1100000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.whiteee.exe.1100000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 00000000.00000002.1641198053.0000000001100000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000000.00000002.1641198053.0000000001100000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 00000000.00000002.1641198053.0000000001100000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 00000000.00000002.1641198053.0000000001100000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 00000001.00000002.4088822876.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000001.00000002.4088822876.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Process Memory Space: whiteee.exe PID: 7320, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: whiteee.exe PID: 7320, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Process Memory Space: RegSvcs.exe PID: 7336, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: RegSvcs.exe PID: 7336, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.whiteee.exe.1100000.1.raw.unpack, ----.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.whiteee.exe.1100000.1.raw.unpack, ----.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.whiteee.exe.1100000.1.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.whiteee.exe.1100000.1.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@3/2
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003E37B5 GetLastError,FormatMessageW,0_2_003E37B5
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003D10BF AdjustTokenPrivileges,CloseHandle,0_2_003D10BF
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003D16C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_003D16C3
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003E51CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_003E51CD
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003FA67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_003FA67C
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003E648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_003E648E
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003742A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_003742A2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
            Source: C:\Users\user\Desktop\whiteee.exeFile created: C:\Users\user\AppData\Local\Temp\aut7961.tmpJump to behavior
            Source: whiteee.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\whiteee.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: RegSvcs.exe, 00000001.00000002.4093146194.0000000002D62000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002D53000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002D71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: whiteee.exeVirustotal: Detection: 41%
            Source: whiteee.exeReversingLabs: Detection: 36%
            Source: unknownProcess created: C:\Users\user\Desktop\whiteee.exe "C:\Users\user\Desktop\whiteee.exe"
            Source: C:\Users\user\Desktop\whiteee.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\whiteee.exe"
            Source: C:\Users\user\Desktop\whiteee.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\whiteee.exe"Jump to behavior
            Source: C:\Users\user\Desktop\whiteee.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\Desktop\whiteee.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\whiteee.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\whiteee.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\whiteee.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\whiteee.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\whiteee.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\whiteee.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\whiteee.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\whiteee.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\whiteee.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: whiteee.exeStatic file information: File size 1078272 > 1048576
            Source: whiteee.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
            Source: whiteee.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
            Source: whiteee.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
            Source: whiteee.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: whiteee.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
            Source: whiteee.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
            Source: whiteee.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: wntdll.pdbUGP source: whiteee.exe, 00000000.00000003.1639829625.0000000003C20000.00000004.00001000.00020000.00000000.sdmp, whiteee.exe, 00000000.00000003.1640059539.0000000003A80000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: whiteee.exe, 00000000.00000003.1639829625.0000000003C20000.00000004.00001000.00020000.00000000.sdmp, whiteee.exe, 00000000.00000003.1640059539.0000000003A80000.00000004.00001000.00020000.00000000.sdmp
            Source: whiteee.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: whiteee.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: whiteee.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: whiteee.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: whiteee.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003742DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_003742DE
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_00390A76 push ecx; ret 0_2_00390A89
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_0038F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_0038F98E
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_00401C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00401C41
            Source: C:\Users\user\Desktop\whiteee.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\whiteee.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\whiteee.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-97347
            Source: C:\Users\user\Desktop\whiteee.exeAPI/Special instruction interceptor: Address: 10F3224
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599890Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599672Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599453Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599344Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599219Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599109Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599000Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598874Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598699Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598594Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598484Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598375Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598265Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598156Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598047Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597937Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597828Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597719Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597609Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597500Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597390Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597281Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597172Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597062Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596953Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596844Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596734Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596625Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596515Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596406Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596297Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596187Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596078Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595969Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595857Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595750Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595640Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595531Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595422Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595312Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595203Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595094Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594984Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594875Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594765Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594656Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594547Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594437Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1693Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 8162Jump to behavior
            Source: C:\Users\user\Desktop\whiteee.exeAPI coverage: 4.1 %
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003DDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_003DDBBE
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003E68EE FindFirstFileW,FindClose,0_2_003E68EE
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003E698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_003E698F
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003DD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_003DD076
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003DD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_003DD3A9
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003E9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_003E9642
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003E979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_003E979D
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003E9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_003E9B2B
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003E5C97 FindFirstFileW,FindNextFileW,FindClose,0_2_003E5C97
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003742DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_003742DE
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599890Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599672Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599453Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599344Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599219Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599109Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599000Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598874Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598699Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598594Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598484Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598375Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598265Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598156Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598047Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597937Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597828Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597719Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597609Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597500Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597390Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597281Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597172Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597062Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596953Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596844Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596734Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596625Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596515Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596406Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596297Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596187Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596078Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595969Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595857Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595750Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595640Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595531Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595422Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595312Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595203Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595094Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594984Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594875Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594765Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594656Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594547Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594437Jump to behavior
            Source: RegSvcs.exe, 00000001.00000002.4090249358.0000000000EDC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003EEAA2 BlockInput,0_2_003EEAA2
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003A2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_003A2622
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003742DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_003742DE
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_00394CE8 mov eax, dword ptr fs:[00000030h]0_2_00394CE8
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_010F3490 mov eax, dword ptr fs:[00000030h]0_2_010F3490
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_010F34F0 mov eax, dword ptr fs:[00000030h]0_2_010F34F0
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_010F1E70 mov eax, dword ptr fs:[00000030h]0_2_010F1E70
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003D0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_003D0B62
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003A2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_003A2622
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_0039083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0039083F
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003909D5 SetUnhandledExceptionFilter,0_2_003909D5
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_00390C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00390C21
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\whiteee.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\whiteee.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: B73008Jump to behavior
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003D1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_003D1201
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003B2BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_003B2BA5
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003DB226 SendInput,keybd_event,0_2_003DB226
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003F22DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_003F22DA
            Source: C:\Users\user\Desktop\whiteee.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\whiteee.exe"Jump to behavior
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003D0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_003D0B62
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003D1663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_003D1663
            Source: whiteee.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
            Source: whiteee.exeBinary or memory string: Shell_TrayWnd
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_00390698 cpuid 0_2_00390698
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003E8195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_003E8195
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003CD27A GetUserNameW,0_2_003CD27A
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003ABB6F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_003ABB6F
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003742DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_003742DE
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0.2.whiteee.exe.1100000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.whiteee.exe.1100000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.1641198053.0000000001100000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4088822876.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4093146194.0000000002CE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4093146194.0000000002B11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: whiteee.exe PID: 7320, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7336, type: MEMORYSTR
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: whiteee.exeBinary or memory string: WIN_81
            Source: whiteee.exeBinary or memory string: WIN_XP
            Source: whiteee.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
            Source: whiteee.exeBinary or memory string: WIN_XPe
            Source: whiteee.exeBinary or memory string: WIN_VISTA
            Source: whiteee.exeBinary or memory string: WIN_7
            Source: whiteee.exeBinary or memory string: WIN_8
            Source: Yara matchFile source: 0.2.whiteee.exe.1100000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.whiteee.exe.1100000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.1641198053.0000000001100000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4088822876.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: whiteee.exe PID: 7320, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7336, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0.2.whiteee.exe.1100000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.whiteee.exe.1100000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.1641198053.0000000001100000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4088822876.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4093146194.0000000002CE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4093146194.0000000002B11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: whiteee.exe PID: 7320, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7336, type: MEMORYSTR
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003F1204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_003F1204
            Source: C:\Users\user\Desktop\whiteee.exeCode function: 0_2_003F1806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_003F1806
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure2
            Valid Accounts
            1
            Native API
            1
            DLL Side-Loading
            1
            Exploitation for Privilege Escalation
            11
            Disable or Modify Tools
            1
            OS Credential Dumping
            2
            System Time Discovery
            Remote Services11
            Archive Collected Data
            2
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault AccountsScheduled Task/Job2
            Valid Accounts
            1
            DLL Side-Loading
            11
            Deobfuscate/Decode Files or Information
            21
            Input Capture
            1
            Account Discovery
            Remote Desktop Protocol1
            Data from Local System
            11
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
            Valid Accounts
            3
            Obfuscated Files or Information
            Security Account Manager1
            File and Directory Discovery
            SMB/Windows Admin Shares1
            Email Collection
            2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
            Access Token Manipulation
            1
            DLL Side-Loading
            NTDS127
            System Information Discovery
            Distributed Component Object Model21
            Input Capture
            13
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
            Process Injection
            2
            Valid Accounts
            LSA Secrets221
            Security Software Discovery
            SSH3
            Clipboard Data
            Fallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts111
            Virtualization/Sandbox Evasion
            Cached Domain Credentials111
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
            Access Token Manipulation
            DCSync2
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
            Process Injection
            Proc Filesystem11
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
            System Network Configuration Discovery
            Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            whiteee.exe42%VirustotalBrowse
            whiteee.exe37%ReversingLabsWin32.Trojan.Strab
            whiteee.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            reallyfreegeoip.org0%VirustotalBrowse
            checkip.dyndns.com0%VirustotalBrowse
            checkip.dyndns.org1%VirustotalBrowse
            56.126.166.20.in-addr.arpa3%VirustotalBrowse
            SourceDetectionScannerLabelLink
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            https://reallyfreegeoip.org0%VirustotalBrowse
            http://checkip.dyndns.org1%VirustotalBrowse
            http://checkip.dyndns.com0%Avira URL Cloudsafe
            http://checkip.dyndns.org0%Avira URL Cloudsafe
            https://reallyfreegeoip.org0%Avira URL Cloudsafe
            http://checkip.dyndns.org/0%Avira URL Cloudsafe
            https://reallyfreegeoip.org/xml/8.46.123.330%Avira URL Cloudsafe
            https://reallyfreegeoip.org/xml/8.46.123.33$0%Avira URL Cloudsafe
            http://checkip.dyndns.org/q0%Avira URL Cloudsafe
            http://reallyfreegeoip.org0%Avira URL Cloudsafe
            https://reallyfreegeoip.org/xml/0%Avira URL Cloudsafe
            http://checkip.dyndns.org/q0%VirustotalBrowse
            http://checkip.dyndns.org/1%VirustotalBrowse
            http://reallyfreegeoip.org0%VirustotalBrowse
            https://reallyfreegeoip.org/xml/0%VirustotalBrowse
            http://checkip.dyndns.com0%VirustotalBrowse
            NameIPActiveMaliciousAntivirus DetectionReputation
            reallyfreegeoip.org
            188.114.97.3
            truetrueunknown
            checkip.dyndns.com
            193.122.6.168
            truefalseunknown
            checkip.dyndns.org
            unknown
            unknowntrueunknown
            56.126.166.20.in-addr.arpa
            unknown
            unknowntrueunknown
            NameMaliciousAntivirus DetectionReputation
            http://checkip.dyndns.org/false
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://reallyfreegeoip.org/xml/8.46.123.33false
            • Avira URL Cloud: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            https://reallyfreegeoip.orgRegSvcs.exe, 00000001.00000002.4093146194.0000000002CD3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C97000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002BDB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C6E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C1E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C89000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002CC4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C7B000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://checkip.dyndns.orgRegSvcs.exe, 00000001.00000002.4093146194.0000000002CD3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C97000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002BDB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C6E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002CA5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C1E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C89000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002CC4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002BCF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C7B000.00000004.00000800.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://checkip.dyndns.comRegSvcs.exe, 00000001.00000002.4093146194.0000000002CD3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C97000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002BDB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C6E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C89000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002CC4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C7B000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://reallyfreegeoip.org/xml/8.46.123.33$RegSvcs.exe, 00000001.00000002.4093146194.0000000002CD3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C97000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C6E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C1E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C89000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002CC4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C7B000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000001.00000002.4093146194.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://checkip.dyndns.org/qwhiteee.exe, 00000000.00000002.1641198053.0000000001100000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4088822876.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://reallyfreegeoip.orgRegSvcs.exe, 00000001.00000002.4093146194.0000000002CD3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C97000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C6E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002BF3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C89000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002CC4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002C7B000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://reallyfreegeoip.org/xml/whiteee.exe, 00000000.00000002.1641198053.0000000001100000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4093146194.0000000002BDB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4088822876.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            188.114.97.3
            reallyfreegeoip.orgEuropean Union
            13335CLOUDFLARENETUStrue
            193.122.6.168
            checkip.dyndns.comUnited States
            31898ORACLE-BMC-31898USfalse
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1465940
            Start date and time:2024-07-02 09:53:38 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 7m 53s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:7
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:whiteee.exe
            Detection:MAL
            Classification:mal100.troj.spyw.evad.winEXE@3/4@3/2
            EGA Information:
            • Successful, ratio: 50%
            HCA Information:
            • Successful, ratio: 99%
            • Number of executed functions: 52
            • Number of non-executed functions: 287
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Override analysis time to 240000 for current running targets taking high CPU consumption
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Execution Graph export aborted for target RegSvcs.exe, PID 7336 because it is empty
            • Not all processes where analyzed, report is missing behavior information
            • Report size exceeded maximum capacity and may have missing disassembly code.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            • Report size getting too big, too many NtReadVirtualMemory calls found.
            TimeTypeDescription
            03:54:27API Interceptor13106877x Sleep call for process: RegSvcs.exe modified
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            188.114.97.3QUOTATION_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
            • filetransfer.io/data-package/mJcm5Gfa/download
            http://url.usb.m.mimecastprotect.com/s/SPnzCDwVznT7kyA0HkOsZj?domain=linkscan.ioGet hashmaliciousHTMLPhisherBrowse
            • emmalee.sa.com/favicon.ico
            file.exeGet hashmaliciousFormBookBrowse
            • www.cavetta.org.mt/yhnb/
            6Z4Q4bREii.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
            • 000366cm.nyashka.top/phpflowergenerator.php
            DHL Arrival Notice.exeGet hashmaliciousFormBookBrowse
            • www.coinwab.com/efdt/
            arrival notice_pdf.exeGet hashmaliciousFormBookBrowse
            • www.evoolihubs.shop/fwdd/?CbPtaF=K/pqHoAOWNF4P+w91QXSNI32+N7yog1OarJgSNepE9X9MW/JWlOOpIGlAtDTMDCyfqCkO2QB+3/EX24VIjMTes4MJP5Wyr3Pze4srZjnfJQNxaR/LCxeJK4=&NV=CzkTp6UpmNmd
            BbaXbvOA7D.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
            • 228282cm.nyashka.top/ExternalimagevmRequestlongpollsqldbLocal.php
            j05KsN2280.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
            • 640740cm.nyashka.top/providerEternalGameWindowstest.php
            QUOTATION_JUNQTRA031244#U00faPDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
            • filetransfer.io/data-package/L69kvhYI/download
            Techno_PO LV12406-00311.xla.xlsxGet hashmaliciousUnknownBrowse
            • qr-in.com/cpGHnqq
            193.122.6.168PM114079-990528.exeGet hashmaliciousSnake KeyloggerBrowse
            • checkip.dyndns.org/
            Bank Slip 2.docGet hashmaliciousSnake KeyloggerBrowse
            • checkip.dyndns.org/
            JgRVqrgNs4.exeGet hashmaliciousSnake KeyloggerBrowse
            • checkip.dyndns.org/
            H3fwQALXDX.exeGet hashmaliciousSnake KeyloggerBrowse
            • checkip.dyndns.org/
            MT Marine Tiger.exeGet hashmaliciousSnake KeyloggerBrowse
            • checkip.dyndns.org/
            vsl particulars packing list.exeGet hashmaliciousSnake KeyloggerBrowse
            • checkip.dyndns.org/
            new order.exeGet hashmaliciousSnake KeyloggerBrowse
            • checkip.dyndns.org/
            z1MB267382625AE.exeGet hashmaliciousSnake KeyloggerBrowse
            • checkip.dyndns.org/
            Prouduct list Specifictions.exeGet hashmaliciousSnake KeyloggerBrowse
            • checkip.dyndns.org/
            LAQ-PO088PDF.exeGet hashmaliciousSnake KeyloggerBrowse
            • checkip.dyndns.org/
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            reallyfreegeoip.orgDetails.exeGet hashmaliciousSnake KeyloggerBrowse
            • 188.114.96.3
            PM114079-990528.exeGet hashmaliciousSnake KeyloggerBrowse
            • 188.114.96.3
            Bank Slip 2.docGet hashmaliciousSnake KeyloggerBrowse
            • 188.114.96.3
            MT_80362_72605XLS.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
            • 188.114.97.3
            JgRVqrgNs4.exeGet hashmaliciousSnake KeyloggerBrowse
            • 188.114.97.3
            JgRVqrgNs4.exeGet hashmaliciousSnake KeyloggerBrowse
            • 188.114.96.3
            H3fwQALXDX.exeGet hashmaliciousSnake KeyloggerBrowse
            • 188.114.97.3
            oHchwlxMNG.exeGet hashmaliciousSnake KeyloggerBrowse
            • 188.114.97.3
            zkB0qfWSJk.exeGet hashmaliciousSnake KeyloggerBrowse
            • 188.114.97.3
            checkip.dyndns.comlista de cotizaciones.xlam.exeGet hashmaliciousSnake KeyloggerBrowse
            • 132.226.8.169
            Details.exeGet hashmaliciousSnake KeyloggerBrowse
            • 132.226.8.169
            PM114079-990528.exeGet hashmaliciousSnake KeyloggerBrowse
            • 193.122.6.168
            Bank Slip 2.docGet hashmaliciousSnake KeyloggerBrowse
            • 158.101.44.242
            MT_80362_72605XLS.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
            • 158.101.44.242
            JgRVqrgNs4.exeGet hashmaliciousSnake KeyloggerBrowse
            • 158.101.44.242
            JgRVqrgNs4.exeGet hashmaliciousSnake KeyloggerBrowse
            • 193.122.6.168
            H3fwQALXDX.exeGet hashmaliciousSnake KeyloggerBrowse
            • 193.122.6.168
            oHchwlxMNG.exeGet hashmaliciousSnake KeyloggerBrowse
            • 132.226.247.73
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            ORACLE-BMC-31898USmirai.mips.elfGet hashmaliciousMiraiBrowse
            • 129.147.199.239
            PM114079-990528.exeGet hashmaliciousSnake KeyloggerBrowse
            • 193.122.6.168
            0wVYV60JHd.elfGet hashmaliciousMiraiBrowse
            • 129.147.194.27
            h1dNV0rAcX.elfGet hashmaliciousMiraiBrowse
            • 193.122.239.131
            Bank Slip 2.docGet hashmaliciousSnake KeyloggerBrowse
            • 158.101.44.242
            MT_80362_72605XLS.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
            • 158.101.44.242
            JgRVqrgNs4.exeGet hashmaliciousSnake KeyloggerBrowse
            • 158.101.44.242
            JgRVqrgNs4.exeGet hashmaliciousSnake KeyloggerBrowse
            • 193.122.6.168
            H3fwQALXDX.exeGet hashmaliciousSnake KeyloggerBrowse
            • 193.122.6.168
            CLOUDFLARENETUShttps://t.co/2dNESf0PrbGet hashmaliciousUnknownBrowse
            • 104.17.25.14
            3z5nZg91qJ.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
            • 172.67.74.152
            call_Playback_ball.com.htmlGet hashmaliciousHTMLPhisherBrowse
            • 104.17.25.14
            QUOTATION_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
            • 188.114.97.3
            6RVmzn1DzL.exeGet hashmaliciousLummaCBrowse
            • 172.67.141.234
            Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousGuLoaderBrowse
            • 172.67.74.152
            DHL AWB COMMERCAIL INVOICE AND TRACKNG DETAILS.exeGet hashmaliciousAgentTeslaBrowse
            • 104.26.13.205
            orden de compra.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
            • 188.114.96.3
            https://128.165.205.92.host.secureserver.net/Get hashmaliciousHTMLPhisherBrowse
            • 1.1.1.1
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            54328bd36c14bd82ddaa0c04b25ed9adDetails.exeGet hashmaliciousSnake KeyloggerBrowse
            • 188.114.97.3
            PM114079-990528.exeGet hashmaliciousSnake KeyloggerBrowse
            • 188.114.97.3
            MT_80362_72605XLS.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
            • 188.114.97.3
            bJLd0SUHfj.exeGet hashmaliciousUnknownBrowse
            • 188.114.97.3
            PGjIoaqfQY.exeGet hashmaliciousUnknownBrowse
            • 188.114.97.3
            JgRVqrgNs4.exeGet hashmaliciousSnake KeyloggerBrowse
            • 188.114.97.3
            x6221haMsm.exeGet hashmaliciousUnknownBrowse
            • 188.114.97.3
            JgRVqrgNs4.exeGet hashmaliciousSnake KeyloggerBrowse
            • 188.114.97.3
            H3fwQALXDX.exeGet hashmaliciousSnake KeyloggerBrowse
            • 188.114.97.3
            No context
            Process:C:\Users\user\Desktop\whiteee.exe
            File Type:data
            Category:dropped
            Size (bytes):94302
            Entropy (8bit):7.917642664391931
            Encrypted:false
            SSDEEP:1536:93QKWvqNhX1wt2JN7uYBIErjo51aDJwzLqQO7uS585KsZOE5omTbGb:JQKMqNhlwt2JNyeDJ4LqQO7uSaL5Tab
            MD5:08E69F513E7135B7F341730C2EB9AE0C
            SHA1:F1C465DB20849547B40408A3D10476D6FB7588B2
            SHA-256:CB38FA0173C8D4328AE2D6B3ECAFF70EB2A370788768AA1C75F5E2900DDE0F3B
            SHA-512:1916976DCBE1F93D647DD5737574AF05F2CE05892C47C9A958DAA32D0000F1ADD0FED98907C19F0D1AA2F274E48E1EBA65EBF0C7F9B7A386C0C09CA6BDD2B65A
            Malicious:false
            Reputation:low
            Preview:EA06.....G.s...aX..f....iA..kU...sE..j@....X.......h`.....X.J0t.......'...b;&..2YD.cE.J,u).z.7..j..L./..&.....e.W..X.ViK..,f...M.J...U...5..*5...C.....`..7U..V.p..,...B.X..@..d.5.....kU.]:iC......T........(3.(.f*`...,.Z...;.../..P.O.B? .o..1....1.. ....f. .a..R..*..7....>..V.0.QiSy............Xi*....&.4.......9.......5..!.y....y..o`.....;.n....b.S..l.).[.0.N............./..Z....n.uY......L...z~.Y.8....,. ........... .A..!.@....XH.....a..,+............D.(.."T....P.Og6.m..0.T.4...=..f5..J.7......a[..f4.e:iK..kU...?E...SP...o...*<.A....}.e......~?I.G/s..B.|..h..%Ra0...sY.&..._.:\.sC..S..`..rh.....~..h......Qc....P..k..v7;..jSH.b'c..4.c..K.Sy...1.K.].m.k=.,*......j\.Y.%K. ..#uH.J.K..g3.mo.1../.`...n.L&...kG...Y..~..G...B11..isY.*g...j5.......&.)......&....x..<..2e..Nh3...{...j}.p........n..^...x.B{....YT..it..U.U*.....;..@R....+..#w:.J.J..hs[.ZaZ.....Tz.1..e.7.....L.rZ...h.N...E.o...fR...c....)E..z.MgS.H.A..N.[.."?A....9^....L.}@..%I.E.s)GZ.V..
            Process:C:\Users\user\Desktop\whiteee.exe
            File Type:data
            Category:dropped
            Size (bytes):9756
            Entropy (8bit):7.59858423713064
            Encrypted:false
            SSDEEP:192:Zj4X4BSXRq4D63ILqnXTj9aiAjtFMw5V8vdjE6TH8XyMBMEuVV:l4oBSfD6YLCTEbjMwYvdkyJEI
            MD5:E6437615E55D65F684E3B1225B1A154D
            SHA1:6626CBA35D589C334597BEF3B683134A2B731529
            SHA-256:14422302512F449ABD823C0E3AE8BFEACC008597714B8FA010DDFE1DB8BFC73A
            SHA-512:FC315B301BFEB27C8070D793F2224F146F42222EEA21C658686B096D9F23AF4569CE938AF0AAF8D1879BB0780DE4957F9E7C7116144EC24780029ED8DE1AFAAF
            Malicious:false
            Reputation:low
            Preview:EA06..p......\.k8.......p.L&S...k6......1.L&.i..i5.M-...K.....7...p. .... .o...m.\-......[..9....3.|.f....s2..@.]..g3@..h.m.M.......8.l..6....a.........i4........g3Y...c ._..k4...d....H-.......Ap.H..g.....F..=q....>....C`....@02..N@...u.t....Y..ao.M.]>........x>;.......j.;.......j.;.....L.j.;..... '.b.5.....^..f./Z.M..#^...h.#..z.o0.H....S....#.p..N@B=8..........l......>_L......|........`.R...Mf....m8....d....{.........x.....I..l...$..6..._...r...f..x.g.o..l|3I..h...|..K...4.;x#G.o.h.-. .o..0...f........n.@./..6.......%.....\.4.p.\&..is...3I....x\'....f.)..F.8....ep.....9...I.....,......50...bi2..4.9..`....n.0...v....Yvp.N.B3@...B3....@.5n..a....%p.....c......S....5..B3`..\f@....,fmq.L.`+ .#7.....c. ...7)......f.....,vf.....o3.N.M..p...0.....3o..N.i...9...!94.X...c79..s4..F.!..f......Xjqr...W...f.....f.,...6.......g.....,vj.....r...B..!...;6....h...7...&.S ...,fqq....,P.!...(..Y...F.....s7..B3`.....;7.X...q..@B..Fj......g....9-...#.q...!78.X...c3...mr...
            Process:C:\Users\user\Desktop\whiteee.exe
            File Type:ASCII text, with very long lines (28680), with no line terminators
            Category:dropped
            Size (bytes):28680
            Entropy (8bit):3.5819791737673996
            Encrypted:false
            SSDEEP:384:YzJejro12+7eXZdNPlWrqGjfOtr+KJmJEcouNlLmmuN0b0mTTqLOTHhC:YNegs6eXDNPlWrGtwJEcouNpuXIT0KC
            MD5:A327834B411331A2A30DD0982B1B0FD0
            SHA1:CFED37E33A24005D85BF1C9F70ED67AB517F8FBF
            SHA-256:5E9FA4E8A141D8720FF63B2ADD4A8D22046F1B8A177725FE2F89852AC1F2AF55
            SHA-512:84BB685943B0953137BC1F676C66CE950815BB2D076AB2E51AD91F5EF4522A74322A329D89C3917361F6F08C53F00FE5E36A76C01B45D7871F9FD8B25EA04B20
            Malicious:false
            Reputation:low
            Preview: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
            Process:C:\Users\user\Desktop\whiteee.exe
            File Type:data
            Category:dropped
            Size (bytes):133120
            Entropy (8bit):6.981698798475341
            Encrypted:false
            SSDEEP:3072:mdfi0JI5x2QxTz0qJteWhqUZXxLYGlaCB4I5WHn1:mdXeDlQetThqokMaCaIEV
            MD5:4C2A282BAB95F9DA2CFE55CEF1A10DF4
            SHA1:4B1DCC4B7D0DD47E643B423480C0DB7BF55FDBD6
            SHA-256:45F186D0F1364BAC390B52C5E872CC731EB18D754151EF096D82A16FC73BB819
            SHA-512:76DD642F670ED04992E42C09EC7003E3EDF5E49B6870E869C1257A115AF2F8EFBAD1DB6BF05591114114212F4353B1556C522622A6085DD5B78761DDE6A5AD52
            Malicious:false
            Reputation:low
            Preview:t..1Q00X=A59..4A.UZPV79E.1R00X9A59IN4A1UZPV79EC1R00X9A59IN4A.UZPX(.KC.[...8....&]2.%(?1EX(cR3^^7MaW\i<A/.<4p.xje.^6U.U4K.9IN4A1U..V7uD@1~UE>9A59IN4A.UXQ]6iEC.S00L9A59IN.P3UZpV79eA1R0pX9a59IL4A5UZPV79EG1R00X9A5YKN4C1UZPV7;E..R0 X9Q59IN$A1EZPV79ES1R00X9A59IN.P3U.PV79eA1. 0X9A59IN4A1UZPV79ECqP0<X9A59IN4A1UZPV79EC1R00X9A59IN4A1UZPV79EC1R00X9A59IN4a1URPV79EC1R00X1a59.N4A1UZPV79EmE7HDX9A..HN4a1UZ.W79GC1R00X9A59IN4A.UZ0xEJ7 1R0.H9A5.KN4S1UZ.W79EC1R00X9A59.N4..'?<9T9EO1R00.;A5;IN4G3UZPV79EC1R00XyA5{IN4A1UZPV79EC1R0@I;A59IN|A1UXPS7.dB1V.0X:A59.N4G.u[P.79EC1R00X9A59IN4A1UZPV79EC1R00X9A59IN4A1UZP.J.J..YC..A59IN4@3V^V^?9EC1R00XGA59.N4AqUZPa79Ef1R0]X9A.9INJA1U$PV7]EC1 00XXA59.N4A^UZP879E=1R0.Z.a59Cd.A3}{PV=9o.Bp00R.@59M=.A1_.RV7=6g1R:.[9A1JlN4K.QZPRD.EC;.50X=ko9J."G1UA?o79OC2.%6X9Z..IL.{1UPP|.9F.$T00C.c5;.G4A5..#K79CkrR0:,0A5;.D4A5.DR~s9EI.pN X9E.9clJP1U^{V..;Q1R4.X.cK*IN0j1.x.B79Ah1x.2.-A5=clJT1U^{V..;U1R4.X.cK.IN0j1.DR. 9EG.T.RXK.)99M[.1U\x.79OknR06X.{5GiN4E3:.PV=.o.1P.1Y9K5;J3.A1QXT+.9EG..02#.A
            File type:PE32 executable (GUI) Intel 80386, for MS Windows
            Entropy (8bit):6.789821451267343
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.96%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:whiteee.exe
            File size:1'078'272 bytes
            MD5:9a961cdb405219d714347c06a7a6a995
            SHA1:2bf6f2e31d453c52685f8ffeaa52056aa727674d
            SHA256:2cbc13099ee1ba4b8c671bfca525bb2c5c057c2fc13df105dec2852a8b672e50
            SHA512:c016af696bf4b3eb6d27a61afc6760eee7d50624ee198e9d64562564ee6f5243508edf215b5325010ee9a484cbe4d218bc6beb52eefe9a548738022e82fedf3f
            SSDEEP:24576:tqDEvCTbMWu7rQYlBQcBiT6rprG8af3BG5kPJ:tTvC/MTQYxsWR7afJ
            TLSH:70358D03738D822EFF9A91721B76E23146BC6F270123A55F32D85D7EB970165063E6E2
            File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
            Icon Hash:6ced8d96b2ace4b2
            Entrypoint:0x420577
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
            Time Stamp:0x66834214 [Mon Jul 1 23:56:04 2024 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:5
            OS Version Minor:1
            File Version Major:5
            File Version Minor:1
            Subsystem Version Major:5
            Subsystem Version Minor:1
            Import Hash:948cc502fe9226992dce9417f952fce3
            Instruction
            call 00007F10688B7A73h
            jmp 00007F10688B737Fh
            push ebp
            mov ebp, esp
            push esi
            push dword ptr [ebp+08h]
            mov esi, ecx
            call 00007F10688B755Dh
            mov dword ptr [esi], 0049FDF0h
            mov eax, esi
            pop esi
            pop ebp
            retn 0004h
            and dword ptr [ecx+04h], 00000000h
            mov eax, ecx
            and dword ptr [ecx+08h], 00000000h
            mov dword ptr [ecx+04h], 0049FDF8h
            mov dword ptr [ecx], 0049FDF0h
            ret
            push ebp
            mov ebp, esp
            push esi
            push dword ptr [ebp+08h]
            mov esi, ecx
            call 00007F10688B752Ah
            mov dword ptr [esi], 0049FE0Ch
            mov eax, esi
            pop esi
            pop ebp
            retn 0004h
            and dword ptr [ecx+04h], 00000000h
            mov eax, ecx
            and dword ptr [ecx+08h], 00000000h
            mov dword ptr [ecx+04h], 0049FE14h
            mov dword ptr [ecx], 0049FE0Ch
            ret
            push ebp
            mov ebp, esp
            push esi
            mov esi, ecx
            lea eax, dword ptr [esi+04h]
            mov dword ptr [esi], 0049FDD0h
            and dword ptr [eax], 00000000h
            and dword ptr [eax+04h], 00000000h
            push eax
            mov eax, dword ptr [ebp+08h]
            add eax, 04h
            push eax
            call 00007F10688BA11Dh
            pop ecx
            pop ecx
            mov eax, esi
            pop esi
            pop ebp
            retn 0004h
            lea eax, dword ptr [ecx+04h]
            mov dword ptr [ecx], 0049FDD0h
            push eax
            call 00007F10688BA168h
            pop ecx
            ret
            push ebp
            mov ebp, esp
            push esi
            mov esi, ecx
            lea eax, dword ptr [esi+04h]
            mov dword ptr [esi], 0049FDD0h
            push eax
            call 00007F10688BA151h
            test byte ptr [ebp+08h], 00000001h
            pop ecx
            Programming Language:
            • [ C ] VS2008 SP1 build 30729
            • [IMP] VS2008 SP1 build 30729
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x309d4.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1050000x7594.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .rsrc0xd40000x309d40x30a0053b90fe8965d1e582c974302cca02fb6False0.6482567480719794data7.032311781909001IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0x1050000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            RT_ICON0xd44580x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
            RT_ICON0xd45800x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
            RT_ICON0xd46a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
            RT_ICON0xd47d00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 34556 x 34556 px/mEnglishGreat Britain0.07952797823258015
            RT_MENU0xe4ff80x50dataEnglishGreat Britain0.9
            RT_STRING0xe50480x594dataEnglishGreat Britain0.3333333333333333
            RT_STRING0xe55dc0x68adataEnglishGreat Britain0.2735961768219833
            RT_STRING0xe5c680x490dataEnglishGreat Britain0.3715753424657534
            RT_STRING0xe60f80x5fcdataEnglishGreat Britain0.3087467362924282
            RT_STRING0xe66f40x65cdataEnglishGreat Britain0.34336609336609336
            RT_STRING0xe6d500x466dataEnglishGreat Britain0.3605683836589698
            RT_STRING0xe71b80x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
            RT_RCDATA0xe73100x1d176data1.0003860420618003
            RT_GROUP_ICON0x1044880x14dataEnglishGreat Britain1.25
            RT_GROUP_ICON0x10449c0x14dataEnglishGreat Britain1.25
            RT_GROUP_ICON0x1044b00x14dataEnglishGreat Britain1.15
            RT_GROUP_ICON0x1044c40x14dataEnglishGreat Britain1.25
            RT_VERSION0x1044d80x10cdataEnglishGreat Britain0.5970149253731343
            RT_MANIFEST0x1045e40x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
            DLLImport
            WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
            VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
            WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
            COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
            MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
            WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
            PSAPI.DLLGetProcessMemoryInfo
            IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
            USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
            UxTheme.dllIsThemeActive
            KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
            USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
            GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
            COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
            ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
            SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
            ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
            OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
            Language of compilation systemCountry where language is spokenMap
            EnglishGreat Britain
            TimestampSource PortDest PortSource IPDest IP
            Jul 2, 2024 09:54:26.952009916 CEST4973080192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:26.956883907 CEST8049730193.122.6.168192.168.2.4
            Jul 2, 2024 09:54:26.957026005 CEST4973080192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:26.957138062 CEST4973080192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:26.962318897 CEST8049730193.122.6.168192.168.2.4
            Jul 2, 2024 09:54:27.591464996 CEST8049730193.122.6.168192.168.2.4
            Jul 2, 2024 09:54:27.615267038 CEST4973080192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:27.620173931 CEST8049730193.122.6.168192.168.2.4
            Jul 2, 2024 09:54:27.802650928 CEST8049730193.122.6.168192.168.2.4
            Jul 2, 2024 09:54:27.854101896 CEST4973080192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:27.864638090 CEST49731443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:27.864675999 CEST44349731188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:27.864742994 CEST49731443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:27.873584032 CEST49731443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:27.873594999 CEST44349731188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:28.369517088 CEST44349731188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:28.369602919 CEST49731443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:28.375020981 CEST49731443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:28.375035048 CEST44349731188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:28.375300884 CEST44349731188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:28.416838884 CEST49731443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:28.423181057 CEST49731443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:28.464500904 CEST44349731188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:28.535621881 CEST44349731188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:28.535717010 CEST44349731188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:28.535900116 CEST49731443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:28.541799068 CEST49731443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:28.544725895 CEST4973080192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:28.549573898 CEST8049730193.122.6.168192.168.2.4
            Jul 2, 2024 09:54:28.733041048 CEST8049730193.122.6.168192.168.2.4
            Jul 2, 2024 09:54:28.735745907 CEST49732443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:28.735775948 CEST44349732188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:28.735896111 CEST49732443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:28.736105919 CEST49732443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:28.736120939 CEST44349732188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:28.775952101 CEST4973080192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:29.210735083 CEST44349732188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:29.212488890 CEST49732443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:29.212506056 CEST44349732188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:29.364985943 CEST44349732188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:29.365082979 CEST44349732188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:29.365155935 CEST49732443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:29.365729094 CEST49732443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:29.368902922 CEST4973080192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:29.370198011 CEST4973380192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:29.375358105 CEST8049733193.122.6.168192.168.2.4
            Jul 2, 2024 09:54:29.375435114 CEST4973380192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:29.375497103 CEST4973380192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:29.375535011 CEST8049730193.122.6.168192.168.2.4
            Jul 2, 2024 09:54:29.375583887 CEST4973080192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:29.380410910 CEST8049733193.122.6.168192.168.2.4
            Jul 2, 2024 09:54:30.077723980 CEST8049733193.122.6.168192.168.2.4
            Jul 2, 2024 09:54:30.078860044 CEST49734443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:30.078896046 CEST44349734188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:30.078973055 CEST49734443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:30.079211950 CEST49734443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:30.079222918 CEST44349734188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:30.119700909 CEST4973380192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:30.546875000 CEST44349734188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:30.548466921 CEST49734443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:30.548497915 CEST44349734188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:30.674258947 CEST44349734188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:30.674348116 CEST44349734188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:30.674412966 CEST49734443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:30.674931049 CEST49734443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:30.679080009 CEST4973580192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:30.683907032 CEST8049735193.122.6.168192.168.2.4
            Jul 2, 2024 09:54:30.683990955 CEST4973580192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:30.684071064 CEST4973580192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:30.689568996 CEST8049735193.122.6.168192.168.2.4
            Jul 2, 2024 09:54:31.321958065 CEST8049735193.122.6.168192.168.2.4
            Jul 2, 2024 09:54:31.323283911 CEST49736443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:31.323317051 CEST44349736188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:31.323394060 CEST49736443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:31.323617935 CEST49736443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:31.323633909 CEST44349736188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:31.369812012 CEST4973580192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:31.787070036 CEST44349736188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:31.788564920 CEST49736443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:31.788592100 CEST44349736188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:31.939837933 CEST44349736188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:31.939913988 CEST44349736188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:31.939965010 CEST49736443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:31.940423965 CEST49736443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:31.943430901 CEST4973580192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:31.944395065 CEST4973780192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:31.949563026 CEST8049737193.122.6.168192.168.2.4
            Jul 2, 2024 09:54:31.949651003 CEST8049735193.122.6.168192.168.2.4
            Jul 2, 2024 09:54:31.949702978 CEST4973780192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:31.949728012 CEST4973580192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:31.949815035 CEST4973780192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:31.954617977 CEST8049737193.122.6.168192.168.2.4
            Jul 2, 2024 09:54:32.590656042 CEST8049737193.122.6.168192.168.2.4
            Jul 2, 2024 09:54:32.592087984 CEST49738443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:32.592112064 CEST44349738188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:32.592179060 CEST49738443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:32.592421055 CEST49738443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:32.592432976 CEST44349738188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:32.635338068 CEST4973780192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:33.066376925 CEST44349738188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:33.067858934 CEST49738443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:33.067883015 CEST44349738188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:33.192188025 CEST44349738188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:33.192250013 CEST44349738188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:33.192301989 CEST49738443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:33.192662954 CEST49738443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:33.195447922 CEST4973780192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:33.196407080 CEST4973980192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:33.201359987 CEST8049737193.122.6.168192.168.2.4
            Jul 2, 2024 09:54:33.201426029 CEST4973780192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:33.202235937 CEST8049739193.122.6.168192.168.2.4
            Jul 2, 2024 09:54:33.202347994 CEST4973980192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:33.202431917 CEST4973980192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:33.208538055 CEST8049739193.122.6.168192.168.2.4
            Jul 2, 2024 09:54:33.841557980 CEST8049739193.122.6.168192.168.2.4
            Jul 2, 2024 09:54:33.842823029 CEST49740443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:33.842861891 CEST44349740188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:33.842947006 CEST49740443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:33.843190908 CEST49740443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:33.843202114 CEST44349740188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:33.885453939 CEST4973980192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:34.311857939 CEST44349740188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:34.314580917 CEST49740443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:34.314604044 CEST44349740188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:34.454984903 CEST44349740188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:34.455037117 CEST44349740188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:34.455096960 CEST49740443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:34.455508947 CEST49740443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:34.458550930 CEST4973980192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:34.459732056 CEST4974180192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:34.464507103 CEST8049739193.122.6.168192.168.2.4
            Jul 2, 2024 09:54:34.464575052 CEST4973980192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:34.464658976 CEST8049741193.122.6.168192.168.2.4
            Jul 2, 2024 09:54:34.464734077 CEST4974180192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:34.464793921 CEST4974180192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:34.469630003 CEST8049741193.122.6.168192.168.2.4
            Jul 2, 2024 09:54:35.102057934 CEST8049741193.122.6.168192.168.2.4
            Jul 2, 2024 09:54:35.103156090 CEST49742443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:35.103199005 CEST44349742188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:35.103261948 CEST49742443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:35.103502035 CEST49742443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:35.103518009 CEST44349742188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:35.150958061 CEST4974180192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:35.579931974 CEST44349742188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:35.581551075 CEST49742443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:35.581581116 CEST44349742188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:35.705929041 CEST44349742188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:35.705997944 CEST44349742188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:35.706052065 CEST49742443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:35.708117008 CEST49742443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:35.711590052 CEST4974180192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:35.712743044 CEST4974380192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:35.717230082 CEST8049741193.122.6.168192.168.2.4
            Jul 2, 2024 09:54:35.717292070 CEST4974180192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:35.717577934 CEST8049743193.122.6.168192.168.2.4
            Jul 2, 2024 09:54:35.717638016 CEST4974380192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:35.717850924 CEST4974380192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:35.723162889 CEST8049743193.122.6.168192.168.2.4
            Jul 2, 2024 09:54:36.359414101 CEST8049743193.122.6.168192.168.2.4
            Jul 2, 2024 09:54:36.373446941 CEST49744443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:36.373505116 CEST44349744188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:36.373577118 CEST49744443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:36.380245924 CEST49744443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:36.380261898 CEST44349744188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:36.403595924 CEST4974380192.168.2.4193.122.6.168
            Jul 2, 2024 09:54:36.846780062 CEST44349744188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:36.848429918 CEST49744443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:36.848457098 CEST44349744188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:36.987566948 CEST44349744188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:36.987653971 CEST44349744188.114.97.3192.168.2.4
            Jul 2, 2024 09:54:36.987694025 CEST49744443192.168.2.4188.114.97.3
            Jul 2, 2024 09:54:36.988120079 CEST49744443192.168.2.4188.114.97.3
            Jul 2, 2024 09:55:35.030750990 CEST8049733193.122.6.168192.168.2.4
            Jul 2, 2024 09:55:35.030827999 CEST4973380192.168.2.4193.122.6.168
            Jul 2, 2024 09:55:41.359831095 CEST8049743193.122.6.168192.168.2.4
            Jul 2, 2024 09:55:41.360004902 CEST4974380192.168.2.4193.122.6.168
            Jul 2, 2024 09:56:16.385663033 CEST4974380192.168.2.4193.122.6.168
            Jul 2, 2024 09:56:16.390964031 CEST8049743193.122.6.168192.168.2.4
            TimestampSource PortDest PortSource IPDest IP
            Jul 2, 2024 09:54:26.938918114 CEST6029453192.168.2.41.1.1.1
            Jul 2, 2024 09:54:26.947499990 CEST53602941.1.1.1192.168.2.4
            Jul 2, 2024 09:54:27.844763994 CEST5914453192.168.2.41.1.1.1
            Jul 2, 2024 09:54:27.864085913 CEST53591441.1.1.1192.168.2.4
            Jul 2, 2024 09:54:59.861407995 CEST5361614162.159.36.2192.168.2.4
            Jul 2, 2024 09:55:00.338304043 CEST6406053192.168.2.41.1.1.1
            Jul 2, 2024 09:55:00.347007990 CEST53640601.1.1.1192.168.2.4
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Jul 2, 2024 09:54:26.938918114 CEST192.168.2.41.1.1.10xbb6fStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
            Jul 2, 2024 09:54:27.844763994 CEST192.168.2.41.1.1.10xf943Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
            Jul 2, 2024 09:55:00.338304043 CEST192.168.2.41.1.1.10xe57aStandard query (0)56.126.166.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Jul 2, 2024 09:54:26.947499990 CEST1.1.1.1192.168.2.40xbb6fNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
            Jul 2, 2024 09:54:26.947499990 CEST1.1.1.1192.168.2.40xbb6fNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
            Jul 2, 2024 09:54:26.947499990 CEST1.1.1.1192.168.2.40xbb6fNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
            Jul 2, 2024 09:54:26.947499990 CEST1.1.1.1192.168.2.40xbb6fNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
            Jul 2, 2024 09:54:26.947499990 CEST1.1.1.1192.168.2.40xbb6fNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
            Jul 2, 2024 09:54:26.947499990 CEST1.1.1.1192.168.2.40xbb6fNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
            Jul 2, 2024 09:54:27.864085913 CEST1.1.1.1192.168.2.40xf943No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
            Jul 2, 2024 09:54:27.864085913 CEST1.1.1.1192.168.2.40xf943No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
            Jul 2, 2024 09:55:00.347007990 CEST1.1.1.1192.168.2.40xe57aName error (3)56.126.166.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
            • reallyfreegeoip.org
            • checkip.dyndns.org
            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            0192.168.2.449730193.122.6.168807336C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            TimestampBytes transferredDirectionData
            Jul 2, 2024 09:54:26.957138062 CEST151OUTGET / HTTP/1.1
            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
            Host: checkip.dyndns.org
            Connection: Keep-Alive
            Jul 2, 2024 09:54:27.591464996 CEST320INHTTP/1.1 200 OK
            Date: Tue, 02 Jul 2024 07:54:27 GMT
            Content-Type: text/html
            Content-Length: 103
            Connection: keep-alive
            Cache-Control: no-cache
            Pragma: no-cache
            X-Request-ID: 268a14cf279200fcbfc109d211e05488
            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
            Jul 2, 2024 09:54:27.615267038 CEST127OUTGET / HTTP/1.1
            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
            Host: checkip.dyndns.org
            Jul 2, 2024 09:54:27.802650928 CEST320INHTTP/1.1 200 OK
            Date: Tue, 02 Jul 2024 07:54:27 GMT
            Content-Type: text/html
            Content-Length: 103
            Connection: keep-alive
            Cache-Control: no-cache
            Pragma: no-cache
            X-Request-ID: ca07b235210b757865fb5a22e07ac690
            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
            Jul 2, 2024 09:54:28.544725895 CEST127OUTGET / HTTP/1.1
            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
            Host: checkip.dyndns.org
            Jul 2, 2024 09:54:28.733041048 CEST320INHTTP/1.1 200 OK
            Date: Tue, 02 Jul 2024 07:54:28 GMT
            Content-Type: text/html
            Content-Length: 103
            Connection: keep-alive
            Cache-Control: no-cache
            Pragma: no-cache
            X-Request-ID: 1b2b187e3cec818fe495b92f6a739f83
            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            1192.168.2.449733193.122.6.168807336C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            TimestampBytes transferredDirectionData
            Jul 2, 2024 09:54:29.375497103 CEST127OUTGET / HTTP/1.1
            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
            Host: checkip.dyndns.org
            Jul 2, 2024 09:54:30.077723980 CEST320INHTTP/1.1 200 OK
            Date: Tue, 02 Jul 2024 07:54:29 GMT
            Content-Type: text/html
            Content-Length: 103
            Connection: keep-alive
            Cache-Control: no-cache
            Pragma: no-cache
            X-Request-ID: 25de74c8444bacf7529b233bea92bce9
            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            2192.168.2.449735193.122.6.168807336C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            TimestampBytes transferredDirectionData
            Jul 2, 2024 09:54:30.684071064 CEST151OUTGET / HTTP/1.1
            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
            Host: checkip.dyndns.org
            Connection: Keep-Alive
            Jul 2, 2024 09:54:31.321958065 CEST320INHTTP/1.1 200 OK
            Date: Tue, 02 Jul 2024 07:54:31 GMT
            Content-Type: text/html
            Content-Length: 103
            Connection: keep-alive
            Cache-Control: no-cache
            Pragma: no-cache
            X-Request-ID: e76daa2ed716d9dc6ab414a1e497d30c
            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            3192.168.2.449737193.122.6.168807336C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            TimestampBytes transferredDirectionData
            Jul 2, 2024 09:54:31.949815035 CEST151OUTGET / HTTP/1.1
            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
            Host: checkip.dyndns.org
            Connection: Keep-Alive
            Jul 2, 2024 09:54:32.590656042 CEST320INHTTP/1.1 200 OK
            Date: Tue, 02 Jul 2024 07:54:32 GMT
            Content-Type: text/html
            Content-Length: 103
            Connection: keep-alive
            Cache-Control: no-cache
            Pragma: no-cache
            X-Request-ID: 14e38a26a56bfad2e95ee0ca7a0c9dfb
            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            4192.168.2.449739193.122.6.168807336C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            TimestampBytes transferredDirectionData
            Jul 2, 2024 09:54:33.202431917 CEST151OUTGET / HTTP/1.1
            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
            Host: checkip.dyndns.org
            Connection: Keep-Alive
            Jul 2, 2024 09:54:33.841557980 CEST320INHTTP/1.1 200 OK
            Date: Tue, 02 Jul 2024 07:54:33 GMT
            Content-Type: text/html
            Content-Length: 103
            Connection: keep-alive
            Cache-Control: no-cache
            Pragma: no-cache
            X-Request-ID: e505f9114bf0726c1c4f9bf2550735b3
            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            5192.168.2.449741193.122.6.168807336C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            TimestampBytes transferredDirectionData
            Jul 2, 2024 09:54:34.464793921 CEST151OUTGET / HTTP/1.1
            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
            Host: checkip.dyndns.org
            Connection: Keep-Alive
            Jul 2, 2024 09:54:35.102057934 CEST320INHTTP/1.1 200 OK
            Date: Tue, 02 Jul 2024 07:54:35 GMT
            Content-Type: text/html
            Content-Length: 103
            Connection: keep-alive
            Cache-Control: no-cache
            Pragma: no-cache
            X-Request-ID: 104351cf418af8dc484864a4b602291f
            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            6192.168.2.449743193.122.6.168807336C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            TimestampBytes transferredDirectionData
            Jul 2, 2024 09:54:35.717850924 CEST151OUTGET / HTTP/1.1
            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
            Host: checkip.dyndns.org
            Connection: Keep-Alive
            Jul 2, 2024 09:54:36.359414101 CEST320INHTTP/1.1 200 OK
            Date: Tue, 02 Jul 2024 07:54:36 GMT
            Content-Type: text/html
            Content-Length: 103
            Connection: keep-alive
            Cache-Control: no-cache
            Pragma: no-cache
            X-Request-ID: 46e34954e6b8d57f7f9a8a2c1a4ec1d0
            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            0192.168.2.449731188.114.97.34437336C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            TimestampBytes transferredDirectionData
            2024-07-02 07:54:28 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
            Host: reallyfreegeoip.org
            Connection: Keep-Alive
            2024-07-02 07:54:28 UTC720INHTTP/1.1 200 OK
            Date: Tue, 02 Jul 2024 07:54:28 GMT
            Content-Type: application/xml
            Transfer-Encoding: chunked
            Connection: close
            access-control-allow-origin: *
            vary: Accept-Encoding
            Cache-Control: max-age=86400
            CF-Cache-Status: HIT
            Age: 23197
            Last-Modified: Tue, 02 Jul 2024 01:27:51 GMT
            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9L6IbgLAEb%2B%2B%2BaB9jprn%2FN5cxuW8r%2F1AbnVnIg5hDoaFZX5d2%2FE33IjS%2BceVRqT6alM0faBWvo0IyC2uAdmjbW5AytD%2BVjwtWFFti1PYEra4u8Hp%2Bqk6ubFHaORgeGQns7%2FARNBu"}],"group":"cf-nel","max_age":604800}
            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
            Server: cloudflare
            CF-RAY: 89cd1167fd0618a1-EWR
            alt-svc: h3=":443"; ma=86400
            2024-07-02 07:54:28 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
            2024-07-02 07:54:28 UTC5INData Raw: 30 0d 0a 0d 0a
            Data Ascii: 0


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            1192.168.2.449732188.114.97.34437336C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            TimestampBytes transferredDirectionData
            2024-07-02 07:54:29 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
            Host: reallyfreegeoip.org
            2024-07-02 07:54:29 UTC704INHTTP/1.1 200 OK
            Date: Tue, 02 Jul 2024 07:54:29 GMT
            Content-Type: application/xml
            Transfer-Encoding: chunked
            Connection: close
            access-control-allow-origin: *
            vary: Accept-Encoding
            Cache-Control: max-age=86400
            CF-Cache-Status: HIT
            Age: 23198
            Last-Modified: Tue, 02 Jul 2024 01:27:51 GMT
            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=oCLWKSTsJjQuAQqyKgwQdkLsFGURbzzVYqBowYW%2FvvzwqgENqHL%2Fj2ZaMClwGzv76OaQVwrJGt7b7JbxeuLFLyXHlAJplAqVTF7qlw0vMMjrSd37zARMzzi4uYYkikh28zp2xXQ8"}],"group":"cf-nel","max_age":604800}
            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
            Server: cloudflare
            CF-RAY: 89cd116d29958ca2-EWR
            alt-svc: h3=":443"; ma=86400
            2024-07-02 07:54:29 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
            2024-07-02 07:54:29 UTC5INData Raw: 30 0d 0a 0d 0a
            Data Ascii: 0


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            2192.168.2.449734188.114.97.34437336C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            TimestampBytes transferredDirectionData
            2024-07-02 07:54:30 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
            Host: reallyfreegeoip.org
            2024-07-02 07:54:30 UTC706INHTTP/1.1 200 OK
            Date: Tue, 02 Jul 2024 07:54:30 GMT
            Content-Type: application/xml
            Transfer-Encoding: chunked
            Connection: close
            access-control-allow-origin: *
            vary: Accept-Encoding
            Cache-Control: max-age=86400
            CF-Cache-Status: HIT
            Age: 23199
            Last-Modified: Tue, 02 Jul 2024 01:27:51 GMT
            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qfnwprngs%2BSD5KmzKz2GliHXlRbvg1kk8Ospq25LvAgumX8VvQ%2BXl9jq3D%2FJmUKipY6JhERUqzuGE65RnmVWZraDPsvPdQ0Np69bDlnXOO64RignfwsIWkS4viLQu12ezvYEP18U"}],"group":"cf-nel","max_age":604800}
            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
            Server: cloudflare
            CF-RAY: 89cd11755aab727b-EWR
            alt-svc: h3=":443"; ma=86400
            2024-07-02 07:54:30 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
            2024-07-02 07:54:30 UTC5INData Raw: 30 0d 0a 0d 0a
            Data Ascii: 0


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            3192.168.2.449736188.114.97.34437336C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            TimestampBytes transferredDirectionData
            2024-07-02 07:54:31 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
            Host: reallyfreegeoip.org
            Connection: Keep-Alive
            2024-07-02 07:54:31 UTC700INHTTP/1.1 200 OK
            Date: Tue, 02 Jul 2024 07:54:31 GMT
            Content-Type: application/xml
            Transfer-Encoding: chunked
            Connection: close
            access-control-allow-origin: *
            vary: Accept-Encoding
            Cache-Control: max-age=86400
            CF-Cache-Status: HIT
            Age: 23200
            Last-Modified: Tue, 02 Jul 2024 01:27:51 GMT
            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=EFYDPtxQa7drhzMThazgvuZ55hdKSP0ZhM9yiwLZYOFOCkfdVEGomTZyyEWOcZjwvVt8WZuGyCupZlLAw8XiKDMQDIHEIDuV25fpPKQ4ykYpfEV4Vhoxh3LcOf8K0Bb7Dcr52Sdq"}],"group":"cf-nel","max_age":604800}
            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
            Server: cloudflare
            CF-RAY: 89cd117d3a5e8c33-EWR
            alt-svc: h3=":443"; ma=86400
            2024-07-02 07:54:31 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
            2024-07-02 07:54:31 UTC5INData Raw: 30 0d 0a 0d 0a
            Data Ascii: 0


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            4192.168.2.449738188.114.97.34437336C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            TimestampBytes transferredDirectionData
            2024-07-02 07:54:33 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
            Host: reallyfreegeoip.org
            Connection: Keep-Alive
            2024-07-02 07:54:33 UTC708INHTTP/1.1 200 OK
            Date: Tue, 02 Jul 2024 07:54:33 GMT
            Content-Type: application/xml
            Transfer-Encoding: chunked
            Connection: close
            access-control-allow-origin: *
            vary: Accept-Encoding
            Cache-Control: max-age=86400
            CF-Cache-Status: HIT
            Age: 23202
            Last-Modified: Tue, 02 Jul 2024 01:27:51 GMT
            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Xy4WXfRcGutxb56aN5tSq15mj1V1xWS%2FqiAJ%2B3wusuDCqeranhAog7I9RucMhll1W9oWzORyM5%2BU6xRXLiE3YlNRqiqNLiDOqca5ilcIaSpKUkrxW3UAHTXBPxcHwyTOL%2Bkkv0S9"}],"group":"cf-nel","max_age":604800}
            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
            Server: cloudflare
            CF-RAY: 89cd11851fb643e9-EWR
            alt-svc: h3=":443"; ma=86400
            2024-07-02 07:54:33 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
            2024-07-02 07:54:33 UTC5INData Raw: 30 0d 0a 0d 0a
            Data Ascii: 0


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            5192.168.2.449740188.114.97.34437336C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            TimestampBytes transferredDirectionData
            2024-07-02 07:54:34 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
            Host: reallyfreegeoip.org
            Connection: Keep-Alive
            2024-07-02 07:54:34 UTC704INHTTP/1.1 200 OK
            Date: Tue, 02 Jul 2024 07:54:34 GMT
            Content-Type: application/xml
            Transfer-Encoding: chunked
            Connection: close
            access-control-allow-origin: *
            vary: Accept-Encoding
            Cache-Control: max-age=86400
            CF-Cache-Status: HIT
            Age: 23203
            Last-Modified: Tue, 02 Jul 2024 01:27:51 GMT
            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=A%2FSioUeZYOP8ovlErUoPTO6jw6FnY0GciL7NRz%2B5Eq3rEHMS9SggSYjR3LiaPiOdlj4Kx7ohRfehTFe6FFRTQQ9grkZ9xp4dpLCM7tv4YmgjhOTmGmQEahtz4yzqLPBYgW701nnc"}],"group":"cf-nel","max_age":604800}
            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
            Server: cloudflare
            CF-RAY: 89cd118cfd7f7d06-EWR
            alt-svc: h3=":443"; ma=86400
            2024-07-02 07:54:34 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
            2024-07-02 07:54:34 UTC5INData Raw: 30 0d 0a 0d 0a
            Data Ascii: 0


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            6192.168.2.449742188.114.97.34437336C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            TimestampBytes transferredDirectionData
            2024-07-02 07:54:35 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
            Host: reallyfreegeoip.org
            Connection: Keep-Alive
            2024-07-02 07:54:35 UTC714INHTTP/1.1 200 OK
            Date: Tue, 02 Jul 2024 07:54:35 GMT
            Content-Type: application/xml
            Transfer-Encoding: chunked
            Connection: close
            access-control-allow-origin: *
            vary: Accept-Encoding
            Cache-Control: max-age=86400
            CF-Cache-Status: HIT
            Age: 23204
            Last-Modified: Tue, 02 Jul 2024 01:27:51 GMT
            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=NAemsLUzYIsnOGMATVIRvVlbc%2F4sowSBt%2BPgAdc6RL2mVyBc6W87NALtvSSDbx4f%2BxZ15npQX%2FBMy6Eq%2FyEVtQUtNSYQmYV5%2FCTbWimlRnJ5c%2BZLdraRkUF0ziD9nZ9ukeUaTbMa"}],"group":"cf-nel","max_age":604800}
            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
            Server: cloudflare
            CF-RAY: 89cd1194ca3b80d0-EWR
            alt-svc: h3=":443"; ma=86400
            2024-07-02 07:54:35 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
            2024-07-02 07:54:35 UTC5INData Raw: 30 0d 0a 0d 0a
            Data Ascii: 0


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            7192.168.2.449744188.114.97.34437336C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            TimestampBytes transferredDirectionData
            2024-07-02 07:54:36 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
            Host: reallyfreegeoip.org
            2024-07-02 07:54:36 UTC704INHTTP/1.1 200 OK
            Date: Tue, 02 Jul 2024 07:54:36 GMT
            Content-Type: application/xml
            Transfer-Encoding: chunked
            Connection: close
            access-control-allow-origin: *
            vary: Accept-Encoding
            Cache-Control: max-age=86400
            CF-Cache-Status: HIT
            Age: 23205
            Last-Modified: Tue, 02 Jul 2024 01:27:51 GMT
            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=evPYEthOXqs6UJqkX5nctrcLgqvpgcFOj1TnzYyNXAPWfFyv3mBGsmqqSzWwPaHRGKo1bDa5daRHOy7ldz2su5ZE8ynnWAm4nYB5MBDjkwvBBJDFz566hBTTC5Nyz9A7%2Bm8b5IN%2B"}],"group":"cf-nel","max_age":604800}
            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
            Server: cloudflare
            CF-RAY: 89cd119cca347c7b-EWR
            alt-svc: h3=":443"; ma=86400
            2024-07-02 07:54:36 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
            2024-07-02 07:54:36 UTC5INData Raw: 30 0d 0a 0d 0a
            Data Ascii: 0


            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:03:54:24
            Start date:02/07/2024
            Path:C:\Users\user\Desktop\whiteee.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\whiteee.exe"
            Imagebase:0x370000
            File size:1'078'272 bytes
            MD5 hash:9A961CDB405219D714347C06A7A6A995
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1641198053.0000000001100000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.1641198053.0000000001100000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.1641198053.0000000001100000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1641198053.0000000001100000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
            • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000000.00000002.1641198053.0000000001100000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
            • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000000.00000002.1641198053.0000000001100000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
            • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.1641198053.0000000001100000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
            Reputation:low
            Has exited:true

            Target ID:1
            Start time:03:54:25
            Start date:02/07/2024
            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\whiteee.exe"
            Imagebase:0x810000
            File size:45'984 bytes
            MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4088822876.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000001.00000002.4088822876.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000001.00000002.4088822876.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
            • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000001.00000002.4088822876.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000001.00000002.4093146194.0000000002CE0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000001.00000002.4093146194.0000000002B11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            Reputation:high
            Has exited:false

            Reset < >

              Execution Graph

              Execution Coverage:3.4%
              Dynamic/Decrypted Code Coverage:0.4%
              Signature Coverage:4.8%
              Total number of Nodes:2000
              Total number of Limit Nodes:39
              execution_graph 94775 372e37 94854 37a961 94775->94854 94779 372e6b 94873 373a5a 94779->94873 94781 372e7f 94880 379cb3 94781->94880 94786 372ead 94908 37a8c7 94786->94908 94787 3b2cb0 94928 3e2cf9 94787->94928 94789 3b2cc3 94791 3b2ccf 94789->94791 94954 374f39 94789->94954 94795 374f39 68 API calls 94791->94795 94792 372ec3 94912 376f88 22 API calls 94792->94912 94797 3b2ce5 94795->94797 94796 372ecf 94798 379cb3 22 API calls 94796->94798 94960 373084 22 API calls 94797->94960 94799 372edc 94798->94799 94913 37a81b 41 API calls 94799->94913 94802 372eec 94804 379cb3 22 API calls 94802->94804 94803 3b2d02 94961 373084 22 API calls 94803->94961 94806 372f12 94804->94806 94914 37a81b 41 API calls 94806->94914 94807 3b2d1e 94809 373a5a 24 API calls 94807->94809 94811 3b2d44 94809->94811 94810 372f21 94814 37a961 22 API calls 94810->94814 94962 373084 22 API calls 94811->94962 94813 3b2d50 94815 37a8c7 22 API calls 94813->94815 94816 372f3f 94814->94816 94817 3b2d5e 94815->94817 94915 373084 22 API calls 94816->94915 94963 373084 22 API calls 94817->94963 94820 372f4b 94916 394a28 40 API calls 3 library calls 94820->94916 94821 3b2d6d 94825 37a8c7 22 API calls 94821->94825 94823 372f59 94823->94797 94824 372f63 94823->94824 94917 394a28 40 API calls 3 library calls 94824->94917 94827 3b2d83 94825->94827 94964 373084 22 API calls 94827->94964 94828 372f6e 94828->94803 94830 372f78 94828->94830 94918 394a28 40 API calls 3 library calls 94830->94918 94831 3b2d90 94833 372f83 94833->94807 94834 372f8d 94833->94834 94919 394a28 40 API calls 3 library calls 94834->94919 94836 372f98 94837 372fdc 94836->94837 94920 373084 22 API calls 94836->94920 94837->94821 94838 372fe8 94837->94838 94838->94831 94922 3763eb 22 API calls 94838->94922 94840 372fbf 94843 37a8c7 22 API calls 94840->94843 94842 372ff8 94923 376a50 22 API calls 94842->94923 94845 372fcd 94843->94845 94921 373084 22 API calls 94845->94921 94846 373006 94924 3770b0 23 API calls 94846->94924 94851 373021 94852 373065 94851->94852 94925 376f88 22 API calls 94851->94925 94926 3770b0 23 API calls 94851->94926 94927 373084 22 API calls 94851->94927 94965 38fe0b 94854->94965 94856 37a976 94975 38fddb 94856->94975 94858 372e4d 94859 374ae3 94858->94859 94860 374af0 __wsopen_s 94859->94860 94862 374b22 94860->94862 95003 376b57 94860->95003 94869 374b58 94862->94869 95000 374c6d 94862->95000 94864 374c6d 22 API calls 94864->94869 94865 379cb3 22 API calls 94867 374c52 94865->94867 94866 379cb3 22 API calls 94866->94869 94868 37515f 22 API calls 94867->94868 94871 374c5e 94868->94871 94869->94864 94869->94866 94872 374c29 94869->94872 95015 37515f 94869->95015 94871->94779 94872->94865 94872->94871 95032 3b1f50 94873->95032 94876 379cb3 22 API calls 94877 373a8d 94876->94877 95034 373aa2 94877->95034 94879 373a97 94879->94781 94881 379cc2 _wcslen 94880->94881 94882 38fe0b 22 API calls 94881->94882 94883 379cea __fread_nolock 94882->94883 94884 38fddb 22 API calls 94883->94884 94885 372e8c 94884->94885 94886 374ecb 94885->94886 95054 374e90 LoadLibraryA 94886->95054 94891 374ef6 LoadLibraryExW 95062 374e59 LoadLibraryA 94891->95062 94892 3b3ccf 94893 374f39 68 API calls 94892->94893 94895 3b3cd6 94893->94895 94897 374e59 3 API calls 94895->94897 94901 3b3cde 94897->94901 94899 374f20 94900 374f2c 94899->94900 94899->94901 94902 374f39 68 API calls 94900->94902 95084 3750f5 94901->95084 94904 372ea5 94902->94904 94904->94786 94904->94787 94907 3b3d05 94909 37a8db 94908->94909 94911 37a8ea __fread_nolock 94908->94911 94910 38fe0b 22 API calls 94909->94910 94909->94911 94910->94911 94911->94792 94912->94796 94913->94802 94914->94810 94915->94820 94916->94823 94917->94828 94918->94833 94919->94836 94920->94840 94921->94837 94922->94842 94923->94846 94924->94851 94925->94851 94926->94851 94927->94851 94929 3e2d15 94928->94929 94930 37511f 64 API calls 94929->94930 94931 3e2d29 94930->94931 95355 3e2e66 94931->95355 94934 3e2d3f 94934->94789 94935 3750f5 40 API calls 94936 3e2d56 94935->94936 94937 3750f5 40 API calls 94936->94937 94938 3e2d66 94937->94938 94939 3750f5 40 API calls 94938->94939 94940 3e2d81 94939->94940 94941 3750f5 40 API calls 94940->94941 94942 3e2d9c 94941->94942 94943 37511f 64 API calls 94942->94943 94944 3e2db3 94943->94944 94945 39ea0c ___std_exception_copy 21 API calls 94944->94945 94946 3e2dba 94945->94946 94947 39ea0c ___std_exception_copy 21 API calls 94946->94947 94948 3e2dc4 94947->94948 94949 3750f5 40 API calls 94948->94949 94950 3e2dd8 94949->94950 94951 3e28fe 27 API calls 94950->94951 94952 3e2dee 94951->94952 94952->94934 95361 3e22ce 94952->95361 94955 374f43 94954->94955 94956 374f4a 94954->94956 94957 39e678 67 API calls 94955->94957 94958 374f6a FreeLibrary 94956->94958 94959 374f59 94956->94959 94957->94956 94958->94959 94959->94791 94960->94803 94961->94807 94962->94813 94963->94821 94964->94831 94967 38fddb 94965->94967 94968 38fdfa 94967->94968 94971 38fdfc 94967->94971 94985 39ea0c 94967->94985 94992 394ead 7 API calls 2 library calls 94967->94992 94968->94856 94970 39066d 94994 3932a4 RaiseException 94970->94994 94971->94970 94993 3932a4 RaiseException 94971->94993 94973 39068a 94973->94856 94978 38fde0 94975->94978 94976 39ea0c ___std_exception_copy 21 API calls 94976->94978 94977 38fdfa 94977->94858 94978->94976 94978->94977 94980 38fdfc 94978->94980 94997 394ead 7 API calls 2 library calls 94978->94997 94981 39066d 94980->94981 94998 3932a4 RaiseException 94980->94998 94999 3932a4 RaiseException 94981->94999 94983 39068a 94983->94858 94991 3a3820 __dosmaperr 94985->94991 94986 3a385e 94996 39f2d9 20 API calls __dosmaperr 94986->94996 94988 3a3849 RtlAllocateHeap 94989 3a385c 94988->94989 94988->94991 94989->94967 94991->94986 94991->94988 94995 394ead 7 API calls 2 library calls 94991->94995 94992->94967 94993->94970 94994->94973 94995->94991 94996->94989 94997->94978 94998->94981 94999->94983 95021 37aec9 95000->95021 95002 374c78 95002->94862 95004 376b67 _wcslen 95003->95004 95005 3b4ba1 95003->95005 95008 376ba2 95004->95008 95009 376b7d 95004->95009 95028 3793b2 95005->95028 95007 3b4baa 95007->95007 95010 38fddb 22 API calls 95008->95010 95027 376f34 22 API calls 95009->95027 95012 376bae 95010->95012 95014 38fe0b 22 API calls 95012->95014 95013 376b85 __fread_nolock 95013->94862 95014->95013 95016 37516e 95015->95016 95020 37518f __fread_nolock 95015->95020 95019 38fe0b 22 API calls 95016->95019 95017 38fddb 22 API calls 95018 3751a2 95017->95018 95018->94869 95019->95020 95020->95017 95022 37aedc 95021->95022 95023 37aed9 __fread_nolock 95021->95023 95024 38fddb 22 API calls 95022->95024 95023->95002 95025 37aee7 95024->95025 95026 38fe0b 22 API calls 95025->95026 95026->95023 95027->95013 95029 3793c0 95028->95029 95031 3793c9 __fread_nolock 95028->95031 95030 37aec9 22 API calls 95029->95030 95029->95031 95030->95031 95031->95007 95033 373a67 GetModuleFileNameW 95032->95033 95033->94876 95035 3b1f50 __wsopen_s 95034->95035 95036 373aaf GetFullPathNameW 95035->95036 95037 373ace 95036->95037 95038 373ae9 95036->95038 95039 376b57 22 API calls 95037->95039 95048 37a6c3 95038->95048 95041 373ada 95039->95041 95044 3737a0 95041->95044 95045 3737ae 95044->95045 95046 3793b2 22 API calls 95045->95046 95047 3737c2 95046->95047 95047->94879 95049 37a6dd 95048->95049 95053 37a6d0 95048->95053 95050 38fddb 22 API calls 95049->95050 95051 37a6e7 95050->95051 95052 38fe0b 22 API calls 95051->95052 95052->95053 95053->95041 95055 374ec6 95054->95055 95056 374ea8 GetProcAddress 95054->95056 95059 39e5eb 95055->95059 95057 374eb8 95056->95057 95057->95055 95058 374ebf FreeLibrary 95057->95058 95058->95055 95092 39e52a 95059->95092 95061 374eea 95061->94891 95061->94892 95063 374e6e GetProcAddress 95062->95063 95064 374e8d 95062->95064 95065 374e7e 95063->95065 95067 374f80 95064->95067 95065->95064 95066 374e86 FreeLibrary 95065->95066 95066->95064 95068 38fe0b 22 API calls 95067->95068 95069 374f95 95068->95069 95160 375722 95069->95160 95071 374fa1 __fread_nolock 95072 3750a5 95071->95072 95073 3b3d1d 95071->95073 95083 374fdc 95071->95083 95163 3742a2 CreateStreamOnHGlobal 95072->95163 95174 3e304d 74 API calls 95073->95174 95076 3b3d22 95078 37511f 64 API calls 95076->95078 95077 3750f5 40 API calls 95077->95083 95079 3b3d45 95078->95079 95080 3750f5 40 API calls 95079->95080 95081 37506e ISource 95080->95081 95081->94899 95083->95076 95083->95077 95083->95081 95169 37511f 95083->95169 95085 375107 95084->95085 95086 3b3d70 95084->95086 95196 39e8c4 95085->95196 95089 3e28fe 95338 3e274e 95089->95338 95091 3e2919 95091->94907 95093 39e536 ___BuildCatchObject 95092->95093 95094 39e544 95093->95094 95097 39e574 95093->95097 95117 39f2d9 20 API calls __dosmaperr 95094->95117 95096 39e549 95118 3a27ec 26 API calls __cftof 95096->95118 95099 39e579 95097->95099 95100 39e586 95097->95100 95119 39f2d9 20 API calls __dosmaperr 95099->95119 95109 3a8061 95100->95109 95103 39e58f 95104 39e5a2 95103->95104 95105 39e595 95103->95105 95121 39e5d4 LeaveCriticalSection __fread_nolock 95104->95121 95120 39f2d9 20 API calls __dosmaperr 95105->95120 95107 39e554 __wsopen_s 95107->95061 95110 3a806d ___BuildCatchObject 95109->95110 95122 3a2f5e EnterCriticalSection 95110->95122 95112 3a807b 95123 3a80fb 95112->95123 95116 3a80ac __wsopen_s 95116->95103 95117->95096 95118->95107 95119->95107 95120->95107 95121->95107 95122->95112 95124 3a811e 95123->95124 95125 3a8177 95124->95125 95132 3a8088 95124->95132 95139 39918d EnterCriticalSection 95124->95139 95140 3991a1 LeaveCriticalSection 95124->95140 95141 3a4c7d 95125->95141 95130 3a8189 95130->95132 95154 3a3405 11 API calls 2 library calls 95130->95154 95136 3a80b7 95132->95136 95133 3a81a8 95155 39918d EnterCriticalSection 95133->95155 95159 3a2fa6 LeaveCriticalSection 95136->95159 95138 3a80be 95138->95116 95139->95124 95140->95124 95142 3a4c8a __dosmaperr 95141->95142 95143 3a4cca 95142->95143 95144 3a4cb5 RtlAllocateHeap 95142->95144 95156 394ead 7 API calls 2 library calls 95142->95156 95157 39f2d9 20 API calls __dosmaperr 95143->95157 95144->95142 95146 3a4cc8 95144->95146 95148 3a29c8 95146->95148 95149 3a29d3 RtlFreeHeap 95148->95149 95150 3a29fc __dosmaperr 95148->95150 95149->95150 95151 3a29e8 95149->95151 95150->95130 95158 39f2d9 20 API calls __dosmaperr 95151->95158 95153 3a29ee GetLastError 95153->95150 95154->95133 95155->95132 95156->95142 95157->95146 95158->95153 95159->95138 95161 38fddb 22 API calls 95160->95161 95162 375734 95161->95162 95162->95071 95164 3742bc FindResourceExW 95163->95164 95168 3742d9 95163->95168 95165 3b35ba LoadResource 95164->95165 95164->95168 95166 3b35cf SizeofResource 95165->95166 95165->95168 95167 3b35e3 LockResource 95166->95167 95166->95168 95167->95168 95168->95083 95170 37512e 95169->95170 95173 3b3d90 95169->95173 95175 39ece3 95170->95175 95174->95076 95178 39eaaa 95175->95178 95177 37513c 95177->95083 95182 39eab6 ___BuildCatchObject 95178->95182 95179 39eac2 95191 39f2d9 20 API calls __dosmaperr 95179->95191 95181 39eae8 95193 39918d EnterCriticalSection 95181->95193 95182->95179 95182->95181 95183 39eac7 95192 3a27ec 26 API calls __cftof 95183->95192 95186 39eaf4 95194 39ec0a 62 API calls 2 library calls 95186->95194 95188 39eb08 95195 39eb27 LeaveCriticalSection __fread_nolock 95188->95195 95190 39ead2 __wsopen_s 95190->95177 95191->95183 95192->95190 95193->95186 95194->95188 95195->95190 95199 39e8e1 95196->95199 95198 375118 95198->95089 95200 39e8ed ___BuildCatchObject 95199->95200 95201 39e92d 95200->95201 95202 39e925 __wsopen_s 95200->95202 95207 39e900 ___scrt_fastfail 95200->95207 95212 39918d EnterCriticalSection 95201->95212 95202->95198 95204 39e937 95213 39e6f8 95204->95213 95226 39f2d9 20 API calls __dosmaperr 95207->95226 95208 39e91a 95227 3a27ec 26 API calls __cftof 95208->95227 95212->95204 95216 39e70a ___scrt_fastfail 95213->95216 95219 39e727 95213->95219 95214 39e717 95301 39f2d9 20 API calls __dosmaperr 95214->95301 95216->95214 95216->95219 95224 39e76a __fread_nolock 95216->95224 95217 39e71c 95302 3a27ec 26 API calls __cftof 95217->95302 95228 39e96c LeaveCriticalSection __fread_nolock 95219->95228 95220 39e886 ___scrt_fastfail 95304 39f2d9 20 API calls __dosmaperr 95220->95304 95224->95219 95224->95220 95229 39d955 95224->95229 95236 3a8d45 95224->95236 95303 39cf78 26 API calls 4 library calls 95224->95303 95226->95208 95227->95202 95228->95202 95230 39d961 95229->95230 95231 39d976 95229->95231 95305 39f2d9 20 API calls __dosmaperr 95230->95305 95231->95224 95233 39d966 95306 3a27ec 26 API calls __cftof 95233->95306 95235 39d971 95235->95224 95237 3a8d6f 95236->95237 95238 3a8d57 95236->95238 95240 3a90d9 95237->95240 95245 3a8db4 95237->95245 95316 39f2c6 20 API calls __dosmaperr 95238->95316 95332 39f2c6 20 API calls __dosmaperr 95240->95332 95241 3a8d5c 95317 39f2d9 20 API calls __dosmaperr 95241->95317 95244 3a90de 95333 39f2d9 20 API calls __dosmaperr 95244->95333 95246 3a8d64 95245->95246 95248 3a8dbf 95245->95248 95252 3a8def 95245->95252 95246->95224 95318 39f2c6 20 API calls __dosmaperr 95248->95318 95249 3a8dcc 95334 3a27ec 26 API calls __cftof 95249->95334 95251 3a8dc4 95319 39f2d9 20 API calls __dosmaperr 95251->95319 95255 3a8e08 95252->95255 95256 3a8e4a 95252->95256 95257 3a8e2e 95252->95257 95255->95257 95292 3a8e15 95255->95292 95323 3a3820 21 API calls __dosmaperr 95256->95323 95320 39f2c6 20 API calls __dosmaperr 95257->95320 95260 3a8e33 95321 39f2d9 20 API calls __dosmaperr 95260->95321 95261 3a8e61 95264 3a29c8 _free 20 API calls 95261->95264 95267 3a8e6a 95264->95267 95265 3a8e3a 95322 3a27ec 26 API calls __cftof 95265->95322 95266 3a8fb3 95269 3a9029 95266->95269 95272 3a8fcc GetConsoleMode 95266->95272 95270 3a29c8 _free 20 API calls 95267->95270 95271 3a902d ReadFile 95269->95271 95273 3a8e71 95270->95273 95274 3a90a1 GetLastError 95271->95274 95275 3a9047 95271->95275 95272->95269 95276 3a8fdd 95272->95276 95277 3a8e7b 95273->95277 95278 3a8e96 95273->95278 95279 3a90ae 95274->95279 95280 3a9005 95274->95280 95275->95274 95287 3a901e 95275->95287 95276->95271 95281 3a8fe3 ReadConsoleW 95276->95281 95324 39f2d9 20 API calls __dosmaperr 95277->95324 95326 3a9424 28 API calls __wsopen_s 95278->95326 95330 39f2d9 20 API calls __dosmaperr 95279->95330 95282 3a8e45 __fread_nolock 95280->95282 95327 39f2a3 20 API calls __dosmaperr 95280->95327 95281->95287 95288 3a8fff GetLastError 95281->95288 95283 3a29c8 _free 20 API calls 95282->95283 95283->95246 95287->95282 95295 3a906c 95287->95295 95296 3a9083 95287->95296 95288->95280 95290 3a8e80 95325 39f2c6 20 API calls __dosmaperr 95290->95325 95291 3a90b3 95331 39f2c6 20 API calls __dosmaperr 95291->95331 95307 3af89b 95292->95307 95328 3a8a61 31 API calls 3 library calls 95295->95328 95296->95282 95297 3a909a 95296->95297 95329 3a88a1 29 API calls __wsopen_s 95297->95329 95300 3a909f 95300->95282 95301->95217 95302->95219 95303->95224 95304->95217 95305->95233 95306->95235 95308 3af8a8 95307->95308 95309 3af8b5 95307->95309 95335 39f2d9 20 API calls __dosmaperr 95308->95335 95313 3af8c1 95309->95313 95336 39f2d9 20 API calls __dosmaperr 95309->95336 95312 3af8ad 95312->95266 95313->95266 95314 3af8e2 95337 3a27ec 26 API calls __cftof 95314->95337 95316->95241 95317->95246 95318->95251 95319->95249 95320->95260 95321->95265 95322->95282 95323->95261 95324->95290 95325->95282 95326->95292 95327->95282 95328->95282 95329->95300 95330->95291 95331->95282 95332->95244 95333->95249 95334->95246 95335->95312 95336->95314 95337->95312 95341 39e4e8 95338->95341 95340 3e275d 95340->95091 95344 39e469 95341->95344 95343 39e505 95343->95340 95345 39e478 95344->95345 95346 39e48c 95344->95346 95352 39f2d9 20 API calls __dosmaperr 95345->95352 95351 39e488 __alldvrm 95346->95351 95354 3a333f 11 API calls 2 library calls 95346->95354 95348 39e47d 95353 3a27ec 26 API calls __cftof 95348->95353 95351->95343 95352->95348 95353->95351 95354->95351 95360 3e2e7a 95355->95360 95356 3750f5 40 API calls 95356->95360 95357 3e2d3b 95357->94934 95357->94935 95358 3e28fe 27 API calls 95358->95360 95359 37511f 64 API calls 95359->95360 95360->95356 95360->95357 95360->95358 95360->95359 95362 3e22e7 95361->95362 95363 3e22d9 95361->95363 95365 3e232c 95362->95365 95366 39e5eb 29 API calls 95362->95366 95377 3e22f0 95362->95377 95364 39e5eb 29 API calls 95363->95364 95364->95362 95390 3e2557 95365->95390 95368 3e2311 95366->95368 95368->95365 95370 3e231a 95368->95370 95369 3e2370 95371 3e2374 95369->95371 95372 3e2395 95369->95372 95374 39e678 67 API calls 95370->95374 95370->95377 95373 3e2381 95371->95373 95376 39e678 67 API calls 95371->95376 95394 3e2171 95372->95394 95373->95377 95379 39e678 67 API calls 95373->95379 95374->95377 95376->95373 95377->94934 95378 3e239d 95380 3e23c3 95378->95380 95381 3e23a3 95378->95381 95379->95377 95401 3e23f3 95380->95401 95383 39e678 67 API calls 95381->95383 95384 3e23b0 95381->95384 95383->95384 95384->95377 95385 39e678 67 API calls 95384->95385 95385->95377 95386 3e23de 95386->95377 95389 39e678 67 API calls 95386->95389 95387 3e23ca 95387->95386 95409 39e678 95387->95409 95389->95377 95391 3e257c 95390->95391 95393 3e2565 __fread_nolock 95390->95393 95392 39e8c4 __fread_nolock 40 API calls 95391->95392 95392->95393 95393->95369 95395 39ea0c ___std_exception_copy 21 API calls 95394->95395 95396 3e217f 95395->95396 95397 39ea0c ___std_exception_copy 21 API calls 95396->95397 95398 3e2190 95397->95398 95399 39ea0c ___std_exception_copy 21 API calls 95398->95399 95400 3e219c 95399->95400 95400->95378 95405 3e2408 95401->95405 95402 3e24c0 95437 3e2724 95402->95437 95403 3e21cc 40 API calls 95403->95405 95405->95402 95405->95403 95408 3e24c7 95405->95408 95422 3e2269 95405->95422 95433 3e2606 95405->95433 95408->95387 95410 39e684 ___BuildCatchObject 95409->95410 95411 39e6aa 95410->95411 95412 39e695 95410->95412 95419 39e6a5 __wsopen_s 95411->95419 95501 39918d EnterCriticalSection 95411->95501 95518 39f2d9 20 API calls __dosmaperr 95412->95518 95414 39e69a 95519 3a27ec 26 API calls __cftof 95414->95519 95416 39e6c6 95502 39e602 95416->95502 95419->95386 95441 3e21cc 95422->95441 95425 3e22c5 95425->95405 95426 3e21cc 40 API calls 95427 3e2285 95426->95427 95427->95425 95428 3e21cc 40 API calls 95427->95428 95429 3e2296 95428->95429 95429->95425 95430 3e21cc 40 API calls 95429->95430 95434 3e2617 95433->95434 95435 3e261d 95433->95435 95434->95435 95445 3e26d7 95434->95445 95435->95405 95438 3e2742 95437->95438 95439 3e2731 95437->95439 95438->95408 95440 39dbb3 65 API calls 95439->95440 95440->95438 95444 3e21ec 95441->95444 95442 3e225d 95442->95425 95442->95426 95443 3e2693 40 API calls 95443->95444 95444->95442 95444->95443 95446 3e2714 95445->95446 95447 3e2703 95445->95447 95446->95434 95449 39dbb3 95447->95449 95450 39dbdd 95449->95450 95451 39dbc1 95449->95451 95450->95446 95451->95450 95452 39dbcd 95451->95452 95453 39dbe3 95451->95453 95461 39f2d9 20 API calls __dosmaperr 95452->95461 95458 39d9cc 95453->95458 95456 39dbd2 95462 3a27ec 26 API calls __cftof 95456->95462 95463 39d97b 95458->95463 95461->95456 95462->95450 95501->95416 95503 39e60f 95502->95503 95504 39e624 95502->95504 95509 39e61f 95504->95509 95518->95414 95519->95419 95725 3a90fa 95726 3a911f 95725->95726 95727 3a9107 95725->95727 95731 3a917a 95726->95731 95739 3a9117 95726->95739 95777 3afdc4 21 API calls 2 library calls 95726->95777 95775 39f2d9 20 API calls __dosmaperr 95727->95775 95729 3a910c 95776 3a27ec 26 API calls __cftof 95729->95776 95733 39d955 __fread_nolock 26 API calls 95731->95733 95734 3a9192 95733->95734 95745 3a8c32 95734->95745 95736 3a9199 95737 39d955 __fread_nolock 26 API calls 95736->95737 95736->95739 95738 3a91c5 95737->95738 95738->95739 95740 39d955 __fread_nolock 26 API calls 95738->95740 95741 3a91d3 95740->95741 95741->95739 95742 39d955 __fread_nolock 26 API calls 95741->95742 95743 3a91e3 95742->95743 95744 39d955 __fread_nolock 26 API calls 95743->95744 95744->95739 95746 3a8c3e ___BuildCatchObject 95745->95746 95747 3a8c46 95746->95747 95750 3a8c5e 95746->95750 95779 39f2c6 20 API calls __dosmaperr 95747->95779 95749 3a8d24 95786 39f2c6 20 API calls __dosmaperr 95749->95786 95750->95749 95753 3a8c97 95750->95753 95752 3a8c4b 95780 39f2d9 20 API calls __dosmaperr 95752->95780 95756 3a8cbb 95753->95756 95757 3a8ca6 95753->95757 95754 3a8d29 95787 39f2d9 20 API calls __dosmaperr 95754->95787 95778 3a5147 EnterCriticalSection 95756->95778 95781 39f2c6 20 API calls __dosmaperr 95757->95781 95761 3a8cb3 95788 3a27ec 26 API calls __cftof 95761->95788 95762 3a8cab 95782 39f2d9 20 API calls __dosmaperr 95762->95782 95763 3a8cc1 95765 3a8cdd 95763->95765 95766 3a8cf2 95763->95766 95783 39f2d9 20 API calls __dosmaperr 95765->95783 95769 3a8d45 __fread_nolock 38 API calls 95766->95769 95768 3a8c53 __wsopen_s 95768->95736 95771 3a8ced 95769->95771 95785 3a8d1c LeaveCriticalSection __wsopen_s 95771->95785 95772 3a8ce2 95784 39f2c6 20 API calls __dosmaperr 95772->95784 95775->95729 95776->95739 95777->95731 95778->95763 95779->95752 95780->95768 95781->95762 95782->95761 95783->95772 95784->95771 95785->95768 95786->95754 95787->95761 95788->95768 95789 373156 95792 373170 95789->95792 95793 373187 95792->95793 95794 37318c 95793->95794 95795 3731eb 95793->95795 95796 3731e9 95793->95796 95797 373265 PostQuitMessage 95794->95797 95798 373199 95794->95798 95800 3b2dfb 95795->95800 95801 3731f1 95795->95801 95799 3731d0 DefWindowProcW 95796->95799 95805 37316a 95797->95805 95803 3731a4 95798->95803 95804 3b2e7c 95798->95804 95799->95805 95841 3718e2 10 API calls 95800->95841 95806 37321d SetTimer RegisterWindowMessageW 95801->95806 95807 3731f8 95801->95807 95809 3b2e68 95803->95809 95810 3731ae 95803->95810 95856 3dbf30 34 API calls ___scrt_fastfail 95804->95856 95806->95805 95811 373246 CreatePopupMenu 95806->95811 95813 373201 KillTimer 95807->95813 95814 3b2d9c 95807->95814 95808 3b2e1c 95842 38e499 42 API calls 95808->95842 95855 3dc161 27 API calls ___scrt_fastfail 95809->95855 95818 3b2e4d 95810->95818 95819 3731b9 95810->95819 95811->95805 95837 3730f2 Shell_NotifyIconW ___scrt_fastfail 95813->95837 95821 3b2da1 95814->95821 95822 3b2dd7 MoveWindow 95814->95822 95818->95799 95854 3d0ad7 22 API calls 95818->95854 95825 3731c4 95819->95825 95826 373253 95819->95826 95820 3b2e8e 95820->95799 95820->95805 95827 3b2da7 95821->95827 95828 3b2dc6 SetFocus 95821->95828 95822->95805 95823 373214 95838 373c50 DeleteObject DestroyWindow 95823->95838 95824 373263 95824->95805 95825->95799 95843 3730f2 Shell_NotifyIconW ___scrt_fastfail 95825->95843 95839 37326f 44 API calls ___scrt_fastfail 95826->95839 95827->95825 95832 3b2db0 95827->95832 95828->95805 95840 3718e2 10 API calls 95832->95840 95835 3b2e41 95844 373837 95835->95844 95837->95823 95838->95805 95839->95824 95840->95805 95841->95808 95842->95825 95843->95835 95845 373862 ___scrt_fastfail 95844->95845 95857 374212 95845->95857 95848 3738e8 95850 373906 Shell_NotifyIconW 95848->95850 95851 3b3386 Shell_NotifyIconW 95848->95851 95861 373923 95850->95861 95853 37391c 95853->95796 95854->95796 95855->95824 95856->95820 95858 3738b7 95857->95858 95859 3b35a4 95857->95859 95858->95848 95883 3dc874 42 API calls _strftime 95858->95883 95859->95858 95860 3b35ad DestroyIcon 95859->95860 95860->95858 95862 373a13 95861->95862 95863 37393f 95861->95863 95862->95853 95884 376270 95863->95884 95866 3b3393 LoadStringW 95869 3b33ad 95866->95869 95867 37395a 95868 376b57 22 API calls 95867->95868 95870 37396f 95868->95870 95873 37a8c7 22 API calls 95869->95873 95878 373994 ___scrt_fastfail 95869->95878 95871 3b33c9 95870->95871 95872 37397c 95870->95872 95875 376350 22 API calls 95871->95875 95872->95869 95874 373986 95872->95874 95873->95878 95889 376350 95874->95889 95877 3b33d7 95875->95877 95877->95878 95898 3733c6 95877->95898 95880 3739f9 Shell_NotifyIconW 95878->95880 95880->95862 95881 3b33f9 95882 3733c6 22 API calls 95881->95882 95882->95878 95883->95848 95885 38fe0b 22 API calls 95884->95885 95886 376295 95885->95886 95887 38fddb 22 API calls 95886->95887 95888 37394d 95887->95888 95888->95866 95888->95867 95890 376362 95889->95890 95891 3b4a51 95889->95891 95907 376373 95890->95907 95917 374a88 22 API calls __fread_nolock 95891->95917 95894 3b4a5b 95896 3b4a67 95894->95896 95897 37a8c7 22 API calls 95894->95897 95895 37636e 95895->95878 95897->95896 95899 3b30bb 95898->95899 95900 3733dd 95898->95900 95902 38fddb 22 API calls 95899->95902 95923 3733ee 95900->95923 95904 3b30c5 _wcslen 95902->95904 95903 3733e8 95903->95881 95905 38fe0b 22 API calls 95904->95905 95906 3b30fe __fread_nolock 95905->95906 95909 376382 95907->95909 95914 3763b6 __fread_nolock 95907->95914 95908 3b4a82 95911 38fddb 22 API calls 95908->95911 95909->95908 95910 3763a9 95909->95910 95909->95914 95918 37a587 95910->95918 95913 3b4a91 95911->95913 95915 38fe0b 22 API calls 95913->95915 95914->95895 95916 3b4ac5 __fread_nolock 95915->95916 95917->95894 95919 37a59d 95918->95919 95922 37a598 __fread_nolock 95918->95922 95920 38fe0b 22 API calls 95919->95920 95921 3bf80f 95919->95921 95920->95922 95922->95914 95924 3733fe _wcslen 95923->95924 95925 3b311d 95924->95925 95926 373411 95924->95926 95927 38fddb 22 API calls 95925->95927 95928 37a587 22 API calls 95926->95928 95929 3b3127 95927->95929 95930 37341e __fread_nolock 95928->95930 95931 38fe0b 22 API calls 95929->95931 95930->95903 95932 3b3157 __fread_nolock 95931->95932 95933 3903fb 95934 390407 ___BuildCatchObject 95933->95934 95962 38feb1 95934->95962 95936 39040e 95937 390561 95936->95937 95940 390438 95936->95940 95989 39083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 95937->95989 95939 390568 95990 394e52 28 API calls _abort 95939->95990 95949 390477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 95940->95949 95973 3a247d 95940->95973 95942 39056e 95991 394e04 28 API calls _abort 95942->95991 95945 390576 95947 390457 95952 3904d8 95949->95952 95985 394e1a 38 API calls 2 library calls 95949->95985 95981 390959 95952->95981 95953 3904de 95954 3904f3 95953->95954 95986 390992 GetModuleHandleW 95954->95986 95956 3904fa 95956->95939 95957 3904fe 95956->95957 95958 390507 95957->95958 95987 394df5 28 API calls _abort 95957->95987 95988 390040 13 API calls 2 library calls 95958->95988 95961 39050f 95961->95947 95963 38feba 95962->95963 95992 390698 IsProcessorFeaturePresent 95963->95992 95965 38fec6 95993 392c94 10 API calls 3 library calls 95965->95993 95967 38fecb 95968 38fecf 95967->95968 95994 3a2317 95967->95994 95968->95936 95971 38fee6 95971->95936 95974 3a2494 95973->95974 95975 390a8c _ValidateLocalCookies 5 API calls 95974->95975 95976 390451 95975->95976 95976->95947 95977 3a2421 95976->95977 95980 3a2450 95977->95980 95978 390a8c _ValidateLocalCookies 5 API calls 95979 3a2479 95978->95979 95979->95949 95980->95978 96045 392340 95981->96045 95983 39096c GetStartupInfoW 95984 39097f 95983->95984 95984->95953 95985->95952 95986->95956 95987->95958 95988->95961 95989->95939 95990->95942 95991->95945 95992->95965 95993->95967 95998 3ad1f6 95994->95998 95997 392cbd 8 API calls 3 library calls 95997->95968 96001 3ad213 95998->96001 96002 3ad20f 95998->96002 95999 390a8c _ValidateLocalCookies 5 API calls 96000 38fed8 95999->96000 96000->95971 96000->95997 96001->96002 96004 3a4bfb 96001->96004 96002->95999 96005 3a4c07 ___BuildCatchObject 96004->96005 96016 3a2f5e EnterCriticalSection 96005->96016 96007 3a4c0e 96017 3a50af 96007->96017 96009 3a4c1d 96010 3a4c2c 96009->96010 96030 3a4a8f 29 API calls 96009->96030 96032 3a4c48 LeaveCriticalSection _abort 96010->96032 96013 3a4c27 96031 3a4b45 GetStdHandle GetFileType 96013->96031 96014 3a4c3d __wsopen_s 96014->96001 96016->96007 96018 3a50bb ___BuildCatchObject 96017->96018 96019 3a50c8 96018->96019 96020 3a50df 96018->96020 96041 39f2d9 20 API calls __dosmaperr 96019->96041 96033 3a2f5e EnterCriticalSection 96020->96033 96023 3a50cd 96042 3a27ec 26 API calls __cftof 96023->96042 96025 3a50d7 __wsopen_s 96025->96009 96026 3a5117 96043 3a513e LeaveCriticalSection _abort 96026->96043 96029 3a50eb 96029->96026 96034 3a5000 96029->96034 96030->96013 96031->96010 96032->96014 96033->96029 96035 3a4c7d __dosmaperr 20 API calls 96034->96035 96037 3a5012 96035->96037 96036 3a501f 96038 3a29c8 _free 20 API calls 96036->96038 96037->96036 96044 3a3405 11 API calls 2 library calls 96037->96044 96040 3a5071 96038->96040 96040->96029 96041->96023 96042->96025 96043->96025 96044->96037 96046 392357 96045->96046 96046->95983 96046->96046 96047 371033 96052 374c91 96047->96052 96051 371042 96053 37a961 22 API calls 96052->96053 96054 374cff 96053->96054 96060 373af0 96054->96060 96057 374d9c 96058 371038 96057->96058 96063 3751f7 22 API calls __fread_nolock 96057->96063 96059 3900a3 29 API calls __onexit 96058->96059 96059->96051 96064 373b1c 96060->96064 96063->96057 96065 373b29 96064->96065 96067 373b0f 96064->96067 96066 373b30 RegOpenKeyExW 96065->96066 96065->96067 96066->96067 96068 373b4a RegQueryValueExW 96066->96068 96067->96057 96069 373b80 RegCloseKey 96068->96069 96070 373b6b 96068->96070 96069->96067 96070->96069 96071 380b9d 96081 380ba6 __fread_nolock 96071->96081 96073 3c5cb8 96106 374a88 22 API calls __fread_nolock 96073->96106 96075 3c5cc4 96079 37a8c7 22 API calls 96075->96079 96080 380847 __fread_nolock 96075->96080 96076 380bf7 96077 37a587 22 API calls 96076->96077 96077->96080 96078 38fddb 22 API calls 96078->96081 96079->96080 96081->96073 96081->96076 96081->96078 96081->96080 96082 38fe0b 22 API calls 96081->96082 96083 377510 96081->96083 96082->96081 96084 377525 96083->96084 96100 377522 96083->96100 96085 37752d 96084->96085 96086 37755b 96084->96086 96107 3951c6 26 API calls 96085->96107 96090 3b500f 96086->96090 96091 37756d 96086->96091 96096 3b50f6 96086->96096 96088 37753d 96095 38fddb 22 API calls 96088->96095 96099 38fe0b 22 API calls 96090->96099 96101 3b5088 96090->96101 96108 38fb21 51 API calls 96091->96108 96092 3b510e 96092->96092 96097 377547 96095->96097 96110 395183 26 API calls 96096->96110 96098 379cb3 22 API calls 96097->96098 96098->96100 96102 3b5058 96099->96102 96100->96081 96109 38fb21 51 API calls 96101->96109 96103 38fddb 22 API calls 96102->96103 96104 3b507f 96103->96104 96105 379cb3 22 API calls 96104->96105 96105->96101 96106->96075 96107->96088 96108->96088 96109->96096 96110->96092 96111 37f7bf 96112 37fcb6 96111->96112 96113 37f7d3 96111->96113 96221 37aceb 23 API calls ISource 96112->96221 96115 37fcc2 96113->96115 96116 38fddb 22 API calls 96113->96116 96222 37aceb 23 API calls ISource 96115->96222 96118 37f7e5 96116->96118 96118->96115 96119 37fd3d 96118->96119 96120 37f83e 96118->96120 96223 3e1155 22 API calls 96119->96223 96144 37ed9d ISource 96120->96144 96160 381310 96120->96160 96123 37fef7 96130 37a8c7 22 API calls 96123->96130 96123->96144 96126 38fddb 22 API calls 96143 37ec76 ISource 96126->96143 96127 3c4b0b 96225 3e359c 82 API calls __wsopen_s 96127->96225 96128 3c4600 96134 37a8c7 22 API calls 96128->96134 96128->96144 96130->96144 96133 37a8c7 22 API calls 96133->96143 96134->96144 96135 390242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96135->96143 96136 37fbe3 96138 3c4bdc 96136->96138 96136->96144 96145 37f3ae ISource 96136->96145 96137 37a961 22 API calls 96137->96143 96226 3e359c 82 API calls __wsopen_s 96138->96226 96139 3900a3 29 API calls pre_c_initialization 96139->96143 96141 3901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96141->96143 96142 3c4beb 96227 3e359c 82 API calls __wsopen_s 96142->96227 96143->96123 96143->96126 96143->96127 96143->96128 96143->96133 96143->96135 96143->96136 96143->96137 96143->96139 96143->96141 96143->96142 96143->96144 96143->96145 96146 3806a0 96143->96146 96220 3801e0 256 API calls 2 library calls 96143->96220 96145->96144 96224 3e359c 82 API calls __wsopen_s 96145->96224 96147 380863 ISource 96146->96147 96149 3806bd 96146->96149 96148 380d36 96147->96148 96150 380847 ISource 96147->96150 96153 3c5ffd 96147->96153 96157 38082a ISource 96147->96157 96148->96150 96231 38acd5 39 API calls 96148->96231 96149->96147 96149->96148 96149->96150 96155 38081e 96149->96155 96149->96157 96150->96143 96156 3c600f 96153->96156 96230 39cf65 39 API calls 96153->96230 96155->96157 96159 3c5e15 96155->96159 96156->96143 96157->96150 96157->96153 96229 38ce17 22 API calls ISource 96157->96229 96228 39cf65 39 API calls 96159->96228 96161 3817b0 96160->96161 96162 381376 96160->96162 96515 390242 5 API calls __Init_thread_wait 96161->96515 96163 381390 96162->96163 96164 3c6331 96162->96164 96232 381940 96163->96232 96520 3f709c 256 API calls 96164->96520 96166 3817ba 96171 379cb3 22 API calls 96166->96171 96174 3817fb 96166->96174 96169 3c633d 96169->96143 96178 3817d4 96171->96178 96172 381940 9 API calls 96173 3813b6 96172->96173 96173->96174 96176 3813ec 96173->96176 96175 3c6346 96174->96175 96177 38182c 96174->96177 96521 3e359c 82 API calls __wsopen_s 96175->96521 96176->96175 96200 381408 __fread_nolock 96176->96200 96517 37aceb 23 API calls ISource 96177->96517 96516 3901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96178->96516 96181 381839 96518 38d217 256 API calls 96181->96518 96184 3c636e 96522 3e359c 82 API calls __wsopen_s 96184->96522 96185 38152f 96187 38153c 96185->96187 96188 3c63d1 96185->96188 96190 381940 9 API calls 96187->96190 96524 3f5745 54 API calls _wcslen 96188->96524 96192 381549 96190->96192 96191 38fddb 22 API calls 96191->96200 96195 3c64fa 96192->96195 96197 381940 9 API calls 96192->96197 96193 381872 96519 38faeb 23 API calls 96193->96519 96194 38fe0b 22 API calls 96194->96200 96204 3c6369 96195->96204 96525 3e359c 82 API calls __wsopen_s 96195->96525 96202 381563 96197->96202 96200->96181 96200->96184 96200->96185 96200->96191 96200->96194 96201 3c63b2 96200->96201 96200->96204 96242 37ec40 96200->96242 96523 3e359c 82 API calls __wsopen_s 96201->96523 96202->96195 96205 37a8c7 22 API calls 96202->96205 96207 3815c7 ISource 96202->96207 96204->96143 96205->96207 96206 381940 9 API calls 96206->96207 96207->96193 96207->96195 96207->96204 96207->96206 96209 38167b ISource 96207->96209 96218 374f39 68 API calls 96207->96218 96266 3f959f 96207->96266 96269 3e744a 96207->96269 96326 3e6ef1 96207->96326 96406 3ef0ec 96207->96406 96415 3fe204 96207->96415 96451 3f958b 96207->96451 96454 38effa 96207->96454 96511 3dd4ce 96207->96511 96208 38171d 96208->96143 96209->96208 96514 38ce17 22 API calls ISource 96209->96514 96218->96207 96220->96143 96221->96115 96222->96119 96223->96144 96224->96144 96225->96144 96226->96142 96227->96144 96228->96159 96229->96157 96230->96156 96231->96150 96233 381981 96232->96233 96237 38195d 96232->96237 96526 390242 5 API calls __Init_thread_wait 96233->96526 96235 38198b 96235->96237 96527 3901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96235->96527 96241 3813a0 96237->96241 96528 390242 5 API calls __Init_thread_wait 96237->96528 96238 388727 96238->96241 96529 3901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96238->96529 96241->96172 96246 37ec76 ISource 96242->96246 96243 38fddb 22 API calls 96243->96246 96244 390242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96244->96246 96245 3900a3 29 API calls pre_c_initialization 96245->96246 96246->96243 96246->96244 96246->96245 96247 3c4beb 96246->96247 96248 37fef7 96246->96248 96249 3806a0 41 API calls 96246->96249 96251 3c4b0b 96246->96251 96252 37a8c7 22 API calls 96246->96252 96253 3c4600 96246->96253 96259 37fbe3 96246->96259 96260 37a961 22 API calls 96246->96260 96263 3901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96246->96263 96264 37ed9d ISource 96246->96264 96265 37f3ae ISource 96246->96265 96530 3801e0 256 API calls 2 library calls 96246->96530 96534 3e359c 82 API calls __wsopen_s 96247->96534 96255 37a8c7 22 API calls 96248->96255 96248->96264 96249->96246 96532 3e359c 82 API calls __wsopen_s 96251->96532 96252->96246 96258 37a8c7 22 API calls 96253->96258 96253->96264 96255->96264 96258->96264 96261 3c4bdc 96259->96261 96259->96264 96259->96265 96260->96246 96533 3e359c 82 API calls __wsopen_s 96261->96533 96263->96246 96264->96200 96265->96264 96531 3e359c 82 API calls __wsopen_s 96265->96531 96535 3f7f59 96266->96535 96268 3f95af 96268->96207 96270 3e7474 96269->96270 96271 3e7469 96269->96271 96274 37a961 22 API calls 96270->96274 96310 3e7554 96270->96310 96668 37b567 96271->96668 96273 38fddb 22 API calls 96275 3e7587 96273->96275 96276 3e7495 96274->96276 96277 38fe0b 22 API calls 96275->96277 96278 37a961 22 API calls 96276->96278 96279 3e7598 96277->96279 96280 3e749e 96278->96280 96641 376246 96279->96641 96282 377510 53 API calls 96280->96282 96284 3e74aa 96282->96284 96673 37525f 96284->96673 96285 37a961 22 API calls 96286 3e75ab 96285->96286 96288 376246 CloseHandle 96286->96288 96290 3e75b2 96288->96290 96289 3e74bf 96291 376350 22 API calls 96289->96291 96292 377510 53 API calls 96290->96292 96293 3e74f2 96291->96293 96294 3e75be 96292->96294 96295 3e754a 96293->96295 96296 3dd4ce 4 API calls 96293->96296 96297 376246 CloseHandle 96294->96297 96299 37b567 39 API calls 96295->96299 96298 3e7502 96296->96298 96301 3e75c8 96297->96301 96298->96295 96300 3e7506 96298->96300 96299->96310 96302 379cb3 22 API calls 96300->96302 96645 375745 96301->96645 96304 3e7513 96302->96304 96715 3dd2c1 26 API calls 96304->96715 96307 3e76de GetLastError 96309 3e76f7 96307->96309 96308 3e75ea 96653 3753de 96308->96653 96719 376216 CloseHandle ISource 96309->96719 96310->96273 96324 3e76a4 96310->96324 96313 3e751c 96313->96295 96314 3e75f8 96716 3753c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 96314->96716 96316 3e7645 96317 38fddb 22 API calls 96316->96317 96320 3e7679 96317->96320 96318 3e7619 96717 3dccff SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 96318->96717 96319 3e75ff 96319->96316 96319->96318 96321 37a961 22 API calls 96320->96321 96323 3e7686 96321->96323 96323->96324 96718 3d417d 22 API calls __fread_nolock 96323->96718 96324->96207 96327 37a961 22 API calls 96326->96327 96328 3e6f1d 96327->96328 96329 37a961 22 API calls 96328->96329 96330 3e6f26 96329->96330 96331 3e6f3a 96330->96331 96332 37b567 39 API calls 96330->96332 96333 377510 53 API calls 96331->96333 96332->96331 96334 3e6f57 _wcslen 96333->96334 96335 3e70bf 96334->96335 96336 3e6fbc 96334->96336 96348 3e70e9 96334->96348 96337 374ecb 94 API calls 96335->96337 96338 377510 53 API calls 96336->96338 96339 3e70d0 96337->96339 96340 3e6fc8 96338->96340 96341 3e70e5 96339->96341 96342 374ecb 94 API calls 96339->96342 96344 37a8c7 22 API calls 96340->96344 96346 3e6fdb 96340->96346 96343 37a961 22 API calls 96341->96343 96341->96348 96342->96341 96345 3e711a 96343->96345 96344->96346 96349 37a961 22 API calls 96345->96349 96347 3e7027 96346->96347 96350 3e7005 96346->96350 96353 37a8c7 22 API calls 96346->96353 96351 377510 53 API calls 96347->96351 96348->96207 96352 3e7126 96349->96352 96354 3733c6 22 API calls 96350->96354 96355 3e7034 96351->96355 96356 37a961 22 API calls 96352->96356 96353->96350 96358 3e700f 96354->96358 96359 3e703d 96355->96359 96360 3e7047 96355->96360 96357 3e712f 96356->96357 96362 37a961 22 API calls 96357->96362 96363 377510 53 API calls 96358->96363 96364 37a8c7 22 API calls 96359->96364 96849 3de199 GetFileAttributesW 96360->96849 96366 3e7138 96362->96366 96367 3e701b 96363->96367 96364->96360 96365 3e7050 96368 3e7063 96365->96368 96371 374c6d 22 API calls 96365->96371 96369 377510 53 API calls 96366->96369 96370 376350 22 API calls 96367->96370 96373 377510 53 API calls 96368->96373 96379 3e7069 96368->96379 96372 3e7145 96369->96372 96370->96347 96371->96368 96374 37525f 22 API calls 96372->96374 96375 3e70a0 96373->96375 96376 3e7166 96374->96376 96850 3dd076 57 API calls 96375->96850 96378 374c6d 22 API calls 96376->96378 96380 3e7175 96378->96380 96379->96348 96381 3e71a9 96380->96381 96383 374c6d 22 API calls 96380->96383 96382 37a8c7 22 API calls 96381->96382 96384 3e71ba 96382->96384 96385 3e7186 96383->96385 96386 376350 22 API calls 96384->96386 96385->96381 96388 376b57 22 API calls 96385->96388 96387 3e71c8 96386->96387 96389 376350 22 API calls 96387->96389 96390 3e719b 96388->96390 96391 3e71d6 96389->96391 96392 376b57 22 API calls 96390->96392 96393 376350 22 API calls 96391->96393 96392->96381 96394 3e71e4 96393->96394 96395 377510 53 API calls 96394->96395 96396 3e71f0 96395->96396 96740 3dd7bc 96396->96740 96398 3e7201 96399 3dd4ce 4 API calls 96398->96399 96400 3e720b 96399->96400 96401 377510 53 API calls 96400->96401 96405 3e7239 96400->96405 96402 3e7229 96401->96402 96794 3e2947 96402->96794 96404 374f39 68 API calls 96404->96348 96405->96404 96407 377510 53 API calls 96406->96407 96408 3ef126 96407->96408 96859 379e90 96408->96859 96410 3ef136 96411 3ef15b 96410->96411 96412 37ec40 256 API calls 96410->96412 96414 3ef15f 96411->96414 96887 379c6e 96411->96887 96412->96411 96414->96207 96416 37a961 22 API calls 96415->96416 96417 3fe21b 96416->96417 96418 377510 53 API calls 96417->96418 96419 3fe22a 96418->96419 96420 376270 22 API calls 96419->96420 96421 3fe23d 96420->96421 96422 377510 53 API calls 96421->96422 96423 3fe24a 96422->96423 96424 3fe2c7 96423->96424 96425 3fe262 96423->96425 96426 377510 53 API calls 96424->96426 96427 37b567 39 API calls 96425->96427 96428 3fe2cc 96426->96428 96429 3fe267 96427->96429 96430 3fe2d9 96428->96430 96431 3fe314 96428->96431 96429->96430 96433 3fe280 96429->96433 96432 379c6e 22 API calls 96430->96432 96434 3fe32c 96431->96434 96436 37b567 39 API calls 96431->96436 96448 3fe2e6 96432->96448 96435 376d25 22 API calls 96433->96435 96437 3fe345 96434->96437 96438 37b567 39 API calls 96434->96438 96440 3fe28d 96435->96440 96436->96434 96439 37a8c7 22 API calls 96437->96439 96438->96437 96441 3fe35f 96439->96441 96442 376350 22 API calls 96440->96442 96910 3d92c8 43 API calls 96441->96910 96444 3fe29b 96442->96444 96445 376d25 22 API calls 96444->96445 96446 3fe2b4 96445->96446 96447 376350 22 API calls 96446->96447 96450 3fe2c2 96447->96450 96448->96207 96911 3762b5 22 API calls 96450->96911 96452 3f7f59 120 API calls 96451->96452 96453 3f959b 96452->96453 96453->96207 96455 379c6e 22 API calls 96454->96455 96456 38f012 96455->96456 96457 38fddb 22 API calls 96456->96457 96461 3cf0a8 96456->96461 96459 38f02b 96457->96459 96460 38fe0b 22 API calls 96459->96460 96463 38f03c 96460->96463 96462 38f0a4 96461->96462 96931 3e9caa 39 API calls 96461->96931 96466 37b567 39 API calls 96462->96466 96470 38f0b1 96462->96470 96464 376246 CloseHandle 96463->96464 96465 38f047 96464->96465 96467 37a961 22 API calls 96465->96467 96468 3cf10a 96466->96468 96469 38f04f 96467->96469 96468->96470 96471 3cf112 96468->96471 96473 376246 CloseHandle 96469->96473 96474 38fa5b 3 API calls 96470->96474 96472 37b567 39 API calls 96471->96472 96478 38f0b8 96472->96478 96475 38f056 96473->96475 96474->96478 96476 377510 53 API calls 96475->96476 96477 38f062 96476->96477 96479 376246 CloseHandle 96477->96479 96481 3cf127 96478->96481 96482 38f0d3 96478->96482 96480 38f06c 96479->96480 96483 375745 5 API calls 96480->96483 96485 38fe0b 22 API calls 96481->96485 96484 376270 22 API calls 96482->96484 96486 38f07d 96483->96486 96487 38f0db 96484->96487 96488 3cf12c 96485->96488 96489 3cf0a0 96486->96489 96490 38f085 96486->96490 96912 38f141 96487->96912 96492 3cf140 96488->96492 96932 38f866 ReadFile SetFilePointerEx 96488->96932 96930 376216 CloseHandle ISource 96489->96930 96497 3753de 27 API calls 96490->96497 96500 3cf144 __fread_nolock 96492->96500 96933 3e0e85 22 API calls ___scrt_fastfail 96492->96933 96494 38f0ea 96494->96500 96927 3762b5 22 API calls 96494->96927 96499 38f093 96497->96499 96926 3753c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 96499->96926 96502 38f0fe 96505 38f138 96502->96505 96506 376246 CloseHandle 96502->96506 96503 3cf069 96929 3dccff SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 96503->96929 96504 38f09a 96504->96462 96504->96503 96505->96207 96508 38f12c 96506->96508 96508->96505 96928 376216 CloseHandle ISource 96508->96928 96509 3cf080 96509->96462 96964 3ddbbe lstrlenW 96511->96964 96514->96209 96515->96166 96516->96174 96517->96181 96518->96193 96519->96193 96520->96169 96521->96204 96522->96204 96523->96204 96524->96202 96525->96204 96526->96235 96527->96237 96528->96238 96529->96241 96530->96246 96531->96264 96532->96264 96533->96247 96534->96264 96536 377510 53 API calls 96535->96536 96537 3f7f90 96536->96537 96541 3f7fd5 ISource 96537->96541 96573 3f8cd3 96537->96573 96539 3f844f 96614 3f8ee4 60 API calls 96539->96614 96541->96268 96543 3f845e 96545 3f846a 96543->96545 96546 3f828f 96543->96546 96544 3f8049 96544->96541 96547 377510 53 API calls 96544->96547 96560 3f8281 96544->96560 96605 3d417d 22 API calls __fread_nolock 96544->96605 96606 3f851d 42 API calls _strftime 96544->96606 96545->96541 96586 3f7e86 96546->96586 96547->96544 96552 3f82c8 96601 38fc70 96552->96601 96555 3f82e8 96607 3e359c 82 API calls __wsopen_s 96555->96607 96556 3f8302 96608 3763eb 22 API calls 96556->96608 96559 3f82f3 GetCurrentProcess TerminateProcess 96559->96556 96560->96539 96560->96546 96561 3f8311 96609 376a50 22 API calls 96561->96609 96563 3f832a 96571 3f8352 96563->96571 96610 3804f0 22 API calls 96563->96610 96565 3f84c5 96565->96541 96569 3f84d9 FreeLibrary 96565->96569 96566 3f8341 96611 3f8b7b 75 API calls 96566->96611 96569->96541 96571->96565 96612 3804f0 22 API calls 96571->96612 96613 37aceb 23 API calls ISource 96571->96613 96615 3f8b7b 75 API calls 96571->96615 96574 37aec9 22 API calls 96573->96574 96575 3f8cee CharLowerBuffW 96574->96575 96616 3d8e54 96575->96616 96579 37a961 22 API calls 96580 3f8d2a 96579->96580 96623 376d25 96580->96623 96582 3f8d3e 96583 3793b2 22 API calls 96582->96583 96585 3f8d48 _wcslen 96583->96585 96584 3f8e5e _wcslen 96584->96544 96585->96584 96636 3f851d 42 API calls _strftime 96585->96636 96587 3f7ea1 96586->96587 96591 3f7eec 96586->96591 96588 38fe0b 22 API calls 96587->96588 96589 3f7ec3 96588->96589 96590 38fddb 22 API calls 96589->96590 96589->96591 96590->96589 96592 3f9096 96591->96592 96593 3f92ab ISource 96592->96593 96600 3f90ba _strcat _wcslen 96592->96600 96593->96552 96594 37b38f 39 API calls 96594->96600 96595 37b567 39 API calls 96595->96600 96596 37b6b5 39 API calls 96596->96600 96597 377510 53 API calls 96597->96600 96598 39ea0c 21 API calls ___std_exception_copy 96598->96600 96600->96593 96600->96594 96600->96595 96600->96596 96600->96597 96600->96598 96640 3defae 24 API calls _wcslen 96600->96640 96603 38fc85 96601->96603 96602 38fd1d VirtualAlloc 96604 38fceb 96602->96604 96603->96602 96603->96604 96604->96555 96604->96556 96605->96544 96606->96544 96607->96559 96608->96561 96609->96563 96610->96566 96611->96571 96612->96571 96613->96571 96614->96543 96615->96571 96617 3d8e74 _wcslen 96616->96617 96618 3d8f63 96617->96618 96620 3d8ea9 96617->96620 96621 3d8f68 96617->96621 96618->96579 96618->96585 96620->96618 96637 38ce60 41 API calls 96620->96637 96621->96618 96638 38ce60 41 API calls 96621->96638 96624 376d34 96623->96624 96625 376d91 96623->96625 96624->96625 96627 376d3f 96624->96627 96626 3793b2 22 API calls 96625->96626 96628 376d62 __fread_nolock 96626->96628 96629 3b4c9d 96627->96629 96630 376d5a 96627->96630 96628->96582 96631 38fddb 22 API calls 96629->96631 96639 376f34 22 API calls 96630->96639 96633 3b4ca7 96631->96633 96634 38fe0b 22 API calls 96633->96634 96635 3b4cda 96634->96635 96636->96584 96637->96620 96638->96621 96639->96628 96640->96600 96642 376250 96641->96642 96643 37625f 96641->96643 96642->96285 96643->96642 96644 376264 CloseHandle 96643->96644 96644->96642 96646 37575c CreateFileW 96645->96646 96647 3b4035 96645->96647 96648 37577b 96646->96648 96647->96648 96649 3b403b CreateFileW 96647->96649 96648->96307 96648->96308 96649->96648 96650 3b4063 96649->96650 96720 3754c6 96650->96720 96654 3753f3 96653->96654 96667 3753f0 ISource 96653->96667 96655 3754c6 3 API calls 96654->96655 96654->96667 96656 375410 96655->96656 96657 3b3f4b 96656->96657 96658 37541d 96656->96658 96732 38fa5b 96657->96732 96660 38fe0b 22 API calls 96658->96660 96661 375429 96660->96661 96662 375722 22 API calls 96661->96662 96663 375433 96662->96663 96726 379a40 96663->96726 96666 3754c6 3 API calls 96666->96667 96667->96314 96669 37b578 96668->96669 96670 37b57f 96668->96670 96669->96670 96738 3962d1 39 API calls 96669->96738 96670->96270 96672 37b5c2 96672->96270 96674 37a961 22 API calls 96673->96674 96675 375275 96674->96675 96676 37a961 22 API calls 96675->96676 96677 37527d 96676->96677 96678 37a961 22 API calls 96677->96678 96679 375285 96678->96679 96680 37a961 22 API calls 96679->96680 96681 37528d 96680->96681 96682 3752c1 96681->96682 96683 3b3df5 96681->96683 96685 376d25 22 API calls 96682->96685 96684 37a8c7 22 API calls 96683->96684 96686 3b3dfe 96684->96686 96687 3752cf 96685->96687 96688 37a6c3 22 API calls 96686->96688 96689 3793b2 22 API calls 96687->96689 96692 375304 96688->96692 96690 3752d9 96689->96690 96690->96692 96693 376d25 22 API calls 96690->96693 96691 375349 96696 376d25 22 API calls 96691->96696 96692->96691 96695 375325 96692->96695 96701 3b3e20 96692->96701 96694 3752fa 96693->96694 96697 3793b2 22 API calls 96694->96697 96695->96691 96700 374c6d 22 API calls 96695->96700 96698 37535a 96696->96698 96697->96692 96699 375370 96698->96699 96705 37a8c7 22 API calls 96698->96705 96702 375384 96699->96702 96707 37a8c7 22 API calls 96699->96707 96703 375332 96700->96703 96704 376b57 22 API calls 96701->96704 96706 37538f 96702->96706 96709 37a8c7 22 API calls 96702->96709 96703->96691 96708 376d25 22 API calls 96703->96708 96710 3b3ee0 96704->96710 96705->96699 96711 37a8c7 22 API calls 96706->96711 96712 37539a 96706->96712 96707->96702 96708->96691 96709->96706 96710->96691 96713 374c6d 22 API calls 96710->96713 96739 3749bd 22 API calls __fread_nolock 96710->96739 96711->96712 96712->96289 96713->96710 96715->96313 96716->96319 96717->96316 96718->96324 96719->96324 96725 3754dd 96720->96725 96721 375564 SetFilePointerEx SetFilePointerEx 96724 375530 96721->96724 96722 3b3f9c SetFilePointerEx 96723 3b3f8b 96723->96722 96724->96648 96725->96721 96725->96722 96725->96723 96725->96724 96727 379abb 96726->96727 96731 379a4e 96726->96731 96737 38e40f SetFilePointerEx 96727->96737 96729 37543f 96729->96666 96730 379a8c ReadFile 96730->96729 96730->96731 96731->96729 96731->96730 96733 3754c6 3 API calls 96732->96733 96734 38fa79 96733->96734 96735 3754c6 3 API calls 96734->96735 96736 38fa9a 96735->96736 96736->96667 96737->96731 96738->96672 96739->96710 96741 3dd7d8 96740->96741 96742 3dd7dd 96741->96742 96743 3dd7f3 96741->96743 96744 3dd7ee 96742->96744 96747 37a8c7 22 API calls 96742->96747 96745 37a961 22 API calls 96743->96745 96744->96398 96746 3dd7fb 96745->96746 96748 37a961 22 API calls 96746->96748 96747->96744 96749 3dd803 96748->96749 96750 37a961 22 API calls 96749->96750 96751 3dd80e 96750->96751 96752 37a961 22 API calls 96751->96752 96753 3dd816 96752->96753 96754 37a961 22 API calls 96753->96754 96755 3dd81e 96754->96755 96756 37a961 22 API calls 96755->96756 96757 3dd826 96756->96757 96758 37a961 22 API calls 96757->96758 96759 3dd82e 96758->96759 96760 37a961 22 API calls 96759->96760 96761 3dd836 96760->96761 96762 37525f 22 API calls 96761->96762 96763 3dd84d 96762->96763 96764 37525f 22 API calls 96763->96764 96765 3dd866 96764->96765 96766 374c6d 22 API calls 96765->96766 96767 3dd872 96766->96767 96768 3dd885 96767->96768 96769 3793b2 22 API calls 96767->96769 96770 374c6d 22 API calls 96768->96770 96769->96768 96771 3dd88e 96770->96771 96772 3dd89e 96771->96772 96773 3793b2 22 API calls 96771->96773 96774 3dd8b0 96772->96774 96776 37a8c7 22 API calls 96772->96776 96773->96772 96775 376350 22 API calls 96774->96775 96777 3dd8bb 96775->96777 96776->96774 96851 3dd978 22 API calls 96777->96851 96779 3dd8ca 96852 3dd978 22 API calls 96779->96852 96781 3dd8dd 96782 374c6d 22 API calls 96781->96782 96783 3dd8e7 96782->96783 96784 3dd8ec 96783->96784 96785 3dd8fe 96783->96785 96786 3733c6 22 API calls 96784->96786 96787 374c6d 22 API calls 96785->96787 96788 3dd8f9 96786->96788 96789 3dd907 96787->96789 96791 376350 22 API calls 96788->96791 96790 3dd925 96789->96790 96793 3733c6 22 API calls 96789->96793 96792 376350 22 API calls 96790->96792 96791->96790 96792->96744 96793->96788 96795 3e2954 __wsopen_s 96794->96795 96796 38fe0b 22 API calls 96795->96796 96797 3e2971 96796->96797 96798 375722 22 API calls 96797->96798 96799 3e297b 96798->96799 96800 3e274e 27 API calls 96799->96800 96801 3e2986 96800->96801 96802 37511f 64 API calls 96801->96802 96803 3e299b 96802->96803 96804 3e29bf 96803->96804 96805 3e2a6c 96803->96805 96806 3e2e66 75 API calls 96804->96806 96807 3e2e66 75 API calls 96805->96807 96808 3e29c4 96806->96808 96809 3e2a38 96807->96809 96843 3e2a75 ISource 96808->96843 96857 39d583 26 API calls 96808->96857 96811 3750f5 40 API calls 96809->96811 96809->96843 96812 3e2a91 96811->96812 96813 3750f5 40 API calls 96812->96813 96815 3e2aa1 96813->96815 96814 3e29ed 96858 39d583 26 API calls 96814->96858 96816 3750f5 40 API calls 96815->96816 96818 3e2abc 96816->96818 96819 3750f5 40 API calls 96818->96819 96820 3e2acc 96819->96820 96821 3750f5 40 API calls 96820->96821 96822 3e2ae7 96821->96822 96823 3750f5 40 API calls 96822->96823 96824 3e2af7 96823->96824 96825 3750f5 40 API calls 96824->96825 96826 3e2b07 96825->96826 96827 3750f5 40 API calls 96826->96827 96828 3e2b17 96827->96828 96853 3e3017 GetTempPathW GetTempFileNameW 96828->96853 96830 3e2b22 96831 39e5eb 29 API calls 96830->96831 96842 3e2b33 96831->96842 96832 3e2bed 96833 39e678 67 API calls 96832->96833 96834 3e2bf8 96833->96834 96836 3e2bfe DeleteFileW 96834->96836 96837 3e2c12 96834->96837 96835 3750f5 40 API calls 96835->96842 96836->96843 96838 3e2c91 CopyFileW 96837->96838 96845 3e2c18 96837->96845 96839 3e2cb9 DeleteFileW 96838->96839 96840 3e2ca7 DeleteFileW 96838->96840 96854 3e2fd8 CreateFileW 96839->96854 96840->96843 96842->96832 96842->96835 96842->96843 96844 39dbb3 65 API calls 96842->96844 96843->96405 96844->96842 96846 3e22ce 79 API calls 96845->96846 96847 3e2c7c 96846->96847 96847->96839 96848 3e2c80 DeleteFileW 96847->96848 96848->96843 96849->96365 96850->96379 96851->96779 96852->96781 96853->96830 96855 3e2fff SetFileTime CloseHandle 96854->96855 96856 3e3013 96854->96856 96855->96856 96856->96843 96857->96814 96858->96809 96860 376270 22 API calls 96859->96860 96886 379eb5 96860->96886 96861 379fd2 96902 37a4a1 22 API calls __fread_nolock 96861->96902 96863 379fec 96863->96410 96866 3bf7c4 96907 3d96e2 84 API calls __wsopen_s 96866->96907 96867 3bf699 96875 38fddb 22 API calls 96867->96875 96868 37a405 96868->96863 96909 3d96e2 84 API calls __wsopen_s 96868->96909 96870 37a4a1 22 API calls 96870->96886 96872 37a6c3 22 API calls 96872->96886 96874 3bf7d2 96908 37a4a1 22 API calls __fread_nolock 96874->96908 96877 3bf754 96875->96877 96879 38fe0b 22 API calls 96877->96879 96878 3bf7e8 96878->96863 96881 37a12c __fread_nolock 96879->96881 96881->96866 96881->96868 96882 37a587 22 API calls 96882->96886 96883 37aec9 22 API calls 96884 37a0db CharUpperBuffW 96883->96884 96903 37a673 22 API calls 96884->96903 96886->96861 96886->96866 96886->96867 96886->96868 96886->96870 96886->96872 96886->96881 96886->96882 96886->96883 96901 374573 41 API calls _wcslen 96886->96901 96904 3748c8 23 API calls 96886->96904 96905 3749bd 22 API calls __fread_nolock 96886->96905 96906 37a673 22 API calls 96886->96906 96888 3bf545 96887->96888 96890 379c7e 96887->96890 96889 3bf556 96888->96889 96891 376b57 22 API calls 96888->96891 96892 37a6c3 22 API calls 96889->96892 96893 38fddb 22 API calls 96890->96893 96891->96889 96894 3bf560 96892->96894 96895 379c91 96893->96895 96894->96894 96896 379cac 96895->96896 96897 379c9a 96895->96897 96899 37a961 22 API calls 96896->96899 96898 379cb3 22 API calls 96897->96898 96900 379ca2 96898->96900 96899->96900 96900->96414 96901->96886 96902->96863 96903->96886 96904->96886 96905->96886 96906->96886 96907->96874 96908->96878 96909->96863 96910->96450 96911->96448 96913 38f188 96912->96913 96914 38f14c 96912->96914 96915 37a6c3 22 API calls 96913->96915 96914->96913 96916 38f15b 96914->96916 96922 3dcaeb 96915->96922 96917 38f170 96916->96917 96919 38f17d 96916->96919 96934 38f18e 96917->96934 96941 3dcbf2 26 API calls 96919->96941 96920 3dcb1a 96920->96494 96922->96920 96942 3dca89 ReadFile SetFilePointerEx 96922->96942 96943 3749bd 22 API calls __fread_nolock 96922->96943 96923 38f179 96923->96494 96926->96504 96927->96502 96928->96505 96929->96509 96930->96461 96931->96461 96932->96492 96933->96500 96944 38f1d8 96934->96944 96940 38f1c1 96940->96923 96941->96923 96942->96922 96943->96922 96945 38fe0b 22 API calls 96944->96945 96946 38f1ef 96945->96946 96947 38fddb 22 API calls 96946->96947 96948 38f1a6 96947->96948 96949 3797b6 96948->96949 96956 379a1e 96949->96956 96951 3797fc 96951->96940 96955 376e14 24 API calls 96951->96955 96952 379a40 2 API calls 96953 3797c7 96952->96953 96953->96951 96953->96952 96963 379b01 22 API calls __fread_nolock 96953->96963 96955->96940 96957 3bf378 96956->96957 96958 379a2f 96956->96958 96959 38fddb 22 API calls 96957->96959 96958->96953 96960 3bf382 96959->96960 96961 38fe0b 22 API calls 96960->96961 96962 3bf397 96961->96962 96963->96953 96965 3ddbdc GetFileAttributesW 96964->96965 96966 3dd4d5 96964->96966 96965->96966 96967 3ddbe8 FindFirstFileW 96965->96967 96966->96207 96967->96966 96968 3ddbf9 FindClose 96967->96968 96968->96966 96969 37105b 96974 37344d 96969->96974 96971 37106a 97005 3900a3 29 API calls __onexit 96971->97005 96973 371074 96975 37345d __wsopen_s 96974->96975 96976 37a961 22 API calls 96975->96976 96977 373513 96976->96977 96978 373a5a 24 API calls 96977->96978 96979 37351c 96978->96979 97006 373357 96979->97006 96982 3733c6 22 API calls 96983 373535 96982->96983 96984 37515f 22 API calls 96983->96984 96985 373544 96984->96985 96986 37a961 22 API calls 96985->96986 96987 37354d 96986->96987 96988 37a6c3 22 API calls 96987->96988 96989 373556 RegOpenKeyExW 96988->96989 96990 3b3176 RegQueryValueExW 96989->96990 96994 373578 96989->96994 96991 3b320c RegCloseKey 96990->96991 96992 3b3193 96990->96992 96991->96994 97002 3b321e _wcslen 96991->97002 96993 38fe0b 22 API calls 96992->96993 96995 3b31ac 96993->96995 96994->96971 96996 375722 22 API calls 96995->96996 96997 3b31b7 RegQueryValueExW 96996->96997 96999 3b31d4 96997->96999 97001 3b31ee ISource 96997->97001 96998 374c6d 22 API calls 96998->97002 97000 376b57 22 API calls 96999->97000 97000->97001 97001->96991 97002->96994 97002->96998 97003 379cb3 22 API calls 97002->97003 97004 37515f 22 API calls 97002->97004 97003->97002 97004->97002 97005->96973 97007 3b1f50 __wsopen_s 97006->97007 97008 373364 GetFullPathNameW 97007->97008 97009 373386 97008->97009 97010 376b57 22 API calls 97009->97010 97011 3733a4 97010->97011 97011->96982 97012 371098 97017 3742de 97012->97017 97016 3710a7 97018 37a961 22 API calls 97017->97018 97019 3742f5 GetVersionExW 97018->97019 97020 376b57 22 API calls 97019->97020 97021 374342 97020->97021 97022 3793b2 22 API calls 97021->97022 97031 374378 97021->97031 97023 37436c 97022->97023 97025 3737a0 22 API calls 97023->97025 97024 37441b GetCurrentProcess IsWow64Process 97026 374437 97024->97026 97025->97031 97027 37444f LoadLibraryA 97026->97027 97028 3b3824 GetSystemInfo 97026->97028 97029 374460 GetProcAddress 97027->97029 97030 37449c GetSystemInfo 97027->97030 97029->97030 97033 374470 GetNativeSystemInfo 97029->97033 97034 374476 97030->97034 97031->97024 97032 3b37df 97031->97032 97033->97034 97035 37109d 97034->97035 97036 37447a FreeLibrary 97034->97036 97037 3900a3 29 API calls __onexit 97035->97037 97036->97035 97037->97016 97038 371044 97043 3710f3 97038->97043 97040 37104a 97079 3900a3 29 API calls __onexit 97040->97079 97042 371054 97080 371398 97043->97080 97047 37116a 97048 37a961 22 API calls 97047->97048 97049 371174 97048->97049 97050 37a961 22 API calls 97049->97050 97051 37117e 97050->97051 97052 37a961 22 API calls 97051->97052 97053 371188 97052->97053 97054 37a961 22 API calls 97053->97054 97055 3711c6 97054->97055 97056 37a961 22 API calls 97055->97056 97057 371292 97056->97057 97090 37171c 97057->97090 97061 3712c4 97062 37a961 22 API calls 97061->97062 97063 3712ce 97062->97063 97064 381940 9 API calls 97063->97064 97065 3712f9 97064->97065 97111 371aab 97065->97111 97067 371315 97068 371325 GetStdHandle 97067->97068 97069 37137a 97068->97069 97070 3b2485 97068->97070 97073 371387 OleInitialize 97069->97073 97070->97069 97071 3b248e 97070->97071 97072 38fddb 22 API calls 97071->97072 97074 3b2495 97072->97074 97073->97040 97118 3e011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 97074->97118 97076 3b249e 97119 3e0944 CreateThread 97076->97119 97078 3b24aa CloseHandle 97078->97069 97079->97042 97120 3713f1 97080->97120 97083 3713f1 22 API calls 97084 3713d0 97083->97084 97085 37a961 22 API calls 97084->97085 97086 3713dc 97085->97086 97087 376b57 22 API calls 97086->97087 97088 371129 97087->97088 97089 371bc3 6 API calls 97088->97089 97089->97047 97091 37a961 22 API calls 97090->97091 97092 37172c 97091->97092 97093 37a961 22 API calls 97092->97093 97094 371734 97093->97094 97095 37a961 22 API calls 97094->97095 97096 37174f 97095->97096 97097 38fddb 22 API calls 97096->97097 97098 37129c 97097->97098 97099 371b4a 97098->97099 97100 371b58 97099->97100 97101 37a961 22 API calls 97100->97101 97102 371b63 97101->97102 97103 37a961 22 API calls 97102->97103 97104 371b6e 97103->97104 97105 37a961 22 API calls 97104->97105 97106 371b79 97105->97106 97107 37a961 22 API calls 97106->97107 97108 371b84 97107->97108 97109 38fddb 22 API calls 97108->97109 97110 371b96 RegisterWindowMessageW 97109->97110 97110->97061 97112 3b272d 97111->97112 97113 371abb 97111->97113 97127 3e3209 23 API calls 97112->97127 97114 38fddb 22 API calls 97113->97114 97116 371ac3 97114->97116 97116->97067 97117 3b2738 97118->97076 97119->97078 97128 3e092a 28 API calls 97119->97128 97121 37a961 22 API calls 97120->97121 97122 3713fc 97121->97122 97123 37a961 22 API calls 97122->97123 97124 371404 97123->97124 97125 37a961 22 API calls 97124->97125 97126 3713c6 97125->97126 97126->97083 97127->97117 97129 372de3 97130 372df0 __wsopen_s 97129->97130 97131 3b2c2b ___scrt_fastfail 97130->97131 97132 372e09 97130->97132 97135 3b2c47 GetOpenFileNameW 97131->97135 97133 373aa2 23 API calls 97132->97133 97134 372e12 97133->97134 97145 372da5 97134->97145 97137 3b2c96 97135->97137 97138 376b57 22 API calls 97137->97138 97140 3b2cab 97138->97140 97140->97140 97142 372e27 97163 3744a8 97142->97163 97146 3b1f50 __wsopen_s 97145->97146 97147 372db2 GetLongPathNameW 97146->97147 97148 376b57 22 API calls 97147->97148 97149 372dda 97148->97149 97150 373598 97149->97150 97151 37a961 22 API calls 97150->97151 97152 3735aa 97151->97152 97153 373aa2 23 API calls 97152->97153 97154 3735b5 97153->97154 97155 3b32eb 97154->97155 97156 3735c0 97154->97156 97161 3b330d 97155->97161 97198 38ce60 41 API calls 97155->97198 97157 37515f 22 API calls 97156->97157 97159 3735cc 97157->97159 97192 3735f3 97159->97192 97162 3735df 97162->97142 97164 374ecb 94 API calls 97163->97164 97165 3744cd 97164->97165 97166 3b3833 97165->97166 97168 374ecb 94 API calls 97165->97168 97167 3e2cf9 80 API calls 97166->97167 97169 3b3848 97167->97169 97170 3744e1 97168->97170 97171 3b3869 97169->97171 97172 3b384c 97169->97172 97170->97166 97173 3744e9 97170->97173 97175 38fe0b 22 API calls 97171->97175 97174 374f39 68 API calls 97172->97174 97176 3744f5 97173->97176 97177 3b3854 97173->97177 97174->97177 97183 3b38ae 97175->97183 97199 37940c 136 API calls 2 library calls 97176->97199 97200 3dda5a 82 API calls 97177->97200 97180 3b3862 97180->97171 97181 372e31 97182 374f39 68 API calls 97185 3b3a5f 97182->97185 97183->97185 97189 379cb3 22 API calls 97183->97189 97201 3d967e 22 API calls __fread_nolock 97183->97201 97202 3d95ad 42 API calls _wcslen 97183->97202 97203 3e0b5a 22 API calls 97183->97203 97204 37a4a1 22 API calls __fread_nolock 97183->97204 97205 373ff7 22 API calls 97183->97205 97185->97182 97206 3d989b 82 API calls __wsopen_s 97185->97206 97189->97183 97193 373605 97192->97193 97197 373624 __fread_nolock 97192->97197 97196 38fe0b 22 API calls 97193->97196 97194 38fddb 22 API calls 97195 37363b 97194->97195 97195->97162 97196->97197 97197->97194 97198->97155 97199->97181 97200->97180 97201->97183 97202->97183 97203->97183 97204->97183 97205->97183 97206->97185 97207 3a8402 97212 3a81be 97207->97212 97210 3a842a 97217 3a81ef try_get_first_available_module 97212->97217 97214 3a83ee 97231 3a27ec 26 API calls __cftof 97214->97231 97216 3a8343 97216->97210 97224 3b0984 97216->97224 97217->97217 97220 3a8338 97217->97220 97227 398e0b 40 API calls 2 library calls 97217->97227 97219 3a838c 97219->97220 97228 398e0b 40 API calls 2 library calls 97219->97228 97220->97216 97230 39f2d9 20 API calls __dosmaperr 97220->97230 97222 3a83ab 97222->97220 97229 398e0b 40 API calls 2 library calls 97222->97229 97232 3b0081 97224->97232 97226 3b099f 97226->97210 97227->97219 97228->97222 97229->97220 97230->97214 97231->97216 97235 3b008d ___BuildCatchObject 97232->97235 97233 3b009b 97289 39f2d9 20 API calls __dosmaperr 97233->97289 97235->97233 97237 3b00d4 97235->97237 97236 3b00a0 97290 3a27ec 26 API calls __cftof 97236->97290 97243 3b065b 97237->97243 97242 3b00aa __wsopen_s 97242->97226 97244 3b0678 97243->97244 97245 3b068d 97244->97245 97246 3b06a6 97244->97246 97306 39f2c6 20 API calls __dosmaperr 97245->97306 97292 3a5221 97246->97292 97249 3b06ab 97251 3b06cb 97249->97251 97252 3b06b4 97249->97252 97250 3b0692 97307 39f2d9 20 API calls __dosmaperr 97250->97307 97305 3b039a CreateFileW 97251->97305 97308 39f2c6 20 API calls __dosmaperr 97252->97308 97256 3b06b9 97309 39f2d9 20 API calls __dosmaperr 97256->97309 97257 3b00f8 97291 3b0121 LeaveCriticalSection __wsopen_s 97257->97291 97259 3b0781 GetFileType 97260 3b078c GetLastError 97259->97260 97261 3b07d3 97259->97261 97312 39f2a3 20 API calls __dosmaperr 97260->97312 97314 3a516a 21 API calls 2 library calls 97261->97314 97262 3b0756 GetLastError 97311 39f2a3 20 API calls __dosmaperr 97262->97311 97265 3b0704 97265->97259 97265->97262 97310 3b039a CreateFileW 97265->97310 97266 3b079a CloseHandle 97266->97250 97268 3b07c3 97266->97268 97313 39f2d9 20 API calls __dosmaperr 97268->97313 97270 3b0749 97270->97259 97270->97262 97271 3b07f4 97273 3b0840 97271->97273 97315 3b05ab 72 API calls 3 library calls 97271->97315 97278 3b086d 97273->97278 97316 3b014d 72 API calls 4 library calls 97273->97316 97274 3b07c8 97274->97250 97277 3b0866 97277->97278 97279 3b087e 97277->97279 97280 3a86ae __wsopen_s 29 API calls 97278->97280 97279->97257 97281 3b08fc CloseHandle 97279->97281 97280->97257 97317 3b039a CreateFileW 97281->97317 97283 3b0927 97284 3b0931 GetLastError 97283->97284 97288 3b095d 97283->97288 97318 39f2a3 20 API calls __dosmaperr 97284->97318 97286 3b093d 97319 3a5333 21 API calls 2 library calls 97286->97319 97288->97257 97289->97236 97290->97242 97291->97242 97293 3a522d ___BuildCatchObject 97292->97293 97320 3a2f5e EnterCriticalSection 97293->97320 97295 3a5234 97296 3a5259 97295->97296 97301 3a52c7 EnterCriticalSection 97295->97301 97303 3a527b 97295->97303 97298 3a5000 __wsopen_s 21 API calls 97296->97298 97300 3a525e 97298->97300 97299 3a52a4 __wsopen_s 97299->97249 97300->97303 97324 3a5147 EnterCriticalSection 97300->97324 97302 3a52d4 LeaveCriticalSection 97301->97302 97301->97303 97302->97295 97321 3a532a 97303->97321 97305->97265 97306->97250 97307->97257 97308->97256 97309->97250 97310->97270 97311->97250 97312->97266 97313->97274 97314->97271 97315->97273 97316->97277 97317->97283 97318->97286 97319->97288 97320->97295 97325 3a2fa6 LeaveCriticalSection 97321->97325 97323 3a5331 97323->97299 97324->97303 97325->97323 97326 371cad SystemParametersInfoW 97327 3c2a00 97333 37d7b0 ISource 97327->97333 97328 37db11 PeekMessageW 97328->97333 97329 37d807 GetInputState 97329->97328 97329->97333 97330 37d9d5 97331 3c1cbe TranslateAcceleratorW 97331->97333 97333->97328 97333->97329 97333->97330 97333->97331 97334 37db8f PeekMessageW 97333->97334 97335 37da04 timeGetTime 97333->97335 97336 37db73 TranslateMessage DispatchMessageW 97333->97336 97337 37dbaf Sleep 97333->97337 97338 3c2b74 Sleep 97333->97338 97340 3c1dda timeGetTime 97333->97340 97355 37ec40 256 API calls 97333->97355 97356 381310 256 API calls 97333->97356 97359 37dfd0 97333->97359 97382 37bf40 97333->97382 97440 37dd50 256 API calls 97333->97440 97441 38edf6 IsDialogMessageW GetClassLongW 97333->97441 97443 3e3a2a 23 API calls 97333->97443 97444 3e359c 82 API calls __wsopen_s 97333->97444 97334->97333 97335->97333 97336->97334 97353 37dbc0 97337->97353 97338->97353 97339 38e551 timeGetTime 97339->97353 97442 38e300 23 API calls 97340->97442 97343 3c2c0b GetExitCodeProcess 97344 3c2c37 CloseHandle 97343->97344 97345 3c2c21 WaitForSingleObject 97343->97345 97344->97353 97345->97333 97345->97344 97346 3c2a31 97346->97330 97347 4029bf GetForegroundWindow 97347->97353 97349 3c2ca9 Sleep 97349->97333 97353->97330 97353->97333 97353->97339 97353->97343 97353->97346 97353->97347 97353->97349 97445 3f5658 23 API calls 97353->97445 97446 3de97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 97353->97446 97447 3dd4dc 47 API calls 97353->97447 97355->97333 97356->97333 97360 37e010 97359->97360 97381 37e0dc ISource 97360->97381 97450 390242 5 API calls __Init_thread_wait 97360->97450 97363 3c2fca 97365 37a961 22 API calls 97363->97365 97363->97381 97364 37a961 22 API calls 97364->97381 97368 3c2fe4 97365->97368 97451 3900a3 29 API calls __onexit 97368->97451 97371 3e359c 82 API calls 97371->97381 97372 3c2fee 97452 3901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97372->97452 97373 37ec40 256 API calls 97373->97381 97376 37a8c7 22 API calls 97376->97381 97377 37e3e1 97377->97333 97378 3804f0 22 API calls 97378->97381 97381->97364 97381->97371 97381->97373 97381->97376 97381->97377 97381->97378 97448 37a81b 41 API calls 97381->97448 97449 38a308 256 API calls 97381->97449 97453 390242 5 API calls __Init_thread_wait 97381->97453 97454 3900a3 29 API calls __onexit 97381->97454 97455 3901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97381->97455 97456 3f47d4 256 API calls 97381->97456 97457 3f68c1 256 API calls 97381->97457 97458 37adf0 97382->97458 97384 37bf9d 97385 3c04b6 97384->97385 97386 37bfa9 97384->97386 97477 3e359c 82 API calls __wsopen_s 97385->97477 97388 3c04c6 97386->97388 97389 37c01e 97386->97389 97478 3e359c 82 API calls __wsopen_s 97388->97478 97463 37ac91 97389->97463 97392 37c7da 97397 38fe0b 22 API calls 97392->97397 97393 3d7120 22 API calls 97426 37c039 ISource __fread_nolock 97393->97426 97402 37c808 __fread_nolock 97397->97402 97399 3c04f5 97403 3c055a 97399->97403 97479 38d217 256 API calls 97399->97479 97408 38fe0b 22 API calls 97402->97408 97439 37c603 97403->97439 97480 3e359c 82 API calls __wsopen_s 97403->97480 97404 38fddb 22 API calls 97404->97426 97405 37ec40 256 API calls 97405->97426 97406 37af8a 22 API calls 97406->97426 97407 3c091a 97490 3e3209 23 API calls 97407->97490 97428 37c350 ISource __fread_nolock 97408->97428 97411 3c08a5 97412 37ec40 256 API calls 97411->97412 97414 3c08cf 97412->97414 97414->97439 97488 37a81b 41 API calls 97414->97488 97415 3c0591 97481 3e359c 82 API calls __wsopen_s 97415->97481 97418 3c08f6 97489 3e359c 82 API calls __wsopen_s 97418->97489 97421 37bbe0 40 API calls 97421->97426 97422 37c3ac 97422->97333 97423 37c237 97425 37c253 97423->97425 97427 37a8c7 22 API calls 97423->97427 97429 3c0976 97425->97429 97433 37c297 ISource 97425->97433 97426->97392 97426->97393 97426->97399 97426->97402 97426->97403 97426->97404 97426->97405 97426->97406 97426->97407 97426->97411 97426->97415 97426->97418 97426->97421 97426->97423 97432 3c09bf 97426->97432 97438 38fe0b 22 API calls 97426->97438 97426->97439 97467 37ad81 97426->97467 97482 3d7099 22 API calls __fread_nolock 97426->97482 97483 3f5745 54 API calls _wcslen 97426->97483 97484 38aa42 22 API calls ISource 97426->97484 97485 3df05c 40 API calls 97426->97485 97486 37a993 41 API calls 97426->97486 97487 37aceb 23 API calls ISource 97426->97487 97427->97425 97428->97422 97476 38ce17 22 API calls ISource 97428->97476 97491 37aceb 23 API calls ISource 97429->97491 97432->97439 97492 3e359c 82 API calls __wsopen_s 97432->97492 97433->97432 97474 37aceb 23 API calls ISource 97433->97474 97435 37c335 97435->97432 97436 37c342 97435->97436 97475 37a704 22 API calls ISource 97436->97475 97438->97426 97439->97333 97440->97333 97441->97333 97442->97333 97443->97333 97444->97333 97445->97353 97446->97353 97447->97353 97448->97381 97449->97381 97450->97363 97451->97372 97452->97381 97453->97381 97454->97381 97455->97381 97456->97381 97457->97381 97459 37ae01 97458->97459 97462 37ae1c ISource 97458->97462 97460 37aec9 22 API calls 97459->97460 97461 37ae09 CharUpperBuffW 97460->97461 97461->97462 97462->97384 97464 37acae 97463->97464 97465 37acd1 97464->97465 97493 3e359c 82 API calls __wsopen_s 97464->97493 97465->97426 97468 3bfadb 97467->97468 97469 37ad92 97467->97469 97470 38fddb 22 API calls 97469->97470 97471 37ad99 97470->97471 97494 37adcd 97471->97494 97474->97435 97475->97428 97476->97428 97477->97388 97478->97439 97479->97403 97480->97439 97481->97439 97482->97426 97483->97426 97484->97426 97485->97426 97486->97426 97487->97426 97488->97418 97489->97439 97490->97423 97491->97432 97492->97439 97493->97465 97497 37addd 97494->97497 97495 37adb6 97495->97426 97496 38fddb 22 API calls 97496->97497 97497->97495 97497->97496 97498 37a961 22 API calls 97497->97498 97499 37a8c7 22 API calls 97497->97499 97500 37adcd 22 API calls 97497->97500 97498->97497 97499->97497 97500->97497 97501 3b2ba5 97502 372b25 97501->97502 97503 3b2baf 97501->97503 97529 372b83 7 API calls 97502->97529 97505 373a5a 24 API calls 97503->97505 97507 3b2bb8 97505->97507 97509 379cb3 22 API calls 97507->97509 97511 3b2bc6 97509->97511 97510 372b2f 97512 372b44 97510->97512 97515 373837 49 API calls 97510->97515 97513 3b2bce 97511->97513 97514 3b2bf5 97511->97514 97521 372b5f 97512->97521 97533 3730f2 Shell_NotifyIconW ___scrt_fastfail 97512->97533 97517 3733c6 22 API calls 97513->97517 97516 3733c6 22 API calls 97514->97516 97515->97512 97518 3b2bf1 GetForegroundWindow ShellExecuteW 97516->97518 97519 3b2bd9 97517->97519 97525 3b2c26 97518->97525 97520 376350 22 API calls 97519->97520 97523 3b2be7 97520->97523 97527 372b66 SetCurrentDirectoryW 97521->97527 97526 3733c6 22 API calls 97523->97526 97525->97521 97526->97518 97528 372b7a 97527->97528 97534 372cd4 7 API calls 97529->97534 97531 372b2a 97532 372c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 97531->97532 97532->97510 97533->97521 97534->97531 97535 10f23b0 97549 10f0000 97535->97549 97537 10f246b 97552 10f22a0 97537->97552 97555 10f3490 GetPEB 97549->97555 97551 10f068b 97551->97537 97553 10f22a9 Sleep 97552->97553 97554 10f22b7 97553->97554 97556 10f34ba 97555->97556 97556->97551

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 234 3742de-37434d call 37a961 GetVersionExW call 376b57 239 374353 234->239 240 3b3617-3b362a 234->240 241 374355-374357 239->241 242 3b362b-3b362f 240->242 243 37435d-3743bc call 3793b2 call 3737a0 241->243 244 3b3656 241->244 245 3b3632-3b363e 242->245 246 3b3631 242->246 263 3b37df-3b37e6 243->263 264 3743c2-3743c4 243->264 249 3b365d-3b3660 244->249 245->242 248 3b3640-3b3642 245->248 246->245 248->241 251 3b3648-3b364f 248->251 253 37441b-374435 GetCurrentProcess IsWow64Process 249->253 254 3b3666-3b36a8 249->254 251->240 252 3b3651 251->252 252->244 256 374437 253->256 257 374494-37449a 253->257 254->253 258 3b36ae-3b36b1 254->258 260 37443d-374449 256->260 257->260 261 3b36db-3b36e5 258->261 262 3b36b3-3b36bd 258->262 265 37444f-37445e LoadLibraryA 260->265 266 3b3824-3b3828 GetSystemInfo 260->266 270 3b36f8-3b3702 261->270 271 3b36e7-3b36f3 261->271 267 3b36ca-3b36d6 262->267 268 3b36bf-3b36c5 262->268 272 3b37e8 263->272 273 3b3806-3b3809 263->273 264->249 269 3743ca-3743dd 264->269 276 374460-37446e GetProcAddress 265->276 277 37449c-3744a6 GetSystemInfo 265->277 267->253 268->253 278 3743e3-3743e5 269->278 279 3b3726-3b372f 269->279 281 3b3715-3b3721 270->281 282 3b3704-3b3710 270->282 271->253 280 3b37ee 272->280 274 3b380b-3b381a 273->274 275 3b37f4-3b37fc 273->275 274->280 285 3b381c-3b3822 274->285 275->273 276->277 286 374470-374474 GetNativeSystemInfo 276->286 287 374476-374478 277->287 288 3b374d-3b3762 278->288 289 3743eb-3743ee 278->289 283 3b373c-3b3748 279->283 284 3b3731-3b3737 279->284 280->275 281->253 282->253 283->253 284->253 285->275 286->287 292 374481-374493 287->292 293 37447a-37447b FreeLibrary 287->293 290 3b376f-3b377b 288->290 291 3b3764-3b376a 288->291 294 3743f4-37440f 289->294 295 3b3791-3b3794 289->295 290->253 291->253 293->292 297 374415 294->297 298 3b3780-3b378c 294->298 295->253 296 3b379a-3b37c1 295->296 299 3b37ce-3b37da 296->299 300 3b37c3-3b37c9 296->300 297->253 298->253 299->253 300->253
              APIs
              • GetVersionExW.KERNEL32(?), ref: 0037430D
                • Part of subcall function 00376B57: _wcslen.LIBCMT ref: 00376B6A
              • GetCurrentProcess.KERNEL32(?,0040CB64,00000000,?,?), ref: 00374422
              • IsWow64Process.KERNEL32(00000000,?,?), ref: 00374429
              • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00374454
              • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00374466
              • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00374474
              • FreeLibrary.KERNEL32(00000000,?,?), ref: 0037447B
              • GetSystemInfo.KERNEL32(?,?,?), ref: 003744A0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
              • String ID: GetNativeSystemInfo$kernel32.dll$|O
              • API String ID: 3290436268-3101561225
              • Opcode ID: bf18efc22efabbd3862e83f244338c70e6be63c467c5b564ef64dcf5250850ff
              • Instruction ID: d2462e098557142f16a00fdd0923176d92fad378781cbcae8722370061629eb5
              • Opcode Fuzzy Hash: bf18efc22efabbd3862e83f244338c70e6be63c467c5b564ef64dcf5250850ff
              • Instruction Fuzzy Hash: BBA1D56A90A2D0CFE723CF6A7C812E43FA46B27344F0484B9D84597E32E3345598DB2D

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1614 3742a2-3742ba CreateStreamOnHGlobal 1615 3742bc-3742d3 FindResourceExW 1614->1615 1616 3742da-3742dd 1614->1616 1617 3b35ba-3b35c9 LoadResource 1615->1617 1618 3742d9 1615->1618 1617->1618 1619 3b35cf-3b35dd SizeofResource 1617->1619 1618->1616 1619->1618 1620 3b35e3-3b35ee LockResource 1619->1620 1620->1618 1621 3b35f4-3b35fc 1620->1621 1622 3b3600-3b3612 1621->1622 1622->1618
              APIs
              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,003750AA,?,?,00000000,00000000), ref: 003742B2
              • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,003750AA,?,?,00000000,00000000), ref: 003742C9
              • LoadResource.KERNEL32(?,00000000,?,?,003750AA,?,?,00000000,00000000,?,?,?,?,?,?,00374F20), ref: 003B35BE
              • SizeofResource.KERNEL32(?,00000000,?,?,003750AA,?,?,00000000,00000000,?,?,?,?,?,?,00374F20), ref: 003B35D3
              • LockResource.KERNEL32(003750AA,?,?,003750AA,?,?,00000000,00000000,?,?,?,?,?,?,00374F20,?), ref: 003B35E6
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
              • String ID: SCRIPT
              • API String ID: 3051347437-3967369404
              • Opcode ID: 38b1d96bfad9e620ec29c178d29888196495612d23af6a7bd479c66d0d9a8dd1
              • Instruction ID: 2da501eef84d88543a59051c9def0392626aa25d03c4fba75249dd83ba4b3338
              • Opcode Fuzzy Hash: 38b1d96bfad9e620ec29c178d29888196495612d23af6a7bd479c66d0d9a8dd1
              • Instruction Fuzzy Hash: 1A117C71600700FFD7228B65DD88F677BBDEBC6B51F20866DF406A6690DB71E8108A61

              Control-flow Graph

              APIs
              • SetCurrentDirectoryW.KERNEL32(?), ref: 00372B6B
                • Part of subcall function 00373A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00441418,?,00372E7F,?,?,?,00000000), ref: 00373A78
                • Part of subcall function 00379CB3: _wcslen.LIBCMT ref: 00379CBD
              • GetForegroundWindow.USER32(runas,?,?,?,?,?,00432224), ref: 003B2C10
              • ShellExecuteW.SHELL32(00000000,?,?,00432224), ref: 003B2C17
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
              • String ID: runas
              • API String ID: 448630720-4000483414
              • Opcode ID: cf5942e15eabd73d41e766b7f2ad78d841bdd6e773bdf5e931d972644068327e
              • Instruction ID: 5b57c2858499df08b55cf6fad336a726f9ccefb5f0df37ac39edfe3d75bcf83a
              • Opcode Fuzzy Hash: cf5942e15eabd73d41e766b7f2ad78d841bdd6e773bdf5e931d972644068327e
              • Instruction Fuzzy Hash: E911B431208345AAD737FF60D892AAE77A49F95300F04952EF14A1B0A3CF3C8549E716
              APIs
              • lstrlenW.KERNEL32(?,003B5222), ref: 003DDBCE
              • GetFileAttributesW.KERNELBASE(?), ref: 003DDBDD
              • FindFirstFileW.KERNELBASE(?,?), ref: 003DDBEE
              • FindClose.KERNEL32(00000000), ref: 003DDBFA
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: FileFind$AttributesCloseFirstlstrlen
              • String ID:
              • API String ID: 2695905019-0
              • Opcode ID: 63131af062bc23065a9502860ce649716559e3dea8979338c32d842abc9ac7c6
              • Instruction ID: e0874b611c472ab7a41e82c6c5a7a70b445046f98d483a0030a92396b2228fa0
              • Opcode Fuzzy Hash: 63131af062bc23065a9502860ce649716559e3dea8979338c32d842abc9ac7c6
              • Instruction Fuzzy Hash: 7FF0A03282091097C2216B78BE4E8BA376C9E01334F244757F836D26E1EBB059648699
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: BuffCharUpper
              • String ID: p#D
              • API String ID: 3964851224-1688748970
              • Opcode ID: 84a8176ed79cb6e606ad8b420e31a90dfd27ca516371e5de2c2d7c526168ce5c
              • Instruction ID: 7bfe0acf88868e31a3b64d9ba1f1b7b266a087bb7fee6125dff8a06271045873
              • Opcode Fuzzy Hash: 84a8176ed79cb6e606ad8b420e31a90dfd27ca516371e5de2c2d7c526168ce5c
              • Instruction Fuzzy Hash: AFA28B70608341DFC726DF28C480B2ABBE5BF89304F15996DE99A8B352D735EC45CB92
              APIs
              • GetInputState.USER32 ref: 0037D807
              • timeGetTime.WINMM ref: 0037DA07
              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0037DB28
              • TranslateMessage.USER32(?), ref: 0037DB7B
              • DispatchMessageW.USER32(?), ref: 0037DB89
              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0037DB9F
              • Sleep.KERNEL32(0000000A), ref: 0037DBB1
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
              • String ID:
              • API String ID: 2189390790-0
              • Opcode ID: b292da2b7f21e2fe2b730613695e84306afea7f15e6820c5e10038bbb9f7c8ad
              • Instruction ID: 2f6cdb1c8022e143fdd6f617cbdf9829909fa63e303f0be1c4df542d68f8fdf5
              • Opcode Fuzzy Hash: b292da2b7f21e2fe2b730613695e84306afea7f15e6820c5e10038bbb9f7c8ad
              • Instruction Fuzzy Hash: C142CE30608341EFD736DB24C884F6AB7B4BF86304F15866DE55A9B291D778EC44CB92

              Control-flow Graph

              APIs
              • GetSysColorBrush.USER32(0000000F), ref: 00372D07
              • RegisterClassExW.USER32(00000030), ref: 00372D31
              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00372D42
              • InitCommonControlsEx.COMCTL32(?), ref: 00372D5F
              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00372D6F
              • LoadIconW.USER32(000000A9), ref: 00372D85
              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00372D94
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
              • API String ID: 2914291525-1005189915
              • Opcode ID: d74558e3205822db004112df4f18e5e1ba036d354f8906cb0e928b73a9d5088e
              • Instruction ID: 34d960e79a594a100cd2729c670aa1fc90e195341911511c44e57a27414f32b0
              • Opcode Fuzzy Hash: d74558e3205822db004112df4f18e5e1ba036d354f8906cb0e928b73a9d5088e
              • Instruction Fuzzy Hash: 6821E4B5901209EFDB00DFA4E989B9DBBB4FB09700F00822AE911B62A0D7B50584CF98

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 302 3a8d45-3a8d55 303 3a8d6f-3a8d71 302->303 304 3a8d57-3a8d6a call 39f2c6 call 39f2d9 302->304 306 3a90d9-3a90e6 call 39f2c6 call 39f2d9 303->306 307 3a8d77-3a8d7d 303->307 318 3a90f1 304->318 325 3a90ec call 3a27ec 306->325 307->306 310 3a8d83-3a8dae 307->310 310->306 313 3a8db4-3a8dbd 310->313 316 3a8dbf-3a8dd2 call 39f2c6 call 39f2d9 313->316 317 3a8dd7-3a8dd9 313->317 316->325 321 3a8ddf-3a8de3 317->321 322 3a90d5-3a90d7 317->322 324 3a90f4-3a90f9 318->324 321->322 323 3a8de9-3a8ded 321->323 322->324 323->316 327 3a8def-3a8e06 323->327 325->318 330 3a8e08-3a8e0b 327->330 331 3a8e23-3a8e2c 327->331 333 3a8e0d-3a8e13 330->333 334 3a8e15-3a8e1e 330->334 335 3a8e4a-3a8e54 331->335 336 3a8e2e-3a8e45 call 39f2c6 call 39f2d9 call 3a27ec 331->336 333->334 333->336 337 3a8ebf-3a8ed9 334->337 339 3a8e5b-3a8e79 call 3a3820 call 3a29c8 * 2 335->339 340 3a8e56-3a8e58 335->340 367 3a900c 336->367 343 3a8edf-3a8eef 337->343 344 3a8fad-3a8fb6 call 3af89b 337->344 371 3a8e7b-3a8e91 call 39f2d9 call 39f2c6 339->371 372 3a8e96-3a8ebc call 3a9424 339->372 340->339 343->344 345 3a8ef5-3a8ef7 343->345 356 3a8fb8-3a8fca 344->356 357 3a9029 344->357 345->344 349 3a8efd-3a8f23 345->349 349->344 353 3a8f29-3a8f3c 349->353 353->344 358 3a8f3e-3a8f40 353->358 356->357 362 3a8fcc-3a8fdb GetConsoleMode 356->362 360 3a902d-3a9045 ReadFile 357->360 358->344 363 3a8f42-3a8f6d 358->363 365 3a90a1-3a90ac GetLastError 360->365 366 3a9047-3a904d 360->366 362->357 368 3a8fdd-3a8fe1 362->368 363->344 370 3a8f6f-3a8f82 363->370 373 3a90ae-3a90c0 call 39f2d9 call 39f2c6 365->373 374 3a90c5-3a90c8 365->374 366->365 375 3a904f 366->375 369 3a900f-3a9019 call 3a29c8 367->369 368->360 376 3a8fe3-3a8ffd ReadConsoleW 368->376 369->324 370->344 380 3a8f84-3a8f86 370->380 371->367 372->337 373->367 377 3a90ce-3a90d0 374->377 378 3a9005-3a900b call 39f2a3 374->378 384 3a9052-3a9064 375->384 385 3a901e-3a9027 376->385 386 3a8fff GetLastError 376->386 377->369 378->367 380->344 389 3a8f88-3a8fa8 380->389 384->369 393 3a9066-3a906a 384->393 385->384 386->378 389->344 397 3a906c-3a907c call 3a8a61 393->397 398 3a9083-3a908e 393->398 407 3a907f-3a9081 397->407 399 3a909a-3a909f call 3a88a1 398->399 400 3a9090 call 3a8bb1 398->400 408 3a9095-3a9098 399->408 400->408 407->369 408->407
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID:
              • String ID: .9
              • API String ID: 0-4137932486
              • Opcode ID: e0d153ce06e3a498377fb51b87abeb44f9360a7a7b6689b6daf82d749b5eacef
              • Instruction ID: 9aa3f6597274d0f44f609910d03e563efcb32cae6435c2735276a2f4748910e9
              • Opcode Fuzzy Hash: e0d153ce06e3a498377fb51b87abeb44f9360a7a7b6689b6daf82d749b5eacef
              • Instruction Fuzzy Hash: D8C1F278904249AFDF12DFA8D845BADBBB4EF0B310F0541AAE954AB392C7708941CB61

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 410 3b065b-3b068b call 3b042f 413 3b068d-3b0698 call 39f2c6 410->413 414 3b06a6-3b06b2 call 3a5221 410->414 421 3b069a-3b06a1 call 39f2d9 413->421 419 3b06cb-3b0714 call 3b039a 414->419 420 3b06b4-3b06c9 call 39f2c6 call 39f2d9 414->420 430 3b0781-3b078a GetFileType 419->430 431 3b0716-3b071f 419->431 420->421 428 3b097d-3b0983 421->428 432 3b078c-3b07bd GetLastError call 39f2a3 CloseHandle 430->432 433 3b07d3-3b07d6 430->433 435 3b0721-3b0725 431->435 436 3b0756-3b077c GetLastError call 39f2a3 431->436 432->421 447 3b07c3-3b07ce call 39f2d9 432->447 439 3b07d8-3b07dd 433->439 440 3b07df-3b07e5 433->440 435->436 441 3b0727-3b0754 call 3b039a 435->441 436->421 444 3b07e9-3b0837 call 3a516a 439->444 440->444 445 3b07e7 440->445 441->430 441->436 452 3b0839-3b0845 call 3b05ab 444->452 453 3b0847-3b086b call 3b014d 444->453 445->444 447->421 452->453 459 3b086f-3b0879 call 3a86ae 452->459 460 3b087e-3b08c1 453->460 461 3b086d 453->461 459->428 463 3b08c3-3b08c7 460->463 464 3b08e2-3b08f0 460->464 461->459 463->464 466 3b08c9-3b08dd 463->466 467 3b097b 464->467 468 3b08f6-3b08fa 464->468 466->464 467->428 468->467 469 3b08fc-3b092f CloseHandle call 3b039a 468->469 472 3b0963-3b0977 469->472 473 3b0931-3b095d GetLastError call 39f2a3 call 3a5333 469->473 472->467 473->472
              APIs
                • Part of subcall function 003B039A: CreateFileW.KERNELBASE(00000000,00000000,?,003B0704,?,?,00000000,?,003B0704,00000000,0000000C), ref: 003B03B7
              • GetLastError.KERNEL32 ref: 003B076F
              • __dosmaperr.LIBCMT ref: 003B0776
              • GetFileType.KERNELBASE(00000000), ref: 003B0782
              • GetLastError.KERNEL32 ref: 003B078C
              • __dosmaperr.LIBCMT ref: 003B0795
              • CloseHandle.KERNEL32(00000000), ref: 003B07B5
              • CloseHandle.KERNEL32(?), ref: 003B08FF
              • GetLastError.KERNEL32 ref: 003B0931
              • __dosmaperr.LIBCMT ref: 003B0938
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
              • String ID: H
              • API String ID: 4237864984-2852464175
              • Opcode ID: 7ed9040503b1419186ad5061bf1fea2af7e48df82ad6fee308bb15c81801d1fa
              • Instruction ID: 0439cf58a31caa194441edc627de430d7eb921a8679a62d0c0f4638bd1d03397
              • Opcode Fuzzy Hash: 7ed9040503b1419186ad5061bf1fea2af7e48df82ad6fee308bb15c81801d1fa
              • Instruction Fuzzy Hash: 59A12736A141088FDF1EAF68D852BEE7BA0EB06324F140169F955EF291DB319912CB91

              Control-flow Graph

              APIs
                • Part of subcall function 00373A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00441418,?,00372E7F,?,?,?,00000000), ref: 00373A78
                • Part of subcall function 00373357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00373379
              • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 0037356A
              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 003B318D
              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 003B31CE
              • RegCloseKey.ADVAPI32(?), ref: 003B3210
              • _wcslen.LIBCMT ref: 003B3277
              • _wcslen.LIBCMT ref: 003B3286
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
              • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
              • API String ID: 98802146-2727554177
              • Opcode ID: 8f2da454da71c0f47ed0d0721b1b79e776ba07ba55283f310b4c24be7160024f
              • Instruction ID: 94345ba15c128c42ba21fc05f9eb1341fd64a2dcdbc63141dddb7c3c77cd7783
              • Opcode Fuzzy Hash: 8f2da454da71c0f47ed0d0721b1b79e776ba07ba55283f310b4c24be7160024f
              • Instruction Fuzzy Hash: 8771B0714043019ED315EF65DD8299BBBF8FF86740F80493EF9449B1A0DB789A48CB56

              Control-flow Graph

              APIs
              • GetSysColorBrush.USER32(0000000F), ref: 00372B8E
              • LoadCursorW.USER32(00000000,00007F00), ref: 00372B9D
              • LoadIconW.USER32(00000063), ref: 00372BB3
              • LoadIconW.USER32(000000A4), ref: 00372BC5
              • LoadIconW.USER32(000000A2), ref: 00372BD7
              • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00372BEF
              • RegisterClassExW.USER32(?), ref: 00372C40
                • Part of subcall function 00372CD4: GetSysColorBrush.USER32(0000000F), ref: 00372D07
                • Part of subcall function 00372CD4: RegisterClassExW.USER32(00000030), ref: 00372D31
                • Part of subcall function 00372CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00372D42
                • Part of subcall function 00372CD4: InitCommonControlsEx.COMCTL32(?), ref: 00372D5F
                • Part of subcall function 00372CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00372D6F
                • Part of subcall function 00372CD4: LoadIconW.USER32(000000A9), ref: 00372D85
                • Part of subcall function 00372CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00372D94
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
              • String ID: #$0$AutoIt v3
              • API String ID: 423443420-4155596026
              • Opcode ID: 784d97c01cc7fe84274278edd8274f23e4a79f4627cc48ab9619d8ccb4850247
              • Instruction ID: 5c744ba9a7749fdd347af37a8b15f2d3aa7e975f75ee8f66ac037529a056a261
              • Opcode Fuzzy Hash: 784d97c01cc7fe84274278edd8274f23e4a79f4627cc48ab9619d8ccb4850247
              • Instruction Fuzzy Hash: 69214C78E40314ABEB109FA5ED85A997FB4FB09B50F00413AF901B76B0D3B50580CF98

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 551 373170-373185 552 373187-37318a 551->552 553 3731e5-3731e7 551->553 554 37318c-373193 552->554 555 3731eb 552->555 553->552 556 3731e9 553->556 557 373265-37326d PostQuitMessage 554->557 558 373199-37319e 554->558 560 3b2dfb-3b2e23 call 3718e2 call 38e499 555->560 561 3731f1-3731f6 555->561 559 3731d0-3731d8 DefWindowProcW 556->559 566 373219-37321b 557->566 563 3731a4-3731a8 558->563 564 3b2e7c-3b2e90 call 3dbf30 558->564 565 3731de-3731e4 559->565 596 3b2e28-3b2e2f 560->596 567 37321d-373244 SetTimer RegisterWindowMessageW 561->567 568 3731f8-3731fb 561->568 570 3b2e68-3b2e77 call 3dc161 563->570 571 3731ae-3731b3 563->571 564->566 589 3b2e96 564->589 566->565 567->566 572 373246-373251 CreatePopupMenu 567->572 574 373201-373214 KillTimer call 3730f2 call 373c50 568->574 575 3b2d9c-3b2d9f 568->575 570->566 579 3b2e4d-3b2e54 571->579 580 3731b9-3731be 571->580 572->566 574->566 582 3b2da1-3b2da5 575->582 583 3b2dd7-3b2df6 MoveWindow 575->583 579->559 592 3b2e5a-3b2e63 call 3d0ad7 579->592 587 3731c4-3731ca 580->587 588 373253-373263 call 37326f 580->588 590 3b2da7-3b2daa 582->590 591 3b2dc6-3b2dd2 SetFocus 582->591 583->566 587->559 587->596 588->566 589->559 590->587 597 3b2db0-3b2dc1 call 3718e2 590->597 591->566 592->559 596->559 600 3b2e35-3b2e48 call 3730f2 call 373837 596->600 597->566 600->559
              APIs
              • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,0037316A,?,?), ref: 003731D8
              • KillTimer.USER32(?,00000001,?,?,?,?,?,0037316A,?,?), ref: 00373204
              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00373227
              • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,0037316A,?,?), ref: 00373232
              • CreatePopupMenu.USER32 ref: 00373246
              • PostQuitMessage.USER32(00000000), ref: 00373267
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
              • String ID: TaskbarCreated
              • API String ID: 129472671-2362178303
              • Opcode ID: c51d0e33f02fb1e2ffe2dd17e7115b3b76f8c037c59f36502d69376fdbdc708c
              • Instruction ID: 67e57379a62e9193b242c7d220e656421ba43999b15ddd9af336132ac3a5e4c9
              • Opcode Fuzzy Hash: c51d0e33f02fb1e2ffe2dd17e7115b3b76f8c037c59f36502d69376fdbdc708c
              • Instruction Fuzzy Hash: 41414935250204E6EB372B78DD49BB93719E706340F14C236F91A966B2C77CCA80E76A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID:
              • String ID: D%D$D%D$D%D$D%D$D%DD%D$Variable must be of type 'Object'.
              • API String ID: 0-3449319901
              • Opcode ID: bc1ebdbb726896364630f1997acc8ecbaa77ebe014fe21e8c79d6578f2cafe06
              • Instruction ID: ba4306360852ac720cef4818d125ea787122eacee7173638d990afb74546db91
              • Opcode Fuzzy Hash: bc1ebdbb726896364630f1997acc8ecbaa77ebe014fe21e8c79d6578f2cafe06
              • Instruction Fuzzy Hash: 29C29B75A00214CFDB26DF58C881AADB7F1BF09300F25C5A9E919AB3A1D379ED41CB91
              APIs
              • __Init_thread_footer.LIBCMT ref: 0037FE66
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Init_thread_footer
              • String ID: D%D$D%D$D%D$D%D$D%DD%D
              • API String ID: 1385522511-1580408221
              • Opcode ID: eeb98615d45f69e4b19689b8db0e5f63f1c26ae05c7ddf7d341911de46836a84
              • Instruction ID: 7312faa96695b6e18d0c8c85bf39d4de3430f7a7bdac94495f94226e9e2fc316
              • Opcode Fuzzy Hash: eeb98615d45f69e4b19689b8db0e5f63f1c26ae05c7ddf7d341911de46836a84
              • Instruction Fuzzy Hash: A9B28A74608340CFDB26DF18C490A2AB7E1BF89310F25896DF9899B391D779EC45CB92

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1560 10f25e0-10f268e call 10f0000 1563 10f2695-10f26bb call 10f34f0 CreateFileW 1560->1563 1566 10f26bd 1563->1566 1567 10f26c2-10f26d2 1563->1567 1568 10f280d-10f2811 1566->1568 1574 10f26d9-10f26f3 VirtualAlloc 1567->1574 1575 10f26d4 1567->1575 1569 10f2853-10f2856 1568->1569 1570 10f2813-10f2817 1568->1570 1576 10f2859-10f2860 1569->1576 1572 10f2819-10f281c 1570->1572 1573 10f2823-10f2827 1570->1573 1572->1573 1579 10f2829-10f2833 1573->1579 1580 10f2837-10f283b 1573->1580 1581 10f26fa-10f2711 ReadFile 1574->1581 1582 10f26f5 1574->1582 1575->1568 1577 10f28b5-10f28ca 1576->1577 1578 10f2862-10f286d 1576->1578 1585 10f28cc-10f28d7 VirtualFree 1577->1585 1586 10f28da-10f28e2 1577->1586 1583 10f286f 1578->1583 1584 10f2871-10f287d 1578->1584 1579->1580 1587 10f283d-10f2847 1580->1587 1588 10f284b 1580->1588 1589 10f2718-10f2758 VirtualAlloc 1581->1589 1590 10f2713 1581->1590 1582->1568 1583->1577 1593 10f287f-10f288f 1584->1593 1594 10f2891-10f289d 1584->1594 1585->1586 1587->1588 1588->1569 1591 10f275f-10f277a call 10f3740 1589->1591 1592 10f275a 1589->1592 1590->1568 1600 10f2785-10f278f 1591->1600 1592->1568 1596 10f28b3 1593->1596 1597 10f289f-10f28a8 1594->1597 1598 10f28aa-10f28b0 1594->1598 1596->1576 1597->1596 1598->1596 1601 10f27c2-10f27d6 call 10f3550 1600->1601 1602 10f2791-10f27c0 call 10f3740 1600->1602 1608 10f27da-10f27de 1601->1608 1609 10f27d8 1601->1609 1602->1600 1610 10f27ea-10f27ee 1608->1610 1611 10f27e0-10f27e4 FindCloseChangeNotification 1608->1611 1609->1568 1612 10f27fe-10f2807 1610->1612 1613 10f27f0-10f27fb VirtualFree 1610->1613 1611->1610 1612->1563 1612->1568 1613->1612
              APIs
              • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 010F26B1
              • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 010F28D7
              Memory Dump Source
              • Source File: 00000000.00000002.1641185508.00000000010F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_10f0000_whiteee.jbxd
              Similarity
              • API ID: CreateFileFreeVirtual
              • String ID:
              • API String ID: 204039940-0
              • Opcode ID: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
              • Instruction ID: 7f04bf56c14cad35e4dfb939d2d7030085df962e17fb1c936634162a5a99384e
              • Opcode Fuzzy Hash: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
              • Instruction Fuzzy Hash: 99A11574E01209EBDB14CFA4C895BEEBBB5BF48304F20819DE641BB680D7759A81CB94

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1624 372c63-372cd3 CreateWindowExW * 2 ShowWindow * 2
              APIs
              • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00372C91
              • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00372CB2
              • ShowWindow.USER32(00000000,?,?,?,?,?,?,00371CAD,?), ref: 00372CC6
              • ShowWindow.USER32(00000000,?,?,?,?,?,?,00371CAD,?), ref: 00372CCF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Window$CreateShow
              • String ID: AutoIt v3$edit
              • API String ID: 1584632944-3779509399
              • Opcode ID: 396ae771297733c1ec9bfbf3c93604707dab1375e43c4730e0d81181769d0efc
              • Instruction ID: c5f052f2ecca63b6eb7e0b76c9e4b917d273a157cfd3dafffa4114c98ec10b25
              • Opcode Fuzzy Hash: 396ae771297733c1ec9bfbf3c93604707dab1375e43c4730e0d81181769d0efc
              • Instruction Fuzzy Hash: 9BF0DA79540290BAFB311B17AC48E772EBDD7C7F50B10407AFD00A35B0C6751894DAB8

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1739 10f23b0-10f24e1 call 10f0000 call 10f22a0 CreateFileW 1746 10f24e8-10f24f8 1739->1746 1747 10f24e3 1739->1747 1750 10f24ff-10f2519 VirtualAlloc 1746->1750 1751 10f24fa 1746->1751 1748 10f2598-10f259d 1747->1748 1752 10f251d-10f2534 ReadFile 1750->1752 1753 10f251b 1750->1753 1751->1748 1754 10f2538-10f2572 call 10f22e0 call 10f12a0 1752->1754 1755 10f2536 1752->1755 1753->1748 1760 10f258e-10f2596 ExitProcess 1754->1760 1761 10f2574-10f2589 call 10f2330 1754->1761 1755->1748 1760->1748 1761->1760
              APIs
                • Part of subcall function 010F22A0: Sleep.KERNELBASE(000001F4), ref: 010F22B1
              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 010F24D7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1641185508.00000000010F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_10f0000_whiteee.jbxd
              Similarity
              • API ID: CreateFileSleep
              • String ID: 9EC1R00X9A59IN4A1UZPV7
              • API String ID: 2694422964-2955565628
              • Opcode ID: 4f78b2114735147aab0e7c3f93de90d508718047de993ae2c6190bf2fd3dd873
              • Instruction ID: 306fa123783edc83b6f87a651722f122e9408b2bc7874efa2fbf8eabba3ee3ba
              • Opcode Fuzzy Hash: 4f78b2114735147aab0e7c3f93de90d508718047de993ae2c6190bf2fd3dd873
              • Instruction Fuzzy Hash: C2519370D04249EBEF11DBE4C819BEEBBB8AF19300F00419DE649BB2C1D6B95B45CB65

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1763 3e2947-3e29b9 call 3b1f50 call 3e25d6 call 38fe0b call 375722 call 3e274e call 37511f call 395232 1778 3e29bf-3e29c6 call 3e2e66 1763->1778 1779 3e2a6c-3e2a73 call 3e2e66 1763->1779 1784 3e29cc-3e2a6a call 39d583 call 394983 call 399038 call 39d583 call 399038 * 2 1778->1784 1785 3e2a75-3e2a77 1778->1785 1779->1785 1786 3e2a7c 1779->1786 1789 3e2a7f-3e2b3a call 3750f5 * 8 call 3e3017 call 39e5eb 1784->1789 1788 3e2cb6-3e2cb7 1785->1788 1786->1789 1790 3e2cd5-3e2cdb 1788->1790 1828 3e2b3c-3e2b3e 1789->1828 1829 3e2b43-3e2b5e call 3e2792 1789->1829 1793 3e2cdd-3e2ce8 call 38fdcd call 38fe14 1790->1793 1794 3e2cf0-3e2cf6 1790->1794 1806 3e2ced 1793->1806 1806->1794 1828->1788 1832 3e2b64-3e2b6c 1829->1832 1833 3e2bf0-3e2bfc call 39e678 1829->1833 1834 3e2b6e-3e2b72 1832->1834 1835 3e2b74 1832->1835 1840 3e2bfe-3e2c0d DeleteFileW 1833->1840 1841 3e2c12-3e2c16 1833->1841 1837 3e2b79-3e2b97 call 3750f5 1834->1837 1835->1837 1847 3e2b99-3e2b9e 1837->1847 1848 3e2bc1-3e2bd7 call 3e211d call 39dbb3 1837->1848 1840->1788 1843 3e2c18-3e2c7e call 3e25d6 call 39d2eb * 2 call 3e22ce 1841->1843 1844 3e2c91-3e2ca5 CopyFileW 1841->1844 1845 3e2cb9-3e2ccf DeleteFileW call 3e2fd8 1843->1845 1868 3e2c80-3e2c8f DeleteFileW 1843->1868 1844->1845 1846 3e2ca7-3e2cb4 DeleteFileW 1844->1846 1854 3e2cd4 1845->1854 1846->1788 1851 3e2ba1-3e2bb4 call 3e28d2 1847->1851 1863 3e2bdc-3e2be7 1848->1863 1861 3e2bb6-3e2bbf 1851->1861 1854->1790 1861->1848 1863->1832 1864 3e2bed 1863->1864 1864->1833 1868->1788
              APIs
              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 003E2C05
              • DeleteFileW.KERNEL32(?), ref: 003E2C87
              • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 003E2C9D
              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 003E2CAE
              • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 003E2CC0
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: File$Delete$Copy
              • String ID:
              • API String ID: 3226157194-0
              • Opcode ID: 519d4b710121d222a92166f1220446d8ebd5b517ada712bc3a3e4dc0de545b6b
              • Instruction ID: e922a4280d4450caa561d77121fee638dbb2dc7e01234ad6cf279fc77bdc4ac6
              • Opcode Fuzzy Hash: 519d4b710121d222a92166f1220446d8ebd5b517ada712bc3a3e4dc0de545b6b
              • Instruction Fuzzy Hash: 81B16F71D00129ABDF26EBA5CC85EDFB7BDEF49340F1041A6F509EA181EB349A448F61

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1869 3a5aa9-3a5ace 1870 3a5ad0-3a5ad2 1869->1870 1871 3a5ad7-3a5ad9 1869->1871 1872 3a5ca5-3a5cb4 call 390a8c 1870->1872 1873 3a5afa-3a5b1f 1871->1873 1874 3a5adb-3a5af5 call 39f2c6 call 39f2d9 call 3a27ec 1871->1874 1875 3a5b21-3a5b24 1873->1875 1876 3a5b26-3a5b2c 1873->1876 1874->1872 1875->1876 1879 3a5b4e-3a5b53 1875->1879 1880 3a5b4b 1876->1880 1881 3a5b2e-3a5b46 call 39f2c6 call 39f2d9 call 3a27ec 1876->1881 1885 3a5b64-3a5b6d call 3a564e 1879->1885 1886 3a5b55-3a5b61 call 3a9424 1879->1886 1880->1879 1920 3a5c9c-3a5c9f 1881->1920 1897 3a5ba8-3a5bba 1885->1897 1898 3a5b6f-3a5b71 1885->1898 1886->1885 1903 3a5bbc-3a5bc2 1897->1903 1904 3a5c02-3a5c23 WriteFile 1897->1904 1900 3a5b73-3a5b78 1898->1900 1901 3a5b95-3a5b9e call 3a542e 1898->1901 1907 3a5b7e-3a5b8b call 3a55e1 1900->1907 1908 3a5c6c-3a5c7e 1900->1908 1919 3a5ba3-3a5ba6 1901->1919 1905 3a5bf2-3a5c00 call 3a56c4 1903->1905 1906 3a5bc4-3a5bc7 1903->1906 1911 3a5c2e 1904->1911 1912 3a5c25-3a5c2b GetLastError 1904->1912 1905->1919 1913 3a5bc9-3a5bcc 1906->1913 1914 3a5be2-3a5bf0 call 3a5891 1906->1914 1929 3a5b8e-3a5b90 1907->1929 1917 3a5c89-3a5c99 call 39f2d9 call 39f2c6 1908->1917 1918 3a5c80-3a5c83 1908->1918 1921 3a5c31-3a5c3c 1911->1921 1912->1911 1913->1908 1922 3a5bd2-3a5be0 call 3a57a3 1913->1922 1914->1919 1917->1920 1918->1917 1927 3a5c85-3a5c87 1918->1927 1919->1929 1923 3a5ca4 1920->1923 1930 3a5c3e-3a5c43 1921->1930 1931 3a5ca1 1921->1931 1922->1919 1923->1872 1927->1923 1929->1921 1932 3a5c69 1930->1932 1933 3a5c45-3a5c4a 1930->1933 1931->1923 1932->1908 1938 3a5c4c-3a5c5e call 39f2d9 call 39f2c6 1933->1938 1939 3a5c60-3a5c67 call 39f2a3 1933->1939 1938->1920 1939->1920
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID:
              • String ID: JO7
              • API String ID: 0-1292904385
              • Opcode ID: ce54922bd0f50b8d688a0cfaea5c6c654d04b73b91e2d941105f074cdcc4710a
              • Instruction ID: 516dbfb2adcb02a49d58dedd9d69beb915c14ba14396dcf6fee32fe9a0b938dc
              • Opcode Fuzzy Hash: ce54922bd0f50b8d688a0cfaea5c6c654d04b73b91e2d941105f074cdcc4710a
              • Instruction Fuzzy Hash: 1551B075D00609AFDF129FA8C845FAEBBB8EF17320F150069F505AB292D7759A01CB61
              APIs
              • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00373B0F,SwapMouseButtons,00000004,?), ref: 00373B40
              • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00373B0F,SwapMouseButtons,00000004,?), ref: 00373B61
              • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00373B0F,SwapMouseButtons,00000004,?), ref: 00373B83
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: CloseOpenQueryValue
              • String ID: Control Panel\Mouse
              • API String ID: 3677997916-824357125
              • Opcode ID: 9e8e91cab4cc28a3e186071ed917a6edfaea934a149a393f42bc85ad0a0acc1a
              • Instruction ID: 649d1c9b970908e59faa072ddfbe33bf138d7a0a9ba2739ac72736ef742ef18b
              • Opcode Fuzzy Hash: 9e8e91cab4cc28a3e186071ed917a6edfaea934a149a393f42bc85ad0a0acc1a
              • Instruction Fuzzy Hash: 10112AB5510208FFDB218FA5DC84AEEB7BCEF44744B11856AA809E7110D2359E40A7A4
              APIs
              • CreateProcessW.KERNELBASE(?,00000000), ref: 010F1ACD
              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 010F1AF1
              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 010F1B13
              Memory Dump Source
              • Source File: 00000000.00000002.1641185508.00000000010F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_10f0000_whiteee.jbxd
              Similarity
              • API ID: Process$ContextCreateMemoryReadThreadWow64
              • String ID:
              • API String ID: 2438371351-0
              • Opcode ID: cc658a0e6010fd3573e63fe9dffc1f366d2843c5c23e1a249a06af30add5367b
              • Instruction ID: 464d4d3aaf5c3dfdb6e6ed951d85d897f49230dbb644cec9f39a108843c12404
              • Opcode Fuzzy Hash: cc658a0e6010fd3573e63fe9dffc1f366d2843c5c23e1a249a06af30add5367b
              • Instruction Fuzzy Hash: 4C621A30A14258DBEB24DFA4C851BDEB372EF58300F1091A9D20DEB794E7799E81CB59
              APIs
              • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 003B33A2
                • Part of subcall function 00376B57: _wcslen.LIBCMT ref: 00376B6A
              • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00373A04
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: IconLoadNotifyShell_String_wcslen
              • String ID: Line:
              • API String ID: 2289894680-1585850449
              • Opcode ID: bb57d30e0641e8bbf1a5d8eddeb703053458889a268295bebd5ffb227291422b
              • Instruction ID: 1c14e9335ec686cccb52c2f68d82e83cee6db8e461923bec3d33dbffb5abdb88
              • Opcode Fuzzy Hash: bb57d30e0641e8bbf1a5d8eddeb703053458889a268295bebd5ffb227291422b
              • Instruction Fuzzy Hash: 2231D671508310AAD732EF20DC56BEFB7E8AB81710F10892AF59D970A1DB789648C7C6
              APIs
              • GetOpenFileNameW.COMDLG32(?), ref: 003B2C8C
                • Part of subcall function 00373AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00373A97,?,?,00372E7F,?,?,?,00000000), ref: 00373AC2
                • Part of subcall function 00372DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00372DC4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Name$Path$FileFullLongOpen
              • String ID: X$`eC
              • API String ID: 779396738-1587089302
              • Opcode ID: 2f44cf31e93664fe98e7ff66dd4d288901b29dea1ce2eb6bd96c449c3588cca7
              • Instruction ID: db2a1c97d808d1d7a189f0dd30ef7e967841a769db80475fae2bf17b0e7b0db0
              • Opcode Fuzzy Hash: 2f44cf31e93664fe98e7ff66dd4d288901b29dea1ce2eb6bd96c449c3588cca7
              • Instruction Fuzzy Hash: 6A216371A00258ABDB52DF94C845BEE7BFCAF49314F00C05AE509BB241DBB85A898B65
              APIs
              • __CxxThrowException@8.LIBVCRUNTIME ref: 00390668
                • Part of subcall function 003932A4: RaiseException.KERNEL32(?,?,?,0039068A,?,00441444,?,?,?,?,?,?,0039068A,00371129,00438738,00371129), ref: 00393304
              • __CxxThrowException@8.LIBVCRUNTIME ref: 00390685
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Exception@8Throw$ExceptionRaise
              • String ID: Unknown exception
              • API String ID: 3476068407-410509341
              • Opcode ID: 185799c93fcf08bd27ad04ea78ab3eea50648d162040fb68da983f85f0e621a4
              • Instruction ID: 565b253572fbb4b4a497769f9d867e0c57eca9d12e3ff30ad7e5ed0c15e081fa
              • Opcode Fuzzy Hash: 185799c93fcf08bd27ad04ea78ab3eea50648d162040fb68da983f85f0e621a4
              • Instruction Fuzzy Hash: BAF0F63490030DBBCF06B7A4DC46D9EB76C9E00310B604575B924DA9D5EF71EB6AC6C0
              APIs
              • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 003E302F
              • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 003E3044
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Temp$FileNamePath
              • String ID: aut
              • API String ID: 3285503233-3010740371
              • Opcode ID: bf5987f8cc74b0a3392f7e2a7ff8cb92830fcfc33dfb419cfab3f5e7503efd6f
              • Instruction ID: 159d0f2ffdf41eb53683707d96a661d7e1e423c3ae3c76da6089df1953dfd18a
              • Opcode Fuzzy Hash: bf5987f8cc74b0a3392f7e2a7ff8cb92830fcfc33dfb419cfab3f5e7503efd6f
              • Instruction Fuzzy Hash: CBD05E72900328B7DA20A7A4AD4EFCB3A6CDB05750F0002A2B655E20D1DAB49984CAD4
              APIs
              • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 003F82F5
              • TerminateProcess.KERNEL32(00000000), ref: 003F82FC
              • FreeLibrary.KERNEL32(?,?,?,?), ref: 003F84DD
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Process$CurrentFreeLibraryTerminate
              • String ID:
              • API String ID: 146820519-0
              • Opcode ID: 8d6a2e6aee358389c82d41249a61759962644f8e8bb890c8112f8f15425b6917
              • Instruction ID: 03b032ed3c666d6260d2c4c451186ddb87585ab2f56d92d4c80b20949f0ffc8e
              • Opcode Fuzzy Hash: 8d6a2e6aee358389c82d41249a61759962644f8e8bb890c8112f8f15425b6917
              • Instruction Fuzzy Hash: DB128B71A083059FC725DF28C484B2ABBE5BF89314F05895DE9898B392CB34ED45CF92
              APIs
                • Part of subcall function 00371BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00371BF4
                • Part of subcall function 00371BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00371BFC
                • Part of subcall function 00371BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00371C07
                • Part of subcall function 00371BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00371C12
                • Part of subcall function 00371BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00371C1A
                • Part of subcall function 00371BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00371C22
                • Part of subcall function 00371B4A: RegisterWindowMessageW.USER32(00000004,?,003712C4), ref: 00371BA2
              • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0037136A
              • OleInitialize.OLE32 ref: 00371388
              • CloseHandle.KERNEL32(00000000,00000000), ref: 003B24AB
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
              • String ID:
              • API String ID: 1986988660-0
              • Opcode ID: 8384c432e7d0dcf1517112d2b4852fd6b8891caad050ef09131102481ca816c4
              • Instruction ID: b92716a4807b7ac81709fe0091c905c3a7b69b935d80c6e368c0aaf015137f9c
              • Opcode Fuzzy Hash: 8384c432e7d0dcf1517112d2b4852fd6b8891caad050ef09131102481ca816c4
              • Instruction Fuzzy Hash: EA71ACBD911304AFD385EF79ED856953AE0BB8A344714823AD51ADB271EB3844C0CF4C
              APIs
              • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000001,?,00000000), ref: 0037556D
              • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001), ref: 0037557D
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: FilePointer
              • String ID:
              • API String ID: 973152223-0
              • Opcode ID: 26a2f45dcb5f81d97b784eeefe33d5a43bb074649f0d09efebdbeba3d924d2a5
              • Instruction ID: de1055649477050628509fc329fd56ada5842599dc355941edefa556df9c05cd
              • Opcode Fuzzy Hash: 26a2f45dcb5f81d97b784eeefe33d5a43bb074649f0d09efebdbeba3d924d2a5
              • Instruction Fuzzy Hash: 8F316271A00609FFDB29CF28C880B99B7B5FB48724F15C229E91997640D7B5FD94CB90
              APIs
              • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,003A85CC,?,00438CC8,0000000C), ref: 003A8704
              • GetLastError.KERNEL32(?,003A85CC,?,00438CC8,0000000C), ref: 003A870E
              • __dosmaperr.LIBCMT ref: 003A8739
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ChangeCloseErrorFindLastNotification__dosmaperr
              • String ID:
              • API String ID: 490808831-0
              • Opcode ID: d41858f94dd6918ce23badf15f2edc75fc8a40f3b3721c0993e9325c63bdcb15
              • Instruction ID: 4f435b2815cda2ebadf37007a22549d3656711769b6093160b1ff3fb75029176
              • Opcode Fuzzy Hash: d41858f94dd6918ce23badf15f2edc75fc8a40f3b3721c0993e9325c63bdcb15
              • Instruction Fuzzy Hash: 92012B3660562026EA6763346849B7E6749CBD3774F3A0229FA149F1E2DEB1CC858294
              APIs
              • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,00000000,?,?,003E2CD4,?,?,?,00000004,00000001), ref: 003E2FF2
              • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,003E2CD4,?,?,?,00000004,00000001,?,?,00000004,00000001), ref: 003E3006
              • CloseHandle.KERNEL32(00000000,?,003E2CD4,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 003E300D
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: File$CloseCreateHandleTime
              • String ID:
              • API String ID: 3397143404-0
              • Opcode ID: 420ba6703a67a5fd4d68b36e4209a72924d1ef5a377743dd1dcca3b1f12d54bf
              • Instruction ID: 14db734605adf95b3463ca15fe940a5f10f5aa54771bcb047d4d9bf8a806e137
              • Opcode Fuzzy Hash: 420ba6703a67a5fd4d68b36e4209a72924d1ef5a377743dd1dcca3b1f12d54bf
              • Instruction Fuzzy Hash: EBE08632280224B7D2311765BD4DF8B3A1CD786B71F114320FB197A0D046B0190156AC
              APIs
              • __Init_thread_footer.LIBCMT ref: 003817F6
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Init_thread_footer
              • String ID: CALL
              • API String ID: 1385522511-4196123274
              • Opcode ID: 8979e71ecca0ec928a15ffcd882740ece8a415f6ed268437da6d66c183d85638
              • Instruction ID: 2fb1fef86c8ec80746f42e01e3eef1970131dd0a3aa863b05cba62aef3a7052b
              • Opcode Fuzzy Hash: 8979e71ecca0ec928a15ffcd882740ece8a415f6ed268437da6d66c183d85638
              • Instruction Fuzzy Hash: CE228B706083419FC716EF14C481B2ABBF9BF85314F2489ADF4968B7A1D771E946CB82
              APIs
              • _wcslen.LIBCMT ref: 003E6F6B
                • Part of subcall function 00374ECB: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00441418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00374EFD
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: LibraryLoad_wcslen
              • String ID: >>>AUTOIT SCRIPT<<<
              • API String ID: 3312870042-2806939583
              • Opcode ID: 87ad832b315f607b1a6560c6fce6d25fa0c793df6bfffa3adcd1c56492c76211
              • Instruction ID: f2e2c8a818ee7a85d1622a048572697ff5d1a5633dcab7a164b4cec7b663db19
              • Opcode Fuzzy Hash: 87ad832b315f607b1a6560c6fce6d25fa0c793df6bfffa3adcd1c56492c76211
              • Instruction Fuzzy Hash: 7CB1E7311087519FCB26EF20C49196EB7E5BF95310F00C95DF49A8B2A2EB34ED49CB92
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: __fread_nolock
              • String ID: EA06
              • API String ID: 2638373210-3962188686
              • Opcode ID: 70437a9448c6d0f7bd7ff3690318f50e39eaca99d43cd7fcfd05cc7e89944ef6
              • Instruction ID: f6f3876e34b093dedacbb98377126c8a5560a3184c1146e66961f1ec84da4bdd
              • Opcode Fuzzy Hash: 70437a9448c6d0f7bd7ff3690318f50e39eaca99d43cd7fcfd05cc7e89944ef6
              • Instruction Fuzzy Hash: D901B5729042687EDF19C7A8C856EEEBBFC9B05301F00455AE552D61C1E5B8E6088B60
              APIs
              • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00373908
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: IconNotifyShell_
              • String ID:
              • API String ID: 1144537725-0
              • Opcode ID: 6ce73a715dca462874c2be770e87aef08ed20354ebfc15cfd2bad40eca0fcfd9
              • Instruction ID: c8cf36b1b2a3b9cdceb829dd1fbb275b1600212f65ce47936f1bd55174d8a303
              • Opcode Fuzzy Hash: 6ce73a715dca462874c2be770e87aef08ed20354ebfc15cfd2bad40eca0fcfd9
              • Instruction Fuzzy Hash: 6131BF74504701EFE722DF24D884797BBE8FB49708F00092EFA9D87250E775AA48DB52
              APIs
              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0037949C,?,00008000), ref: 00375773
              • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,?,?,0037949C,?,00008000), ref: 003B4052
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: CreateFile
              • String ID:
              • API String ID: 823142352-0
              • Opcode ID: e8fd23aac5c3ef838bcc5d0c5e9acee1e3ae8d6706d6166581d5e5b1ff3d1628
              • Instruction ID: dbcee6f390b4fab3772a8a109c463f1219aaf429c5bec8267b99edb8502f47cd
              • Opcode Fuzzy Hash: e8fd23aac5c3ef838bcc5d0c5e9acee1e3ae8d6706d6166581d5e5b1ff3d1628
              • Instruction Fuzzy Hash: 75018030245225B6E3351A2ACD0EF977F98EF027B4F11C314BA9C6E1E1C7B45854CB94
              APIs
              • CreateProcessW.KERNELBASE(?,00000000), ref: 010F1ACD
              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 010F1AF1
              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 010F1B13
              Memory Dump Source
              • Source File: 00000000.00000002.1641185508.00000000010F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_10f0000_whiteee.jbxd
              Similarity
              • API ID: Process$ContextCreateMemoryReadThreadWow64
              • String ID:
              • API String ID: 2438371351-0
              • Opcode ID: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
              • Instruction ID: 1d90d3c46f5fcd098e248949f160b47742822360d5e8d429c68df73f20ab0850
              • Opcode Fuzzy Hash: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
              • Instruction Fuzzy Hash: F112DD24E24658C6EB24DF64D8507DEB272EF68300F1090ED910DEB7A5E77A4E81CF5A
              APIs
                • Part of subcall function 00374E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00374EDD,?,00441418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00374E9C
                • Part of subcall function 00374E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00374EAE
                • Part of subcall function 00374E90: FreeLibrary.KERNEL32(00000000,?,?,00374EDD,?,00441418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00374EC0
              • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00441418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00374EFD
                • Part of subcall function 00374E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,003B3CDE,?,00441418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00374E62
                • Part of subcall function 00374E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00374E74
                • Part of subcall function 00374E59: FreeLibrary.KERNEL32(00000000,?,?,003B3CDE,?,00441418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00374E87
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Library$Load$AddressFreeProc
              • String ID:
              • API String ID: 2632591731-0
              • Opcode ID: 3e1018432574f530af34912b975bb1938890e9f04057ca8883edba3ba26d56d0
              • Instruction ID: 2284e7fbbd9c67a532a119c09220a43fefe28c91022d8e2ecf4ea60555fd8055
              • Opcode Fuzzy Hash: 3e1018432574f530af34912b975bb1938890e9f04057ca8883edba3ba26d56d0
              • Instruction Fuzzy Hash: 8511C132600215AADF26AB60DC02FAD77A5AF44B11F20C42DF54ABA1C1EFB8AA059750
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: __wsopen_s
              • String ID:
              • API String ID: 3347428461-0
              • Opcode ID: 9a5b2e4a864762b32d81424bc42b8705240649e53ac01f239da21cdaa89e9a4c
              • Instruction ID: 97fe5077b6ed34560deefded560adddc5a923511bc44e730a529f727bcbf10df
              • Opcode Fuzzy Hash: 9a5b2e4a864762b32d81424bc42b8705240649e53ac01f239da21cdaa89e9a4c
              • Instruction Fuzzy Hash: 01111C7590420AAFCB06DF59E94199A7BF9EF49314F114059F804AB311D731DA11CB65
              APIs
              • ReadFile.KERNELBASE(?,?,00010000,00000000,00000000,?,?,00000000,?,0037543F,?,00010000,00000000,00000000,00000000,00000000), ref: 00379A9C
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: FileRead
              • String ID:
              • API String ID: 2738559852-0
              • Opcode ID: 6e39bcf6aefee8c7f53594af4d71387a82f8cb783ef69b54bf9b57396ca6e8a4
              • Instruction ID: 08f02535df10f00dc5f5c2155a5ca0ddfbb39c23e5282165077fcdb316524576
              • Opcode Fuzzy Hash: 6e39bcf6aefee8c7f53594af4d71387a82f8cb783ef69b54bf9b57396ca6e8a4
              • Instruction Fuzzy Hash: 921136312057059FDB728F0AC880B66B7F9EB44764F10C62EE99B8AA51C774A945CB60
              APIs
                • Part of subcall function 003A4C7D: RtlAllocateHeap.NTDLL(00000008,00371129,00000000,?,003A2E29,00000001,00000364,?,?,?,0039F2DE,003A3863,00441444,?,0038FDF5,?), ref: 003A4CBE
              • _free.LIBCMT ref: 003A506C
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: AllocateHeap_free
              • String ID:
              • API String ID: 614378929-0
              • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
              • Instruction ID: 317125744733dfa4a9bf095fa0af902176e23e17018aedff64f1e89cc985d03f
              • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
              • Instruction Fuzzy Hash: BD0126722047046BE322CF699885A9AFBECFB8A370F25051DE18487280EA70A805C6B4
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
              • Instruction ID: 8215734dfdc526fee79d10695daf7705a3d780780325cea09dc2a4111bd3163b
              • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
              • Instruction Fuzzy Hash: 0BF0F432510E10AADF337A699C05B5B339CDFA3330F110715F8209A2D2DB74D8018AA5
              APIs
              • RtlAllocateHeap.NTDLL(00000008,00371129,00000000,?,003A2E29,00000001,00000364,?,?,?,0039F2DE,003A3863,00441444,?,0038FDF5,?), ref: 003A4CBE
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: AllocateHeap
              • String ID:
              • API String ID: 1279760036-0
              • Opcode ID: 5d2d8e2dfe8d21926831390c781314f4f2790b01d4ee3a48501d4a5b7b2ac52e
              • Instruction ID: 96a322293b5f27770129a4fccb0bfeb25fbcb42f279757e0ac78073b2ce6a277
              • Opcode Fuzzy Hash: 5d2d8e2dfe8d21926831390c781314f4f2790b01d4ee3a48501d4a5b7b2ac52e
              • Instruction Fuzzy Hash: B1F0B43164622476EB235F629C09F5A3788EFC3BB0B168221B81DAA191CAF0D80147A0
              APIs
              • RtlAllocateHeap.NTDLL(00000000,?,00441444,?,0038FDF5,?,?,0037A976,00000010,00441440,003713FC,?,003713C6,?,00371129), ref: 003A3852
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: AllocateHeap
              • String ID:
              • API String ID: 1279760036-0
              • Opcode ID: e16f20ee1b5e49e1c231968c6c18d32149f8dcbdde9740ba5c05ec6953a377df
              • Instruction ID: 0a0cd8b4775863e9fdd5032eec19d557e8ff101354b7e321de033cdfc525f07f
              • Opcode Fuzzy Hash: e16f20ee1b5e49e1c231968c6c18d32149f8dcbdde9740ba5c05ec6953a377df
              • Instruction Fuzzy Hash: A5E0E53150122496EB232B669C04F9A374CEF437B0F060130BC059A890DB28DD0582E1
              APIs
              • FreeLibrary.KERNEL32(?,?,00441418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00374F6D
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: FreeLibrary
              • String ID:
              • API String ID: 3664257935-0
              • Opcode ID: 4577599ce3578b0a7c867b15e7bcc18cad63b219713b5e69c22a28e6b90bd9c4
              • Instruction ID: b7f553b6b073e5171ae40eb2da3bd0f7fa1c432ae4a9ab60ec0a5c01ec19ab3e
              • Opcode Fuzzy Hash: 4577599ce3578b0a7c867b15e7bcc18cad63b219713b5e69c22a28e6b90bd9c4
              • Instruction Fuzzy Hash: 76F03971105752CFDB369F64E490822FBE4EF15329321CA7EE1EE86A21C736A844DF10
              APIs
              • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00372DC4
                • Part of subcall function 00376B57: _wcslen.LIBCMT ref: 00376B6A
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: LongNamePath_wcslen
              • String ID:
              • API String ID: 541455249-0
              • Opcode ID: 0e6c5e9d11548ae4173c03b2b7efe34780034c2ed748eef57df0903129232926
              • Instruction ID: e850a76ecf23f59aa4a876060c73b66051da94d2e45f7a4327e9a4dfda4e80c6
              • Opcode Fuzzy Hash: 0e6c5e9d11548ae4173c03b2b7efe34780034c2ed748eef57df0903129232926
              • Instruction Fuzzy Hash: 9BE0C272A002245BCB21A3989C06FEA77EDDFC8790F0442B5FD09EB249DA74AD80C690
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: __fread_nolock
              • String ID:
              • API String ID: 2638373210-0
              • Opcode ID: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
              • Instruction ID: 4e133266be4f90567f2834b0ef5ee6ffb6fe0130c3ecef7bafe5f2578acaaea6
              • Opcode Fuzzy Hash: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
              • Instruction Fuzzy Hash: 89E04FB0609B105FDF3A9A28A8517B777E89F49300F01096EF69B82252E5B268458A4D
              APIs
                • Part of subcall function 00373837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00373908
                • Part of subcall function 0037D730: GetInputState.USER32 ref: 0037D807
              • SetCurrentDirectoryW.KERNEL32(?), ref: 00372B6B
                • Part of subcall function 003730F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 0037314E
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: IconNotifyShell_$CurrentDirectoryInputState
              • String ID:
              • API String ID: 3667716007-0
              • Opcode ID: 4691cc7137d34760584fec001d3358ffa527d304ad09776274633aac6df5ecb7
              • Instruction ID: 08322ebe0b3bf1daabded74dfd38e63cbbc1869db9a27ec494f414423599b77e
              • Opcode Fuzzy Hash: 4691cc7137d34760584fec001d3358ffa527d304ad09776274633aac6df5ecb7
              • Instruction Fuzzy Hash: F7E0262130024816C62ABB30985256DA7598BD2311F00853EF04E4B1A3CF3C45895212
              APIs
              • CreateFileW.KERNELBASE(00000000,00000000,?,003B0704,?,?,00000000,?,003B0704,00000000,0000000C), ref: 003B03B7
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: CreateFile
              • String ID:
              • API String ID: 823142352-0
              • Opcode ID: 3db14531b5655632bd4de9bfbd1ccc228187a0d6a5c6f93a96f13acb8b32b91e
              • Instruction ID: 65bb30d15aeb228a9d506d69e1faed6429bebac3f4a4e7f702ea3743d389460b
              • Opcode Fuzzy Hash: 3db14531b5655632bd4de9bfbd1ccc228187a0d6a5c6f93a96f13acb8b32b91e
              • Instruction Fuzzy Hash: 85D06C3204010DFBDF028F84DD46EDA3BAAFB48714F014110BE1866020C732E821AB94
              APIs
              • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00371CBC
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: InfoParametersSystem
              • String ID:
              • API String ID: 3098949447-0
              • Opcode ID: d1ef19c2f059073f1d2a0b3f62c41bb29c1929f54d2a5ffd4c8f3fe3a84af1a2
              • Instruction ID: 4ddc74b12658c8889ec8a272dd17212f7d240d41b84af1ae17668a3dda0e30e9
              • Opcode Fuzzy Hash: d1ef19c2f059073f1d2a0b3f62c41bb29c1929f54d2a5ffd4c8f3fe3a84af1a2
              • Instruction Fuzzy Hash: 41C09B3D280314FFF2144B80BD4AF107754A349F00F444011F609655F3C3F11450E658
              APIs
                • Part of subcall function 00375745: CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0037949C,?,00008000), ref: 00375773
              • GetLastError.KERNEL32(00000002,00000000), ref: 003E76DE
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: CreateErrorFileLast
              • String ID:
              • API String ID: 1214770103-0
              • Opcode ID: 4177c50ab48739ed0eb131e01933e7b4c3f5abe9f63e0b8ddc0d367e5762451b
              • Instruction ID: ea42b9b4291d730026d0afb8714273b5748ed34a29385e5042ce3e0bba08bebe
              • Opcode Fuzzy Hash: 4177c50ab48739ed0eb131e01933e7b4c3f5abe9f63e0b8ddc0d367e5762451b
              • Instruction Fuzzy Hash: A7819F302087419FC726EF29C492B69B7E1AF89314F04865DF88A5B2E2DB34AD45CB52
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: AllocVirtual
              • String ID:
              • API String ID: 4275171209-0
              • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
              • Instruction ID: 714533f069d6800c3646fe5eafcd6060f325c5960ead61a885fbd9761f72abc0
              • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
              • Instruction Fuzzy Hash: EC31D275A002099FC71AEF59D480969F7B6FB49300B2586E5E909CB655D731EEC1CBC0
              APIs
              • Sleep.KERNELBASE(000001F4), ref: 010F22B1
              Memory Dump Source
              • Source File: 00000000.00000002.1641185508.00000000010F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_10f0000_whiteee.jbxd
              Similarity
              • API ID: Sleep
              • String ID:
              • API String ID: 3472027048-0
              • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
              • Instruction ID: 86d0612a11a895c53ff11b70c578951ea81d7dd14a5d013f858cabe04c872046
              • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
              • Instruction Fuzzy Hash: 02E0E67498110EEFDB00EFB8D5496DE7FB4EF04311F100165FD01D2281D6309D508A72
              APIs
                • Part of subcall function 00389BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00389BB2
              • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0040961A
              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0040965B
              • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 0040969F
              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 004096C9
              • SendMessageW.USER32 ref: 004096F2
              • GetKeyState.USER32(00000011), ref: 0040978B
              • GetKeyState.USER32(00000009), ref: 00409798
              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 004097AE
              • GetKeyState.USER32(00000010), ref: 004097B8
              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 004097E9
              • SendMessageW.USER32 ref: 00409810
              • SendMessageW.USER32(?,00001030,?,00407E95), ref: 00409918
              • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0040992E
              • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00409941
              • SetCapture.USER32(?), ref: 0040994A
              • ClientToScreen.USER32(?,?), ref: 004099AF
              • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 004099BC
              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 004099D6
              • ReleaseCapture.USER32 ref: 004099E1
              • GetCursorPos.USER32(?), ref: 00409A19
              • ScreenToClient.USER32(?,?), ref: 00409A26
              • SendMessageW.USER32(?,00001012,00000000,?), ref: 00409A80
              • SendMessageW.USER32 ref: 00409AAE
              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00409AEB
              • SendMessageW.USER32 ref: 00409B1A
              • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00409B3B
              • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00409B4A
              • GetCursorPos.USER32(?), ref: 00409B68
              • ScreenToClient.USER32(?,?), ref: 00409B75
              • GetParent.USER32(?), ref: 00409B93
              • SendMessageW.USER32(?,00001012,00000000,?), ref: 00409BFA
              • SendMessageW.USER32 ref: 00409C2B
              • ClientToScreen.USER32(?,?), ref: 00409C84
              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00409CB4
              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00409CDE
              • SendMessageW.USER32 ref: 00409D01
              • ClientToScreen.USER32(?,?), ref: 00409D4E
              • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00409D82
                • Part of subcall function 00389944: GetWindowLongW.USER32(?,000000EB), ref: 00389952
              • GetWindowLongW.USER32(?,000000F0), ref: 00409E05
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
              • String ID: @GUI_DRAGID$F$p#D
              • API String ID: 3429851547-2595749892
              • Opcode ID: 9b3d7f24aa482e2d1b1ce519230e8ddf7b0bf31ee3371ec5fe8d4932dcd1c096
              • Instruction ID: 44ac9d45bb8bdcc87f9fa2302faf7c87b8e66e76b639bee5866ba26feef2f442
              • Opcode Fuzzy Hash: 9b3d7f24aa482e2d1b1ce519230e8ddf7b0bf31ee3371ec5fe8d4932dcd1c096
              • Instruction Fuzzy Hash: 50429075108201EFD725CF24CC84EAABBE5FF89310F144A2AF655A72E2D7369C51CB49
              APIs
              • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 004048F3
              • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00404908
              • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00404927
              • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 0040494B
              • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 0040495C
              • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 0040497B
              • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 004049AE
              • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 004049D4
              • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00404A0F
              • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00404A56
              • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00404A7E
              • IsMenu.USER32(?), ref: 00404A97
              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00404AF2
              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00404B20
              • GetWindowLongW.USER32(?,000000F0), ref: 00404B94
              • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00404BE3
              • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00404C82
              • wsprintfW.USER32 ref: 00404CAE
              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00404CC9
              • GetWindowTextW.USER32(?,00000000,00000001), ref: 00404CF1
              • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00404D13
              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00404D33
              • GetWindowTextW.USER32(?,00000000,00000001), ref: 00404D5A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
              • String ID: %d/%02d/%02d
              • API String ID: 4054740463-328681919
              • Opcode ID: 876f224360016e8c26cbd9897ff682175b7ab13660c2de9e940f66e3fc1db3cc
              • Instruction ID: 28488a5eb859d7377de3c7a79ea612b988df2dc5a57f4b5e3f8a124b7faa206d
              • Opcode Fuzzy Hash: 876f224360016e8c26cbd9897ff682175b7ab13660c2de9e940f66e3fc1db3cc
              • Instruction Fuzzy Hash: A612F2B1600214ABEB259F24CC49FAF7BF8EF85310F10463AF615EA2E1DB789941CB54
              APIs
              • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 0038F998
              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 003CF474
              • IsIconic.USER32(00000000), ref: 003CF47D
              • ShowWindow.USER32(00000000,00000009), ref: 003CF48A
              • SetForegroundWindow.USER32(00000000), ref: 003CF494
              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 003CF4AA
              • GetCurrentThreadId.KERNEL32 ref: 003CF4B1
              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 003CF4BD
              • AttachThreadInput.USER32(?,00000000,00000001), ref: 003CF4CE
              • AttachThreadInput.USER32(?,00000000,00000001), ref: 003CF4D6
              • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 003CF4DE
              • SetForegroundWindow.USER32(00000000), ref: 003CF4E1
              • MapVirtualKeyW.USER32(00000012,00000000), ref: 003CF4F6
              • keybd_event.USER32(00000012,00000000), ref: 003CF501
              • MapVirtualKeyW.USER32(00000012,00000000), ref: 003CF50B
              • keybd_event.USER32(00000012,00000000), ref: 003CF510
              • MapVirtualKeyW.USER32(00000012,00000000), ref: 003CF519
              • keybd_event.USER32(00000012,00000000), ref: 003CF51E
              • MapVirtualKeyW.USER32(00000012,00000000), ref: 003CF528
              • keybd_event.USER32(00000012,00000000), ref: 003CF52D
              • SetForegroundWindow.USER32(00000000), ref: 003CF530
              • AttachThreadInput.USER32(?,000000FF,00000000), ref: 003CF557
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
              • String ID: Shell_TrayWnd
              • API String ID: 4125248594-2988720461
              • Opcode ID: ec04d5e6ac6acbb24c51e8f4a5bf41d65d8b954d08ee97ee7486db22ca819b73
              • Instruction ID: c700ebe6cab5fe56924519f1af800b5caa9bd0eda743d859acbe45a042295e16
              • Opcode Fuzzy Hash: ec04d5e6ac6acbb24c51e8f4a5bf41d65d8b954d08ee97ee7486db22ca819b73
              • Instruction Fuzzy Hash: 32316071A40218BEEB216BB64D8AFBF7E6DEB44B50F110139FA00F61D1C6B15D00AB64
              APIs
                • Part of subcall function 003D16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 003D170D
                • Part of subcall function 003D16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 003D173A
                • Part of subcall function 003D16C3: GetLastError.KERNEL32 ref: 003D174A
              • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 003D1286
              • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 003D12A8
              • CloseHandle.KERNEL32(?), ref: 003D12B9
              • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 003D12D1
              • GetProcessWindowStation.USER32 ref: 003D12EA
              • SetProcessWindowStation.USER32(00000000), ref: 003D12F4
              • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 003D1310
                • Part of subcall function 003D10BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,003D11FC), ref: 003D10D4
                • Part of subcall function 003D10BF: CloseHandle.KERNEL32(?,?,003D11FC), ref: 003D10E9
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
              • String ID: $default$winsta0$ZC
              • API String ID: 22674027-471795638
              • Opcode ID: 47989533f5114ae615fd171558bfd9be12bd25873cf4ae94a7628aae0807b95c
              • Instruction ID: 0bf0e2769ced364d4e80a68742a8bf1864676f51ef9388b6c8c7ca0ca82b0569
              • Opcode Fuzzy Hash: 47989533f5114ae615fd171558bfd9be12bd25873cf4ae94a7628aae0807b95c
              • Instruction Fuzzy Hash: 9381BF72900209BFDF229FA5ED89FEE7BB9EF04700F14412AF910B62A0C7758944DB24
              APIs
                • Part of subcall function 003D10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 003D1114
                • Part of subcall function 003D10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,003D0B9B,?,?,?), ref: 003D1120
                • Part of subcall function 003D10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,003D0B9B,?,?,?), ref: 003D112F
                • Part of subcall function 003D10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,003D0B9B,?,?,?), ref: 003D1136
                • Part of subcall function 003D10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 003D114D
              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 003D0BCC
              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 003D0C00
              • GetLengthSid.ADVAPI32(?), ref: 003D0C17
              • GetAce.ADVAPI32(?,00000000,?), ref: 003D0C51
              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 003D0C6D
              • GetLengthSid.ADVAPI32(?), ref: 003D0C84
              • GetProcessHeap.KERNEL32(00000008,00000008), ref: 003D0C8C
              • HeapAlloc.KERNEL32(00000000), ref: 003D0C93
              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 003D0CB4
              • CopySid.ADVAPI32(00000000), ref: 003D0CBB
              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 003D0CEA
              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 003D0D0C
              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 003D0D1E
              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 003D0D45
              • HeapFree.KERNEL32(00000000), ref: 003D0D4C
              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 003D0D55
              • HeapFree.KERNEL32(00000000), ref: 003D0D5C
              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 003D0D65
              • HeapFree.KERNEL32(00000000), ref: 003D0D6C
              • GetProcessHeap.KERNEL32(00000000,?), ref: 003D0D78
              • HeapFree.KERNEL32(00000000), ref: 003D0D7F
                • Part of subcall function 003D1193: GetProcessHeap.KERNEL32(00000008,003D0BB1,?,00000000,?,003D0BB1,?), ref: 003D11A1
                • Part of subcall function 003D1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,003D0BB1,?), ref: 003D11A8
                • Part of subcall function 003D1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,003D0BB1,?), ref: 003D11B7
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
              • String ID:
              • API String ID: 4175595110-0
              • Opcode ID: 318d26caca2f0e7c0359f1a9086a10b060c598dddd1e9a9a7d7e49a0b0622012
              • Instruction ID: 717872b1318438b832df531d50b3b5136aaf3fd2319544bd4890a45cd27a636e
              • Opcode Fuzzy Hash: 318d26caca2f0e7c0359f1a9086a10b060c598dddd1e9a9a7d7e49a0b0622012
              • Instruction Fuzzy Hash: CE716B7290020AEBDF159FE4ED84FAEBBB9AF05700F054626E914BB291D771A905CB60
              APIs
              • OpenClipboard.USER32(0040CC08), ref: 003EEB29
              • IsClipboardFormatAvailable.USER32(0000000D), ref: 003EEB37
              • GetClipboardData.USER32(0000000D), ref: 003EEB43
              • CloseClipboard.USER32 ref: 003EEB4F
              • GlobalLock.KERNEL32(00000000), ref: 003EEB87
              • CloseClipboard.USER32 ref: 003EEB91
              • GlobalUnlock.KERNEL32(00000000,00000000), ref: 003EEBBC
              • IsClipboardFormatAvailable.USER32(00000001), ref: 003EEBC9
              • GetClipboardData.USER32(00000001), ref: 003EEBD1
              • GlobalLock.KERNEL32(00000000), ref: 003EEBE2
              • GlobalUnlock.KERNEL32(00000000,?), ref: 003EEC22
              • IsClipboardFormatAvailable.USER32(0000000F), ref: 003EEC38
              • GetClipboardData.USER32(0000000F), ref: 003EEC44
              • GlobalLock.KERNEL32(00000000), ref: 003EEC55
              • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 003EEC77
              • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 003EEC94
              • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 003EECD2
              • GlobalUnlock.KERNEL32(00000000,?,?), ref: 003EECF3
              • CountClipboardFormats.USER32 ref: 003EED14
              • CloseClipboard.USER32 ref: 003EED59
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
              • String ID:
              • API String ID: 420908878-0
              • Opcode ID: e656220fea6c618f57c305b555ab0d76444811338a2549e6d104b18b30e01880
              • Instruction ID: 50c4a9c1d0597f7a1c465bf7f5784183ef3dde33f5392e647921e922aead935f
              • Opcode Fuzzy Hash: e656220fea6c618f57c305b555ab0d76444811338a2549e6d104b18b30e01880
              • Instruction Fuzzy Hash: 8561E235204242EFD322EF21DD85F2A77A8AF84704F15466DF4569B2E2DB31DD05CB62
              APIs
              • FindFirstFileW.KERNEL32(?,?), ref: 003E69BE
              • FindClose.KERNEL32(00000000), ref: 003E6A12
              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 003E6A4E
              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 003E6A75
                • Part of subcall function 00379CB3: _wcslen.LIBCMT ref: 00379CBD
              • FileTimeToSystemTime.KERNEL32(?,?), ref: 003E6AB2
              • FileTimeToSystemTime.KERNEL32(?,?), ref: 003E6ADF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
              • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
              • API String ID: 3830820486-3289030164
              • Opcode ID: f0ad201d503a4c36a66703291d1ad0daa7e0c2b9249b19d1ce8d78f34965c84c
              • Instruction ID: d470a2afd394316d127b33d99b01e8edf4baecf7c825aaf64c5b7b3bbacfedea
              • Opcode Fuzzy Hash: f0ad201d503a4c36a66703291d1ad0daa7e0c2b9249b19d1ce8d78f34965c84c
              • Instruction Fuzzy Hash: 58D17271508340AFC711EB64C992EAFB7ECAF98704F04491DF589DB191EB78DA44CB62
              APIs
              • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 003E9663
              • GetFileAttributesW.KERNEL32(?), ref: 003E96A1
              • SetFileAttributesW.KERNEL32(?,?), ref: 003E96BB
              • FindNextFileW.KERNEL32(00000000,?), ref: 003E96D3
              • FindClose.KERNEL32(00000000), ref: 003E96DE
              • FindFirstFileW.KERNEL32(*.*,?), ref: 003E96FA
              • SetCurrentDirectoryW.KERNEL32(?), ref: 003E974A
              • SetCurrentDirectoryW.KERNEL32(00436B7C), ref: 003E9768
              • FindNextFileW.KERNEL32(00000000,00000010), ref: 003E9772
              • FindClose.KERNEL32(00000000), ref: 003E977F
              • FindClose.KERNEL32(00000000), ref: 003E978F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
              • String ID: *.*
              • API String ID: 1409584000-438819550
              • Opcode ID: 506846687229107bc476c755e59458cd44e864cfa5c28cc463b094b8d91a705d
              • Instruction ID: eb3dd5829e483bb33a1a44580f662e34baad6e8731d6270459c7cec4aa22402b
              • Opcode Fuzzy Hash: 506846687229107bc476c755e59458cd44e864cfa5c28cc463b094b8d91a705d
              • Instruction Fuzzy Hash: 1731C332500269AADF11AFB5DD49BDE77AC9F09360F2142A7F945E20D1DB34DD448B18
              APIs
              • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 003E97BE
              • FindNextFileW.KERNEL32(00000000,?), ref: 003E9819
              • FindClose.KERNEL32(00000000), ref: 003E9824
              • FindFirstFileW.KERNEL32(*.*,?), ref: 003E9840
              • SetCurrentDirectoryW.KERNEL32(?), ref: 003E9890
              • SetCurrentDirectoryW.KERNEL32(00436B7C), ref: 003E98AE
              • FindNextFileW.KERNEL32(00000000,00000010), ref: 003E98B8
              • FindClose.KERNEL32(00000000), ref: 003E98C5
              • FindClose.KERNEL32(00000000), ref: 003E98D5
                • Part of subcall function 003DDAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 003DDB00
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
              • String ID: *.*
              • API String ID: 2640511053-438819550
              • Opcode ID: 374110f7f45eef8eecb5b789bff5de15a6c8c5db707b82cc2c3f1efe3c894842
              • Instruction ID: 3343171731043e998cb47e6cc2153c2295f5a38beefc3634016c23ff0f8e7080
              • Opcode Fuzzy Hash: 374110f7f45eef8eecb5b789bff5de15a6c8c5db707b82cc2c3f1efe3c894842
              • Instruction Fuzzy Hash: F631D632500269AADF12EFB5DC48BDE77AC9F0A320F214267E850B21E1DB30DD85CB24
              APIs
              • GetLocalTime.KERNEL32(?), ref: 003E8257
              • SystemTimeToFileTime.KERNEL32(?,?), ref: 003E8267
              • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 003E8273
              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 003E8310
              • SetCurrentDirectoryW.KERNEL32(?), ref: 003E8324
              • SetCurrentDirectoryW.KERNEL32(?), ref: 003E8356
              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 003E838C
              • SetCurrentDirectoryW.KERNEL32(?), ref: 003E8395
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: CurrentDirectoryTime$File$Local$System
              • String ID: *.*
              • API String ID: 1464919966-438819550
              • Opcode ID: f7140c45701a9b503b3793d26f02ac7c7c5c5306b903b71fb4693ea6c397381a
              • Instruction ID: 65cb39f9779a989b2a6d050925e4386fc02d6da4fbf3c4d89674df05a93a4a93
              • Opcode Fuzzy Hash: f7140c45701a9b503b3793d26f02ac7c7c5c5306b903b71fb4693ea6c397381a
              • Instruction Fuzzy Hash: DE619E765043559FCB11EF60C881A9EB3E8FF89314F048A1EF98997291DB35E905CB92
              APIs
                • Part of subcall function 00373AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00373A97,?,?,00372E7F,?,?,?,00000000), ref: 00373AC2
                • Part of subcall function 003DE199: GetFileAttributesW.KERNEL32(?,003DCF95), ref: 003DE19A
              • FindFirstFileW.KERNEL32(?,?), ref: 003DD122
              • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 003DD1DD
              • MoveFileW.KERNEL32(?,?), ref: 003DD1F0
              • DeleteFileW.KERNEL32(?,?,?,?), ref: 003DD20D
              • FindNextFileW.KERNEL32(00000000,00000010), ref: 003DD237
                • Part of subcall function 003DD29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,003DD21C,?,?), ref: 003DD2B2
              • FindClose.KERNEL32(00000000,?,?,?), ref: 003DD253
              • FindClose.KERNEL32(00000000), ref: 003DD264
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
              • String ID: \*.*
              • API String ID: 1946585618-1173974218
              • Opcode ID: 7cf7bd244f4c506dfadefe989465701779e6b425a9fe947b59804ee97dac2aa8
              • Instruction ID: 80dc1220dd4e942b5978890c3df5bd8dde27cfb28e06af3fab437f6a4ec96c84
              • Opcode Fuzzy Hash: 7cf7bd244f4c506dfadefe989465701779e6b425a9fe947b59804ee97dac2aa8
              • Instruction Fuzzy Hash: F5615032C0110DAACF16EBE0DE92DEDB775AF55300F2085A6E4067B291EB345F09DB61
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Clipboard$AllocCloseEmptyGlobalOpen
              • String ID:
              • API String ID: 1737998785-0
              • Opcode ID: fe01721d57bd369abc41146dc7f752aa3decab1d91de86b29dd1814383bb6b42
              • Instruction ID: 3882cbb2fd0d44fc0f0f07c639b975f557c3a8b5a9e06ce7ba0fc84ae9fc324a
              • Opcode Fuzzy Hash: fe01721d57bd369abc41146dc7f752aa3decab1d91de86b29dd1814383bb6b42
              • Instruction Fuzzy Hash: 1541C035604661DFE322CF16D888B1ABBE5EF44318F15C6ADE4199F6A2C735EC41CB90
              APIs
                • Part of subcall function 003D16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 003D170D
                • Part of subcall function 003D16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 003D173A
                • Part of subcall function 003D16C3: GetLastError.KERNEL32 ref: 003D174A
              • ExitWindowsEx.USER32(?,00000000), ref: 003DE932
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
              • String ID: $ $@$SeShutdownPrivilege
              • API String ID: 2234035333-3163812486
              • Opcode ID: 46dad2fdd9d4de3a6d2cb9c359ddaed5d4527e8f2b743cd64042a12979c5c022
              • Instruction ID: de8aad5d7ba86dae9339c7c0f6924966f9a4b381d89e13fb289df7975c2ca213
              • Opcode Fuzzy Hash: 46dad2fdd9d4de3a6d2cb9c359ddaed5d4527e8f2b743cd64042a12979c5c022
              • Instruction Fuzzy Hash: 09012673A11211BBEB5637B4BC96BBF765C9B04744F160927FC12FA2D1D7B85C408194
              APIs
              • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 003F1276
              • WSAGetLastError.WSOCK32 ref: 003F1283
              • bind.WSOCK32(00000000,?,00000010), ref: 003F12BA
              • WSAGetLastError.WSOCK32 ref: 003F12C5
              • closesocket.WSOCK32(00000000), ref: 003F12F4
              • listen.WSOCK32(00000000,00000005), ref: 003F1303
              • WSAGetLastError.WSOCK32 ref: 003F130D
              • closesocket.WSOCK32(00000000), ref: 003F133C
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ErrorLast$closesocket$bindlistensocket
              • String ID:
              • API String ID: 540024437-0
              • Opcode ID: 5c1ff798952d038f75c53a021babce94af7c9393bec891a22635721667cb2e64
              • Instruction ID: 3f0600cf82dea9f3a87c9af6d6568ec7de28c6e1712c7a97de54b4622ea590c0
              • Opcode Fuzzy Hash: 5c1ff798952d038f75c53a021babce94af7c9393bec891a22635721667cb2e64
              • Instruction Fuzzy Hash: EC41BF31600104EFD721EF64D5C8B2ABBE5AF86318F19C598E9569F292C731EC81CBA0
              APIs
                • Part of subcall function 00373AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00373A97,?,?,00372E7F,?,?,?,00000000), ref: 00373AC2
                • Part of subcall function 003DE199: GetFileAttributesW.KERNEL32(?,003DCF95), ref: 003DE19A
              • FindFirstFileW.KERNEL32(?,?), ref: 003DD420
              • DeleteFileW.KERNEL32(?,?,?,?), ref: 003DD470
              • FindNextFileW.KERNEL32(00000000,00000010), ref: 003DD481
              • FindClose.KERNEL32(00000000), ref: 003DD498
              • FindClose.KERNEL32(00000000), ref: 003DD4A1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
              • String ID: \*.*
              • API String ID: 2649000838-1173974218
              • Opcode ID: 41a2ae180219a188701a494c80dd35ba275b8c4fb1b2d0863396846750e1a6f0
              • Instruction ID: 62e6edd3c13a8a0b921b55bb417b6a518860e4bbbdc3f9fe7d9ac8d68d45cf53
              • Opcode Fuzzy Hash: 41a2ae180219a188701a494c80dd35ba275b8c4fb1b2d0863396846750e1a6f0
              • Instruction Fuzzy Hash: CF31A272008345ABC316EF60D8929AF77E8BE91304F408A6EF4D557291EF34AA09D763
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: __floor_pentium4
              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
              • API String ID: 4168288129-2761157908
              • Opcode ID: 8f067ad792a34d50523167ea1536fe230922c9bf487accbe5c6f7a6d54931264
              • Instruction ID: e5a8e9c227ec1517544bccec4f4db1d7b5417fc535d95bd5750b58098795d1f7
              • Opcode Fuzzy Hash: 8f067ad792a34d50523167ea1536fe230922c9bf487accbe5c6f7a6d54931264
              • Instruction Fuzzy Hash: A6C24C71E046288FDB26CF68DD407EAB7B9EB4A305F1541EAD44DE7240E779AE818F40
              APIs
              • _wcslen.LIBCMT ref: 003E64DC
              • CoInitialize.OLE32(00000000), ref: 003E6639
              • CoCreateInstance.OLE32(0040FCF8,00000000,00000001,0040FB68,?), ref: 003E6650
              • CoUninitialize.OLE32 ref: 003E68D4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: CreateInitializeInstanceUninitialize_wcslen
              • String ID: .lnk
              • API String ID: 886957087-24824748
              • Opcode ID: 0e80409ab3712c018ce3599a2ef2ee1b5bc2b446f994e127a7c8511763a6029c
              • Instruction ID: fcf9ad03f9a7ace0988f5f9c600fb60729c24d42c94d40f166d788acdb2c62cf
              • Opcode Fuzzy Hash: 0e80409ab3712c018ce3599a2ef2ee1b5bc2b446f994e127a7c8511763a6029c
              • Instruction Fuzzy Hash: CDD15C71608351AFC315EF24C882E6BB7E8FF95704F10896DF5598B2A1DB30E905CB92
              APIs
              • GetForegroundWindow.USER32(?,?,00000000), ref: 003F22E8
                • Part of subcall function 003EE4EC: GetWindowRect.USER32(?,?), ref: 003EE504
              • GetDesktopWindow.USER32 ref: 003F2312
              • GetWindowRect.USER32(00000000), ref: 003F2319
              • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 003F2355
              • GetCursorPos.USER32(?), ref: 003F2381
              • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 003F23DF
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Window$Rectmouse_event$CursorDesktopForeground
              • String ID:
              • API String ID: 2387181109-0
              • Opcode ID: e35e79227e512bda01eac03b40692259672f4c3cf3e58d06f1d7e77dc6180343
              • Instruction ID: 642bfa708d9499fa4804655931e0cc7752f7e16ca174924c585f49220cc62952
              • Opcode Fuzzy Hash: e35e79227e512bda01eac03b40692259672f4c3cf3e58d06f1d7e77dc6180343
              • Instruction Fuzzy Hash: 0B31D0B6505319EFC721DF14D845F6BBBA9FF84314F000A1AF985AB191DB34E908CB92
              APIs
                • Part of subcall function 00379CB3: _wcslen.LIBCMT ref: 00379CBD
              • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 003E9B78
              • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 003E9C8B
                • Part of subcall function 003E3874: GetInputState.USER32 ref: 003E38CB
                • Part of subcall function 003E3874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 003E3966
              • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 003E9BA8
              • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 003E9C75
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
              • String ID: *.*
              • API String ID: 1972594611-438819550
              • Opcode ID: a153a46acfcc845fa2dc91abeb22f595be31a847825c9ea28530ade0b81a940c
              • Instruction ID: c1b5e7adf3a9d4ffb7c1290d7f59c137e27db3d25bedc810be682271bce80de8
              • Opcode Fuzzy Hash: a153a46acfcc845fa2dc91abeb22f595be31a847825c9ea28530ade0b81a940c
              • Instruction Fuzzy Hash: B941727190025AAFDF26EF65C985BEE7BB8EF05300F204256E405A61D1D7349E84CF64
              APIs
                • Part of subcall function 00389BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00389BB2
              • DefDlgProcW.USER32(?,?,?,?,?), ref: 00389A4E
              • GetSysColor.USER32(0000000F), ref: 00389B23
              • SetBkColor.GDI32(?,00000000), ref: 00389B36
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Color$LongProcWindow
              • String ID:
              • API String ID: 3131106179-0
              • Opcode ID: cb05a44678ced58d547fd17f426283610f7c40b3f08bc7f51c78b6d79a6a455b
              • Instruction ID: 28e369df88c84788203a21de502c84669bc96714962cc377814bc6e9696f1c47
              • Opcode Fuzzy Hash: cb05a44678ced58d547fd17f426283610f7c40b3f08bc7f51c78b6d79a6a455b
              • Instruction Fuzzy Hash: CCA11B70208604BEE72BBB2D8C89F7B269DDB42344B1A015FF902D6DD1CA399D41C779
              APIs
                • Part of subcall function 003F304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 003F307A
                • Part of subcall function 003F304E: _wcslen.LIBCMT ref: 003F309B
              • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 003F185D
              • WSAGetLastError.WSOCK32 ref: 003F1884
              • bind.WSOCK32(00000000,?,00000010), ref: 003F18DB
              • WSAGetLastError.WSOCK32 ref: 003F18E6
              • closesocket.WSOCK32(00000000), ref: 003F1915
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
              • String ID:
              • API String ID: 1601658205-0
              • Opcode ID: 42f6b55fd394a3684f83a4c03cbb7c9033d5c3f7654194c8d0f7e3e8b38752f5
              • Instruction ID: 86b933cafa9320f0523ab2a11c72ed0f88028a40028902ca6f504f81528f64bb
              • Opcode Fuzzy Hash: 42f6b55fd394a3684f83a4c03cbb7c9033d5c3f7654194c8d0f7e3e8b38752f5
              • Instruction Fuzzy Hash: 9F51B171A00200AFDB21AF24D986F3A77E5AB45718F14C49CFA0A6F3D3D775AD418BA1
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Window$EnabledForegroundIconicVisibleZoomed
              • String ID:
              • API String ID: 292994002-0
              • Opcode ID: ca825999732195aa78e4886c1fa5a46b7abfdc69bb6bcd4c06636c02075e6c72
              • Instruction ID: fe0fd7096eacd5474414a1c8d7be27b0e1f680ec9c7b2466d8dfc70ead0b8c01
              • Opcode Fuzzy Hash: ca825999732195aa78e4886c1fa5a46b7abfdc69bb6bcd4c06636c02075e6c72
              • Instruction Fuzzy Hash: BC21B6317442119FE7208F16C884B1B7B95AF95314F19807EE846AB3A1C779EC42CB98
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID:
              • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
              • API String ID: 0-1546025612
              • Opcode ID: cb5d809b8a67761e24ee0d6c8f51aa1ab424fb97e4dfc0b6313157ef9b96451e
              • Instruction ID: e5552a9958eb12118a91d8b1b806afbad25e9eee8e4b8bfe12cd8e1c454aa687
              • Opcode Fuzzy Hash: cb5d809b8a67761e24ee0d6c8f51aa1ab424fb97e4dfc0b6313157ef9b96451e
              • Instruction Fuzzy Hash: 65A29E70E0061ACBDF36CF58C8457EDB7B1BF44318F2585AAD919ABA81DB389D81CB50
              APIs
              • lstrlenW.KERNEL32(?,?,?,00000000), ref: 003D82AA
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: lstrlen
              • String ID: ($tbC$|
              • API String ID: 1659193697-3136911626
              • Opcode ID: c20909733a0838805b10c514622b8aafb2808aa4dd3e0738c7c7811a43ca4e0e
              • Instruction ID: df2c8b5671dd54109219e60e57c4ba7b6113295d9f5c5aeb629145368554a783
              • Opcode Fuzzy Hash: c20909733a0838805b10c514622b8aafb2808aa4dd3e0738c7c7811a43ca4e0e
              • Instruction Fuzzy Hash: DC324579A007059FCB29CF19D481A6AB7F0FF48720B15C46EE59ADB7A1EB70E941CB40
              APIs
              • CreateToolhelp32Snapshot.KERNEL32 ref: 003FA6AC
              • Process32FirstW.KERNEL32(00000000,?), ref: 003FA6BA
                • Part of subcall function 00379CB3: _wcslen.LIBCMT ref: 00379CBD
              • Process32NextW.KERNEL32(00000000,?), ref: 003FA79C
              • CloseHandle.KERNEL32(00000000), ref: 003FA7AB
                • Part of subcall function 0038CE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,003B3303,?), ref: 0038CE8A
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
              • String ID:
              • API String ID: 1991900642-0
              • Opcode ID: b2de957161e3efd45a754acf37a4e8f5ca079941231d12c4414684a6510d1ca0
              • Instruction ID: e230ab4ba1e4a22a823beb25e24542fbb664b10faac913834afa9a37425a6b23
              • Opcode Fuzzy Hash: b2de957161e3efd45a754acf37a4e8f5ca079941231d12c4414684a6510d1ca0
              • Instruction Fuzzy Hash: 0C5151B15047009FD711EF24C886E6BBBE8FF89754F00892DF5899B252EB34D904CB92
              APIs
              • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 003DAAAC
              • SetKeyboardState.USER32(00000080), ref: 003DAAC8
              • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 003DAB36
              • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 003DAB88
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: KeyboardState$InputMessagePostSend
              • String ID:
              • API String ID: 432972143-0
              • Opcode ID: e8e29d488c2edb28c4a1eb07bdc7965b762eca0bc8c289e7516f5ec9759937f8
              • Instruction ID: 28a8e1df0f470f8f019f44cbfe4bc6fac233066337990caa4f5d52611704e6ca
              • Opcode Fuzzy Hash: e8e29d488c2edb28c4a1eb07bdc7965b762eca0bc8c289e7516f5ec9759937f8
              • Instruction Fuzzy Hash: CF313D32A40A08AEFF36CB64ED05BFA7BAAAB45310F04431BF181563D0D3758986D756
              APIs
              • _free.LIBCMT ref: 003ABB7F
                • Part of subcall function 003A29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,003AD7D1,00000000,00000000,00000000,00000000,?,003AD7F8,00000000,00000007,00000000,?,003ADBF5,00000000), ref: 003A29DE
                • Part of subcall function 003A29C8: GetLastError.KERNEL32(00000000,?,003AD7D1,00000000,00000000,00000000,00000000,?,003AD7F8,00000000,00000007,00000000,?,003ADBF5,00000000,00000000), ref: 003A29F0
              • GetTimeZoneInformation.KERNEL32 ref: 003ABB91
              • WideCharToMultiByte.KERNEL32(00000000,?,0044121C,000000FF,?,0000003F,?,?), ref: 003ABC09
              • WideCharToMultiByte.KERNEL32(00000000,?,00441270,000000FF,?,0000003F,?,?,?,0044121C,000000FF,?,0000003F,?,?), ref: 003ABC36
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
              • String ID:
              • API String ID: 806657224-0
              • Opcode ID: a83e017ebfa583c7ffcb640edecbc894943974a66624c2d7e662a5c067b8cbdf
              • Instruction ID: a70586d58af01482d6a4abf00c796288b3b3ad6d49697b4eecde3224f6072a67
              • Opcode Fuzzy Hash: a83e017ebfa583c7ffcb640edecbc894943974a66624c2d7e662a5c067b8cbdf
              • Instruction Fuzzy Hash: 4131CF70904245DFCB16DFA9DC80929FBB8FF57320B1542AAE061EB2B2D7709D80CB54
              APIs
              • InternetReadFile.WININET(?,?,00000400,?), ref: 003ECE89
              • GetLastError.KERNEL32(?,00000000), ref: 003ECEEA
              • SetEvent.KERNEL32(?,?,00000000), ref: 003ECEFE
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ErrorEventFileInternetLastRead
              • String ID:
              • API String ID: 234945975-0
              • Opcode ID: 71cc866dd3e5808a6c82f6df456885c02121960f5f83bbcc857181488b5d74eb
              • Instruction ID: 530e2c5c539a506fde9fabf2b29bc0d8171ae77b327d9383faffbebf53c6d6be
              • Opcode Fuzzy Hash: 71cc866dd3e5808a6c82f6df456885c02121960f5f83bbcc857181488b5d74eb
              • Instruction Fuzzy Hash: CD21ED71510315EFDB22DFA6C989BAA77FCEB40305F10462EE542A2191E730EE068B64
              APIs
              • IsDebuggerPresent.KERNEL32 ref: 003A271A
              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 003A2724
              • UnhandledExceptionFilter.KERNEL32(?), ref: 003A2731
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ExceptionFilterUnhandled$DebuggerPresent
              • String ID:
              • API String ID: 3906539128-0
              • Opcode ID: db1445e693f5a1588b6ef6cf820aa93450735720e68ce18e3a5d53851010d2e7
              • Instruction ID: a8b7119b3e4d9ab69f1cbb0bbeafcd81da782a5e69cf1cd749077ca3665915b2
              • Opcode Fuzzy Hash: db1445e693f5a1588b6ef6cf820aa93450735720e68ce18e3a5d53851010d2e7
              • Instruction Fuzzy Hash: 1131B574911218ABCB22DF68DD897DDB7B8EF18310F5042EAE81CA7261E7749F818F45
              APIs
              • SetErrorMode.KERNEL32(00000001), ref: 003E51DA
              • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 003E5238
              • SetErrorMode.KERNEL32(00000000), ref: 003E52A1
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ErrorMode$DiskFreeSpace
              • String ID:
              • API String ID: 1682464887-0
              • Opcode ID: c58f0959abdcbaea84851be8d7b277d7c656d600ccb3b7aaaa177c3b21f628de
              • Instruction ID: dd0465e902c9b33fcfc1b617d12a4a3be9a25170db08317857293eaf3e2877a1
              • Opcode Fuzzy Hash: c58f0959abdcbaea84851be8d7b277d7c656d600ccb3b7aaaa177c3b21f628de
              • Instruction Fuzzy Hash: EE315A75A00518DFDB01DF54D884EADBBB4FF09318F048199E909AF3A2CB35E845CB90
              APIs
                • Part of subcall function 0038FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00390668
                • Part of subcall function 0038FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00390685
              • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 003D170D
              • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 003D173A
              • GetLastError.KERNEL32 ref: 003D174A
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
              • String ID:
              • API String ID: 577356006-0
              • Opcode ID: cd6311c2f974b10477d31b7b71f53c1483018129af72587eccd4da5a7023ba0c
              • Instruction ID: ac7bf3b5004ff352ef88d974e6e098edbff9f4b1787e839b3d89f44cc5076e92
              • Opcode Fuzzy Hash: cd6311c2f974b10477d31b7b71f53c1483018129af72587eccd4da5a7023ba0c
              • Instruction Fuzzy Hash: 6B11BCB2410304FFE718AF64ECC6D6AB7BDEB04714B20852EE45666251EB70BC418B64
              APIs
              • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 003DD608
              • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 003DD645
              • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 003DD650
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: CloseControlCreateDeviceFileHandle
              • String ID:
              • API String ID: 33631002-0
              • Opcode ID: 09a89594dc8d82f52183abaed1cc8b0723ac8f1b74ececc3472415d3139e5fbf
              • Instruction ID: 99e9d8cf0b87917ea1f6f1316794f63c0338953a1bfe9b9c50cb51cd3c415f7e
              • Opcode Fuzzy Hash: 09a89594dc8d82f52183abaed1cc8b0723ac8f1b74ececc3472415d3139e5fbf
              • Instruction Fuzzy Hash: 55117071E01228BBDB108F94AC44FAFBBBCEB45B50F108166F904E7290D2704A018BA1
              APIs
              • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 003D168C
              • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 003D16A1
              • FreeSid.ADVAPI32(?), ref: 003D16B1
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: AllocateCheckFreeInitializeMembershipToken
              • String ID:
              • API String ID: 3429775523-0
              • Opcode ID: 1f8539a05d9229b9c51949eec6d2a43041df4d154aa8657d9eec4b1a6033c8d2
              • Instruction ID: b930279d00f76221f51695b813dbe2d413fae36e52471e89c823b8f0f9ba6aa1
              • Opcode Fuzzy Hash: 1f8539a05d9229b9c51949eec6d2a43041df4d154aa8657d9eec4b1a6033c8d2
              • Instruction Fuzzy Hash: 73F0F471950309FBEB00DFE49D89AAEBBBCEB08604F504565E901E2181E774AA448A54
              APIs
              • GetCurrentProcess.KERNEL32(003A28E9,?,00394CBE,003A28E9,004388B8,0000000C,00394E15,003A28E9,00000002,00000000,?,003A28E9), ref: 00394D09
              • TerminateProcess.KERNEL32(00000000,?,00394CBE,003A28E9,004388B8,0000000C,00394E15,003A28E9,00000002,00000000,?,003A28E9), ref: 00394D10
              • ExitProcess.KERNEL32 ref: 00394D22
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Process$CurrentExitTerminate
              • String ID:
              • API String ID: 1703294689-0
              • Opcode ID: 727525433ca6c593f902dabe375353a145c555455255c28ba1769df85558bf7f
              • Instruction ID: 5cf7ab36d29e5cd17ff62f778cb295aea76951aceff56ee21ad39ad36adbcf1d
              • Opcode Fuzzy Hash: 727525433ca6c593f902dabe375353a145c555455255c28ba1769df85558bf7f
              • Instruction Fuzzy Hash: 6EE0B635010148EBCF16AF64DE49E593B69FB46781B118124FC059A133CB35DD42CA84
              APIs
              • GetUserNameW.ADVAPI32(?,?), ref: 003CD28C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: NameUser
              • String ID: X64
              • API String ID: 2645101109-893830106
              • Opcode ID: 6fc2836e945a1d412e64074a8b56b188a304fb2b78f511100353824a697fce9d
              • Instruction ID: c86503fa29fd8f1eaf037ed5b6856bf68428cd4b5c5b836e3988014252dc55e0
              • Opcode Fuzzy Hash: 6fc2836e945a1d412e64074a8b56b188a304fb2b78f511100353824a697fce9d
              • Instruction Fuzzy Hash: B5D0C9B480111DEACB95DB90DCC8DD9B37CBB04305F1006A5F106E2440D73095498F10
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
              • Instruction ID: 5814c38f54efa9f4def704ec1ef9251f459bbe89469c10d0992269545950e8de
              • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
              • Instruction Fuzzy Hash: 86021C71E102199BDF15CFA9C8806ADFBF1EF88314F25816AD919EB384D731AE418B94
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID:
              • String ID: Variable is not of type 'Object'.$p#D
              • API String ID: 0-543306404
              • Opcode ID: 12b61086da7303a93dc68e4e3216ad5989415a0a066bf739940c42dce0b5c8ca
              • Instruction ID: 90a6eafe8ee42d5402daa047d3d102d38883a190711b39a5679e2934a89c2e71
              • Opcode Fuzzy Hash: 12b61086da7303a93dc68e4e3216ad5989415a0a066bf739940c42dce0b5c8ca
              • Instruction Fuzzy Hash: 5F329D74910218DBDF2ADF90C984BEDB7B9BF05304F14906DE80AAF292D779AE45CB50
              APIs
              • FindFirstFileW.KERNEL32(?,?), ref: 003E6918
              • FindClose.KERNEL32(00000000), ref: 003E6961
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Find$CloseFileFirst
              • String ID:
              • API String ID: 2295610775-0
              • Opcode ID: d621abc8a39125672b0634fa4876bba41f1e59189dfe34760c0fa9c7dd778caf
              • Instruction ID: 8c328daed29f4b9ca0da5fccd8279cab3d97fd7b5f94cf3e31ffde7d91e162b3
              • Opcode Fuzzy Hash: d621abc8a39125672b0634fa4876bba41f1e59189dfe34760c0fa9c7dd778caf
              • Instruction Fuzzy Hash: 8B11BE316042509FC710DF2AC4C5A1ABBE4EF85328F15C6ADF4698F6A2C734EC05CB90
              APIs
              • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,003F4891,?,?,00000035,?), ref: 003E37E4
              • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,003F4891,?,?,00000035,?), ref: 003E37F4
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ErrorFormatLastMessage
              • String ID:
              • API String ID: 3479602957-0
              • Opcode ID: d9c19ee20c890de0f46408b1ea385854ebc70eadf7bb3a4554f43b3242555d40
              • Instruction ID: 7c42a82c864eca8d5b184e608ac5626a5ce2b23dcd9edee9215ac1266d2eee34
              • Opcode Fuzzy Hash: d9c19ee20c890de0f46408b1ea385854ebc70eadf7bb3a4554f43b3242555d40
              • Instruction Fuzzy Hash: 8FF0E5B06052296AEB2117678C8DFEB3AAEEFC4761F000379F509E36C1D9709904C6B0
              APIs
              • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 003DB25D
              • keybd_event.USER32(?,75C0C0D0,?,00000000), ref: 003DB270
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: InputSendkeybd_event
              • String ID:
              • API String ID: 3536248340-0
              • Opcode ID: 4127c0c73e7567a9794cd935aa4023c9458f74b7ee2c3ecf2380c6ae6f1dbd72
              • Instruction ID: d6ec40f6c4e4e12e79d252a11aeb3f146efef793cb3ba48ee9e34363074fe8f8
              • Opcode Fuzzy Hash: 4127c0c73e7567a9794cd935aa4023c9458f74b7ee2c3ecf2380c6ae6f1dbd72
              • Instruction Fuzzy Hash: 96F01D7580424EEBDB059FA0D805BAEBBB4FF04305F00841AF955A6191C37986119F94
              APIs
              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,003D11FC), ref: 003D10D4
              • CloseHandle.KERNEL32(?,?,003D11FC), ref: 003D10E9
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: AdjustCloseHandlePrivilegesToken
              • String ID:
              • API String ID: 81990902-0
              • Opcode ID: 579fb796e864cedeb2dbe014f92d2f2c1bea0c394e3491d6d103b0146beb0a99
              • Instruction ID: aec7aeb7dfbc2d76a1387b52224170bdc79552c654864d24cca6afaf0577df0c
              • Opcode Fuzzy Hash: 579fb796e864cedeb2dbe014f92d2f2c1bea0c394e3491d6d103b0146beb0a99
              • Instruction Fuzzy Hash: A5E04F32014700EFE7263B61FC05E7377A9EB04310B10892EF5A5844B1DB726CA0DB54
              APIs
              • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,003A6766,?,?,00000008,?,?,003AFEFE,00000000), ref: 003A6998
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ExceptionRaise
              • String ID:
              • API String ID: 3997070919-0
              • Opcode ID: d177585a9ba027a2817f4ff10f22b2ad0e1ac78c431f38b62f332b76337a3fe4
              • Instruction ID: 9347619974d8b255f29b107de54e37a4aa39f7ecc206f06e998e03bfc20f7bc9
              • Opcode Fuzzy Hash: d177585a9ba027a2817f4ff10f22b2ad0e1ac78c431f38b62f332b76337a3fe4
              • Instruction Fuzzy Hash: B4B14D71610608DFD716CF28C48AB657BE4FF46364F2A865CE899CF2A2C735D991CB40
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID: 0-3916222277
              • Opcode ID: ba6a6b2715c583a6794f77813e32fd4398c59edd78212b0062d6d47f2e51cc97
              • Instruction ID: b17ab067d47be915b947190d437ab16fb4efa72cdbaead4d80016f6fe38f6d6a
              • Opcode Fuzzy Hash: ba6a6b2715c583a6794f77813e32fd4398c59edd78212b0062d6d47f2e51cc97
              • Instruction Fuzzy Hash: C9127F759002299BCB25DF59C881BEEB7B5FF48310F1581AAE849EB251DB709E81CF90
              APIs
              • BlockInput.USER32(00000001), ref: 003EEABD
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: BlockInput
              • String ID:
              • API String ID: 3456056419-0
              • Opcode ID: c0ecb7c9cd328470562131f07203dcd8ff8c564d285d968642e5abcf77098423
              • Instruction ID: 570a2b34a770f4d4f40c057d7ebc404c9fa061b7eee188d6f3f05ce2eeeff5c3
              • Opcode Fuzzy Hash: c0ecb7c9cd328470562131f07203dcd8ff8c564d285d968642e5abcf77098423
              • Instruction Fuzzy Hash: 39E01A312102149FC721EF6AD844E9AF7E9AF99760F00842AFC49DB291DB74A8408B90
              APIs
              • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,003903EE), ref: 003909DA
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ExceptionFilterUnhandled
              • String ID:
              • API String ID: 3192549508-0
              • Opcode ID: 6d3746c7a4f2d4c51391624d7f7bf2b45618da74fc6d10359eb55c418aa31858
              • Instruction ID: b5dd6706bb4079ff3c6caec7e2549e6181ef73d668f00d482fab260dcc54f4c9
              • Opcode Fuzzy Hash: 6d3746c7a4f2d4c51391624d7f7bf2b45618da74fc6d10359eb55c418aa31858
              • Instruction Fuzzy Hash:
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID:
              • String ID: 0
              • API String ID: 0-4108050209
              • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
              • Instruction ID: 68e6931895f59b8c65e78455a1c4e3d31123e43214a2d6e7435ef5cad61a6b9d
              • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
              • Instruction Fuzzy Hash: FD51647263C6095BDF3B962C885FBFE2389DB42344F190509E882DB6C2CB15EE02D356
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID:
              • String ID: 0&D
              • API String ID: 0-1766144559
              • Opcode ID: 9eb90a74bbbde5a7a86f0c05788cf743c44086aabc8baa44e89e88795e6ef555
              • Instruction ID: 82f712fbb637d8a2c2cf3b206451ea714eb8a2fb46818a48407c546c517d8a2d
              • Opcode Fuzzy Hash: 9eb90a74bbbde5a7a86f0c05788cf743c44086aabc8baa44e89e88795e6ef555
              • Instruction Fuzzy Hash: DA21D5322206158BDB28CF79C92267E73E9A754310F558A2EE4A7C77D0DE79AD04CB84
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 90ac7d6e7f30e37c3446d114325da222d0b0c494b043a693aa74a7a0c5d3f55a
              • Instruction ID: f03093341c4f252e7136cabe237b07c8ae0dadf4bd03b3310b3d948966d7a886
              • Opcode Fuzzy Hash: 90ac7d6e7f30e37c3446d114325da222d0b0c494b043a693aa74a7a0c5d3f55a
              • Instruction Fuzzy Hash: 0F324322D29F014DD7239635DD62336A68DEFB73C5F15C737E81AB5AA9EB29C4834100
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a34ba2489718056df8d6bd0c65bb35a2c9c1fdf50657c583b15a53834c1a6d60
              • Instruction ID: 7cfd96761d1e099dc1616e1690ecb8cc5ba219d4317f8f4429e343c1a2616380
              • Opcode Fuzzy Hash: a34ba2489718056df8d6bd0c65bb35a2c9c1fdf50657c583b15a53834c1a6d60
              • Instruction Fuzzy Hash: 21320732A202058BDF26DF28C494F7D77B1EB45300F2AA5AED84EDB691D630DD82DB51
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 349125c0e08ea1e6679e5cf387c069cbf9a6e697d77b14f98cd3b22093326309
              • Instruction ID: d56357f0f694835b0dafba554834b52c53b6308c1d52ffdaa477129be629e046
              • Opcode Fuzzy Hash: 349125c0e08ea1e6679e5cf387c069cbf9a6e697d77b14f98cd3b22093326309
              • Instruction Fuzzy Hash: 6222A070A04609DFDF26DF64C881BEEB3F5FF44304F148529E81AAB691E739A915CB50
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c3426ea67079601a8eb7ac94725d6372179c771409a689e6d5817b9619c3bc10
              • Instruction ID: 90964afb922239fec9df2249a5dc86f811e96bdb2fa3a1bc803d28adc8e45d9d
              • Opcode Fuzzy Hash: c3426ea67079601a8eb7ac94725d6372179c771409a689e6d5817b9619c3bc10
              • Instruction Fuzzy Hash: 0402D7B1E00209EFDF16DF58D881AEDB7B5FF44304F118169E91A9B691EB35AE10CB81
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
              • Instruction ID: 8a34bd5e2cdbed5fc921fc4d1c3445215f82ac15136451a5b11440f5a7f99633
              • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
              • Instruction Fuzzy Hash: B79176726090A34AEF6F463E857403EFFE15A923A131B079ED4F2EA5C5FE24C954D620
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
              • Instruction ID: 267bb14bb27b007c2160dcd993c27a19db5ac3c7471acf12ae4bd451ed97b9d1
              • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
              • Instruction Fuzzy Hash: D69165722090A34EEF2F467A857403EFFE55A923A231B079DD4F2DA5C1FE24C954D620
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: bfe1f1a392bd09d49f0249a906ca26a82b5dbce21dda395fa51e1f7e075e5b69
              • Instruction ID: d16b990d7c38507fd9718726163c0a6524eaf7ff2920a5661c9432da06463014
              • Opcode Fuzzy Hash: bfe1f1a392bd09d49f0249a906ca26a82b5dbce21dda395fa51e1f7e075e5b69
              • Instruction Fuzzy Hash: 6161773123C34A66EE3B9A2C8C96BBF2399DF82700F15091AE843DF7D1DA119E428755
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
              • Instruction ID: 38af914f1ddf18cef05fc7cfc59af9f97eb85b68c3828489e750adb2491d6493
              • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
              • Instruction Fuzzy Hash: EB81847260C0A309EF6F427A853403EFFE15A923A131B079ED4F2DB5C5EE24C554E660
              Memory Dump Source
              • Source File: 00000000.00000002.1641185508.00000000010F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_10f0000_whiteee.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
              • Instruction ID: f27b940b11b936faea57958cb3a04e9ea42046f10146e705db9e3bd0425938b3
              • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
              • Instruction Fuzzy Hash: 1D41D3B1D1051CEBCF48CFADC991AEEBBF2AF88201F548299D516AB345D730AB41DB40
              Memory Dump Source
              • Source File: 00000000.00000002.1641185508.00000000010F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_10f0000_whiteee.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
              • Instruction ID: d51e6121f2559b797ef65acb2ac912ec7965c1e0d37ab05e17cd2e11d163e6fc
              • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
              • Instruction Fuzzy Hash: 1B019278A00109EFCB45DF98C5919AEF7F5FB48310F2085D9E949AB741D730AE41DB90
              Memory Dump Source
              • Source File: 00000000.00000002.1641185508.00000000010F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_10f0000_whiteee.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
              • Instruction ID: 35a51185acb9778d6120990eae1056642cceb7d6b6ef3ae97187cec3b531ec05
              • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
              • Instruction Fuzzy Hash: 7F019279A00109EFCB45DF98C5919AEF7F5FB88720F208599E949AB741D730AE41DB80
              Memory Dump Source
              • Source File: 00000000.00000002.1641185508.00000000010F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_10f0000_whiteee.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
              • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
              • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
              • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
              APIs
              • DeleteObject.GDI32(00000000), ref: 003F2B30
              • DeleteObject.GDI32(00000000), ref: 003F2B43
              • DestroyWindow.USER32 ref: 003F2B52
              • GetDesktopWindow.USER32 ref: 003F2B6D
              • GetWindowRect.USER32(00000000), ref: 003F2B74
              • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 003F2CA3
              • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 003F2CB1
              • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003F2CF8
              • GetClientRect.USER32(00000000,?), ref: 003F2D04
              • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 003F2D40
              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003F2D62
              • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003F2D75
              • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003F2D80
              • GlobalLock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003F2D89
              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003F2D98
              • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003F2DA1
              • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003F2DA8
              • GlobalFree.KERNEL32(00000000), ref: 003F2DB3
              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003F2DC5
              • OleLoadPicture.OLEAUT32(?,00000000,00000000,0040FC38,00000000), ref: 003F2DDB
              • GlobalFree.KERNEL32(00000000), ref: 003F2DEB
              • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 003F2E11
              • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 003F2E30
              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003F2E52
              • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003F303F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
              • String ID: $AutoIt v3$DISPLAY$static
              • API String ID: 2211948467-2373415609
              • Opcode ID: a1a8b57565c3eb32e9ff8029a53ec46ce666e52b09dfdd3ad19b24ef3dc63d21
              • Instruction ID: c28fbdbd143c8152281c413c49d916f051866bed941532a8d83d22337e790c9c
              • Opcode Fuzzy Hash: a1a8b57565c3eb32e9ff8029a53ec46ce666e52b09dfdd3ad19b24ef3dc63d21
              • Instruction Fuzzy Hash: ED028E71500209EFDB15DFA4CD89EAE7BB9EF49710F108668F915AB2A1CB34AD01CF64
              APIs
              • SetTextColor.GDI32(?,00000000), ref: 0040712F
              • GetSysColorBrush.USER32(0000000F), ref: 00407160
              • GetSysColor.USER32(0000000F), ref: 0040716C
              • SetBkColor.GDI32(?,000000FF), ref: 00407186
              • SelectObject.GDI32(?,?), ref: 00407195
              • InflateRect.USER32(?,000000FF,000000FF), ref: 004071C0
              • GetSysColor.USER32(00000010), ref: 004071C8
              • CreateSolidBrush.GDI32(00000000), ref: 004071CF
              • FrameRect.USER32(?,?,00000000), ref: 004071DE
              • DeleteObject.GDI32(00000000), ref: 004071E5
              • InflateRect.USER32(?,000000FE,000000FE), ref: 00407230
              • FillRect.USER32(?,?,?), ref: 00407262
              • GetWindowLongW.USER32(?,000000F0), ref: 00407284
                • Part of subcall function 004073E8: GetSysColor.USER32(00000012), ref: 00407421
                • Part of subcall function 004073E8: SetTextColor.GDI32(?,?), ref: 00407425
                • Part of subcall function 004073E8: GetSysColorBrush.USER32(0000000F), ref: 0040743B
                • Part of subcall function 004073E8: GetSysColor.USER32(0000000F), ref: 00407446
                • Part of subcall function 004073E8: GetSysColor.USER32(00000011), ref: 00407463
                • Part of subcall function 004073E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00407471
                • Part of subcall function 004073E8: SelectObject.GDI32(?,00000000), ref: 00407482
                • Part of subcall function 004073E8: SetBkColor.GDI32(?,00000000), ref: 0040748B
                • Part of subcall function 004073E8: SelectObject.GDI32(?,?), ref: 00407498
                • Part of subcall function 004073E8: InflateRect.USER32(?,000000FF,000000FF), ref: 004074B7
                • Part of subcall function 004073E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004074CE
                • Part of subcall function 004073E8: GetWindowLongW.USER32(00000000,000000F0), ref: 004074DB
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
              • String ID:
              • API String ID: 4124339563-0
              • Opcode ID: ba844edcc8be374d037817b6ce93f3f22598f1397b4d99fbcca277c1f3b49687
              • Instruction ID: 5a0219a2844545f5472c85f21dba40617929a50c7b06e402a84b36353cf11fc4
              • Opcode Fuzzy Hash: ba844edcc8be374d037817b6ce93f3f22598f1397b4d99fbcca277c1f3b49687
              • Instruction Fuzzy Hash: 75A1AF72408311FFD7009F60DD88E5B7BA9FB89320F100B29F962A61E1D735E944CB96
              APIs
              • DestroyWindow.USER32(?,?), ref: 00388E14
              • SendMessageW.USER32(?,00001308,?,00000000), ref: 003C6AC5
              • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 003C6AFE
              • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 003C6F43
                • Part of subcall function 00388F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00388BE8,?,00000000,?,?,?,?,00388BBA,00000000,?), ref: 00388FC5
              • SendMessageW.USER32(?,00001053), ref: 003C6F7F
              • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 003C6F96
              • ImageList_Destroy.COMCTL32(00000000,?), ref: 003C6FAC
              • ImageList_Destroy.COMCTL32(00000000,?), ref: 003C6FB7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
              • String ID: 0
              • API String ID: 2760611726-4108050209
              • Opcode ID: 00e6b5a874eb2961b4165721f6c04d0e47e8494f6c5fa7bcbcc0bbf06b449003
              • Instruction ID: 5d7aff4cfd00febeb795299a350f2b7a8131f3519a52b437666a696b0e83c07e
              • Opcode Fuzzy Hash: 00e6b5a874eb2961b4165721f6c04d0e47e8494f6c5fa7bcbcc0bbf06b449003
              • Instruction Fuzzy Hash: 1912BB34200211EFDB22DF24C985FAAB7E5FB49300F55856DE485DB661CB32EC92CB95
              APIs
              • DestroyWindow.USER32(00000000), ref: 003F273E
              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 003F286A
              • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 003F28A9
              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 003F28B9
              • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 003F2900
              • GetClientRect.USER32(00000000,?), ref: 003F290C
              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 003F2955
              • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 003F2964
              • GetStockObject.GDI32(00000011), ref: 003F2974
              • SelectObject.GDI32(00000000,00000000), ref: 003F2978
              • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 003F2988
              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 003F2991
              • DeleteDC.GDI32(00000000), ref: 003F299A
              • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 003F29C6
              • SendMessageW.USER32(00000030,00000000,00000001), ref: 003F29DD
              • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 003F2A1D
              • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 003F2A31
              • SendMessageW.USER32(00000404,00000001,00000000), ref: 003F2A42
              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 003F2A77
              • GetStockObject.GDI32(00000011), ref: 003F2A82
              • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 003F2A8D
              • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 003F2A97
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
              • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
              • API String ID: 2910397461-517079104
              • Opcode ID: 2f4f5e8735dbe891382164c8dfaeec376a86ec3b569a9dac567f7b4098141ed1
              • Instruction ID: 2527da5dc622be26aaee47944e6df697338d539296fb9ba84997b1be980edc5e
              • Opcode Fuzzy Hash: 2f4f5e8735dbe891382164c8dfaeec376a86ec3b569a9dac567f7b4098141ed1
              • Instruction Fuzzy Hash: B0B15D75A40219EFEB14DF68CD85FAE7BA9EB09710F108215FA14EB2A0D774AD40CB94
              APIs
              • SetErrorMode.KERNEL32(00000001), ref: 003E4AED
              • GetDriveTypeW.KERNEL32(?,0040CB68,?,\\.\,0040CC08), ref: 003E4BCA
              • SetErrorMode.KERNEL32(00000000,0040CB68,?,\\.\,0040CC08), ref: 003E4D36
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ErrorMode$DriveType
              • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
              • API String ID: 2907320926-4222207086
              • Opcode ID: 30740e8899a3e89d0ccd46c26ef35a025b42a3519adcd9445774ab61f9af6c20
              • Instruction ID: fec868422ce7e6c6238522cfad895d29307914473605ce9e9a90f52e90443e75
              • Opcode Fuzzy Hash: 30740e8899a3e89d0ccd46c26ef35a025b42a3519adcd9445774ab61f9af6c20
              • Instruction Fuzzy Hash: D961E530601256BBCB16DF25C981A6977B4AB0C300F31D216F80AABAD5DB39ED41DB45
              APIs
              • GetSysColor.USER32(00000012), ref: 00407421
              • SetTextColor.GDI32(?,?), ref: 00407425
              • GetSysColorBrush.USER32(0000000F), ref: 0040743B
              • GetSysColor.USER32(0000000F), ref: 00407446
              • CreateSolidBrush.GDI32(?), ref: 0040744B
              • GetSysColor.USER32(00000011), ref: 00407463
              • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00407471
              • SelectObject.GDI32(?,00000000), ref: 00407482
              • SetBkColor.GDI32(?,00000000), ref: 0040748B
              • SelectObject.GDI32(?,?), ref: 00407498
              • InflateRect.USER32(?,000000FF,000000FF), ref: 004074B7
              • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004074CE
              • GetWindowLongW.USER32(00000000,000000F0), ref: 004074DB
              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0040752A
              • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00407554
              • InflateRect.USER32(?,000000FD,000000FD), ref: 00407572
              • DrawFocusRect.USER32(?,?), ref: 0040757D
              • GetSysColor.USER32(00000011), ref: 0040758E
              • SetTextColor.GDI32(?,00000000), ref: 00407596
              • DrawTextW.USER32(?,004070F5,000000FF,?,00000000), ref: 004075A8
              • SelectObject.GDI32(?,?), ref: 004075BF
              • DeleteObject.GDI32(?), ref: 004075CA
              • SelectObject.GDI32(?,?), ref: 004075D0
              • DeleteObject.GDI32(?), ref: 004075D5
              • SetTextColor.GDI32(?,?), ref: 004075DB
              • SetBkColor.GDI32(?,?), ref: 004075E5
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
              • String ID:
              • API String ID: 1996641542-0
              • Opcode ID: 6e2be2db66c10e64d623eb17986f4e2ce1f1508808ba7e6b2ec1fb4536fc0b3a
              • Instruction ID: 249748302a50eb2bb577df7cbca854678750fe431ff7c9ccc24694f2bc19189e
              • Opcode Fuzzy Hash: 6e2be2db66c10e64d623eb17986f4e2ce1f1508808ba7e6b2ec1fb4536fc0b3a
              • Instruction Fuzzy Hash: 21615C76D00218FFDB019FA4DD89AEE7BB9EB09320F104225F911BB2E1D675A940CF94
              APIs
              • GetCursorPos.USER32(?), ref: 00401128
              • GetDesktopWindow.USER32 ref: 0040113D
              • GetWindowRect.USER32(00000000), ref: 00401144
              • GetWindowLongW.USER32(?,000000F0), ref: 00401199
              • DestroyWindow.USER32(?), ref: 004011B9
              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 004011ED
              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0040120B
              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0040121D
              • SendMessageW.USER32(00000000,00000421,?,?), ref: 00401232
              • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00401245
              • IsWindowVisible.USER32(00000000), ref: 004012A1
              • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 004012BC
              • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 004012D0
              • GetWindowRect.USER32(00000000,?), ref: 004012E8
              • MonitorFromPoint.USER32(?,?,00000002), ref: 0040130E
              • GetMonitorInfoW.USER32(00000000,?), ref: 00401328
              • CopyRect.USER32(?,?), ref: 0040133F
              • SendMessageW.USER32(00000000,00000412,00000000), ref: 004013AA
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
              • String ID: ($0$tooltips_class32
              • API String ID: 698492251-4156429822
              • Opcode ID: b6c487387bccca443c131a9de384e8a58ae91b041110afee308e8a233bc89e87
              • Instruction ID: 4db00ff6455ac356d6b5aab77919bf3bb66ee534b4f427abb463aa0c2aa3352e
              • Opcode Fuzzy Hash: b6c487387bccca443c131a9de384e8a58ae91b041110afee308e8a233bc89e87
              • Instruction Fuzzy Hash: AEB1AA71604341AFD714DF64C984B6BBBE4FF89314F008A2DF999AB2A1C735E844CB96
              APIs
              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00388968
              • GetSystemMetrics.USER32(00000007), ref: 00388970
              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0038899B
              • GetSystemMetrics.USER32(00000008), ref: 003889A3
              • GetSystemMetrics.USER32(00000004), ref: 003889C8
              • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 003889E5
              • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 003889F5
              • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00388A28
              • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00388A3C
              • GetClientRect.USER32(00000000,000000FF), ref: 00388A5A
              • GetStockObject.GDI32(00000011), ref: 00388A76
              • SendMessageW.USER32(00000000,00000030,00000000), ref: 00388A81
                • Part of subcall function 0038912D: GetCursorPos.USER32(?), ref: 00389141
                • Part of subcall function 0038912D: ScreenToClient.USER32(00000000,?), ref: 0038915E
                • Part of subcall function 0038912D: GetAsyncKeyState.USER32(00000001), ref: 00389183
                • Part of subcall function 0038912D: GetAsyncKeyState.USER32(00000002), ref: 0038919D
              • SetTimer.USER32(00000000,00000000,00000028,003890FC), ref: 00388AA8
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
              • String ID: AutoIt v3 GUI
              • API String ID: 1458621304-248962490
              • Opcode ID: 83c000e093dde1b2b7475b1841d1106c70b60c74c68dbea3fd0243b3c094d805
              • Instruction ID: 8f078e55cc8b598429b978812ee1656cecf737e34692058e77b6e50a6a525053
              • Opcode Fuzzy Hash: 83c000e093dde1b2b7475b1841d1106c70b60c74c68dbea3fd0243b3c094d805
              • Instruction Fuzzy Hash: BCB18E75A00209EFDB15EF68CD85FAE3BB5FB48314F114229FA15EB290DB34A840CB54
              APIs
                • Part of subcall function 003D10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 003D1114
                • Part of subcall function 003D10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,003D0B9B,?,?,?), ref: 003D1120
                • Part of subcall function 003D10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,003D0B9B,?,?,?), ref: 003D112F
                • Part of subcall function 003D10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,003D0B9B,?,?,?), ref: 003D1136
                • Part of subcall function 003D10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 003D114D
              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 003D0DF5
              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 003D0E29
              • GetLengthSid.ADVAPI32(?), ref: 003D0E40
              • GetAce.ADVAPI32(?,00000000,?), ref: 003D0E7A
              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 003D0E96
              • GetLengthSid.ADVAPI32(?), ref: 003D0EAD
              • GetProcessHeap.KERNEL32(00000008,00000008), ref: 003D0EB5
              • HeapAlloc.KERNEL32(00000000), ref: 003D0EBC
              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 003D0EDD
              • CopySid.ADVAPI32(00000000), ref: 003D0EE4
              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 003D0F13
              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 003D0F35
              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 003D0F47
              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 003D0F6E
              • HeapFree.KERNEL32(00000000), ref: 003D0F75
              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 003D0F7E
              • HeapFree.KERNEL32(00000000), ref: 003D0F85
              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 003D0F8E
              • HeapFree.KERNEL32(00000000), ref: 003D0F95
              • GetProcessHeap.KERNEL32(00000000,?), ref: 003D0FA1
              • HeapFree.KERNEL32(00000000), ref: 003D0FA8
                • Part of subcall function 003D1193: GetProcessHeap.KERNEL32(00000008,003D0BB1,?,00000000,?,003D0BB1,?), ref: 003D11A1
                • Part of subcall function 003D1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,003D0BB1,?), ref: 003D11A8
                • Part of subcall function 003D1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,003D0BB1,?), ref: 003D11B7
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
              • String ID:
              • API String ID: 4175595110-0
              • Opcode ID: 6128424d90f2d888570fa8031e1c8495e9b619a0fca7e54a1dc252f958f85a7a
              • Instruction ID: 27cc8081b18245b3f010d0ccec3e9db3af7c6eddfa990ce6906713072d12f969
              • Opcode Fuzzy Hash: 6128424d90f2d888570fa8031e1c8495e9b619a0fca7e54a1dc252f958f85a7a
              • Instruction Fuzzy Hash: FE715E7290020AEBDF259FA4ED48FEEBBBCBF04700F154226F959B6291D7719905CB60
              APIs
              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 003FC4BD
              • RegCreateKeyExW.ADVAPI32(?,?,00000000,0040CC08,00000000,?,00000000,?,?), ref: 003FC544
              • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 003FC5A4
              • _wcslen.LIBCMT ref: 003FC5F4
              • _wcslen.LIBCMT ref: 003FC66F
              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 003FC6B2
              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 003FC7C1
              • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 003FC84D
              • RegCloseKey.ADVAPI32(?), ref: 003FC881
              • RegCloseKey.ADVAPI32(00000000), ref: 003FC88E
              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 003FC960
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Value$Close$_wcslen$ConnectCreateRegistry
              • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
              • API String ID: 9721498-966354055
              • Opcode ID: 2821f6a06e329ee1866c31e8b57310bbbc3cef0e2daa7383429438551a398f18
              • Instruction ID: a386218a6d989b129820f5524cecf3a8cade6d23b400971cecb0eb74e8510b38
              • Opcode Fuzzy Hash: 2821f6a06e329ee1866c31e8b57310bbbc3cef0e2daa7383429438551a398f18
              • Instruction Fuzzy Hash: AF127A352142049FD726DF14C981E2AB7E5FF89724F15885CF98A9B3A2DB35EC41CB81
              APIs
              • CharUpperBuffW.USER32(?,?), ref: 004009C6
              • _wcslen.LIBCMT ref: 00400A01
              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00400A54
              • _wcslen.LIBCMT ref: 00400A8A
              • _wcslen.LIBCMT ref: 00400B06
              • _wcslen.LIBCMT ref: 00400B81
                • Part of subcall function 0038F9F2: _wcslen.LIBCMT ref: 0038F9FD
                • Part of subcall function 003D2BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 003D2BFA
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: _wcslen$MessageSend$BuffCharUpper
              • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
              • API String ID: 1103490817-4258414348
              • Opcode ID: 762171f79155186b750d8c10cef0e3970e240428850d368fdc04d110d60244f1
              • Instruction ID: 26537bcb6a87feec2c5c32059ef5b8e605aaa25c83262fe7aa7fc98056d3575d
              • Opcode Fuzzy Hash: 762171f79155186b750d8c10cef0e3970e240428850d368fdc04d110d60244f1
              • Instruction Fuzzy Hash: 90E1B1312083019FC725EF24C450A2AB7E1FF99314F14896EF8996B3A2D738ED45CB96
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: _wcslen$BuffCharUpper
              • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
              • API String ID: 1256254125-909552448
              • Opcode ID: 49234329fa84b1bf98e2c64eabccc315411827bc5004f0335df78ba62f81b765
              • Instruction ID: b1d7a42f8f1d146565351cdc43824ebcebec11711788300f3a3eb8e270fcd70c
              • Opcode Fuzzy Hash: 49234329fa84b1bf98e2c64eabccc315411827bc5004f0335df78ba62f81b765
              • Instruction Fuzzy Hash: 317134326A012E8BCF22DE3CCA415BE3395AF64750F226525FE569B284E735DD45C3A0
              APIs
              • _wcslen.LIBCMT ref: 0040835A
              • _wcslen.LIBCMT ref: 0040836E
              • _wcslen.LIBCMT ref: 00408391
              • _wcslen.LIBCMT ref: 004083B4
              • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 004083F2
              • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,0040361A,?), ref: 0040844E
              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00408487
              • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 004084CA
              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00408501
              • FreeLibrary.KERNEL32(?), ref: 0040850D
              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0040851D
              • DestroyIcon.USER32(?), ref: 0040852C
              • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00408549
              • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00408555
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
              • String ID: .dll$.exe$.icl
              • API String ID: 799131459-1154884017
              • Opcode ID: 93c2b91e48ecb886318e3fcf96d075782c54751107596ecede9c3f658444b50c
              • Instruction ID: 1206b88f5ca36cd8920b39e6650c1140bfddf5b708e04e6bb1fb476dc745c3ee
              • Opcode Fuzzy Hash: 93c2b91e48ecb886318e3fcf96d075782c54751107596ecede9c3f658444b50c
              • Instruction Fuzzy Hash: DC61F371500215FAEB14DF64CD81FBF77A8BB04B21F10462AF855EA1D1EB78A941CBA4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID:
              • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
              • API String ID: 0-1645009161
              • Opcode ID: 3d6eddb3171e090279e4ff7048c915e1baa9dd8b7b0c5383dbd00a0b0bd7983e
              • Instruction ID: 9ef74b186200f0d027563ca87feb0cd7ee6ab270b8cf3bfc2070424e1465630d
              • Opcode Fuzzy Hash: 3d6eddb3171e090279e4ff7048c915e1baa9dd8b7b0c5383dbd00a0b0bd7983e
              • Instruction Fuzzy Hash: AA810571A04205BBDF37AF64CC82FBE37A8AF55300F118025F909AE596EB79D911C7A1
              APIs
              • LoadIconW.USER32(00000063), ref: 003D5A2E
              • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 003D5A40
              • SetWindowTextW.USER32(?,?), ref: 003D5A57
              • GetDlgItem.USER32(?,000003EA), ref: 003D5A6C
              • SetWindowTextW.USER32(00000000,?), ref: 003D5A72
              • GetDlgItem.USER32(?,000003E9), ref: 003D5A82
              • SetWindowTextW.USER32(00000000,?), ref: 003D5A88
              • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 003D5AA9
              • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 003D5AC3
              • GetWindowRect.USER32(?,?), ref: 003D5ACC
              • _wcslen.LIBCMT ref: 003D5B33
              • SetWindowTextW.USER32(?,?), ref: 003D5B6F
              • GetDesktopWindow.USER32 ref: 003D5B75
              • GetWindowRect.USER32(00000000), ref: 003D5B7C
              • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 003D5BD3
              • GetClientRect.USER32(?,?), ref: 003D5BE0
              • PostMessageW.USER32(?,00000005,00000000,?), ref: 003D5C05
              • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 003D5C2F
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
              • String ID:
              • API String ID: 895679908-0
              • Opcode ID: 5cc857dcc7b3c26afd8690927009eff3511218ba33c7210e5ff3a807390dbe4e
              • Instruction ID: 79e086e9bf647b13c0af72b0acf918dc473c07f744524da717ae3c73f49d7eae
              • Opcode Fuzzy Hash: 5cc857dcc7b3c26afd8690927009eff3511218ba33c7210e5ff3a807390dbe4e
              • Instruction Fuzzy Hash: 03719132900B05DFDB21DFA8DE85A6EBBF5FF48704F104A2AE142A76A0D775E940CB54
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: _wcslen
              • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT$[C
              • API String ID: 176396367-267077460
              • Opcode ID: 671263a3c58f278ccc7900a98be3932e78f80276d02c01052ecd8784645c243c
              • Instruction ID: 60092ddadbdc9d20dc3d3cfac0e4498d777ebf089f57c444b5b2cc04b5d9d2f0
              • Opcode Fuzzy Hash: 671263a3c58f278ccc7900a98be3932e78f80276d02c01052ecd8784645c243c
              • Instruction Fuzzy Hash: 30E1F433A00516ABCF169F68E451BEEFBB5BF44710F15812BE456B7340DB30AE858791
              APIs
              • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 003900C6
                • Part of subcall function 003900ED: InitializeCriticalSectionAndSpinCount.KERNEL32(0044070C,00000FA0,D7B7B4D0,?,?,?,?,003B23B3,000000FF), ref: 0039011C
                • Part of subcall function 003900ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,003B23B3,000000FF), ref: 00390127
                • Part of subcall function 003900ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,003B23B3,000000FF), ref: 00390138
                • Part of subcall function 003900ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 0039014E
                • Part of subcall function 003900ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 0039015C
                • Part of subcall function 003900ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 0039016A
                • Part of subcall function 003900ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00390195
                • Part of subcall function 003900ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 003901A0
              • ___scrt_fastfail.LIBCMT ref: 003900E7
                • Part of subcall function 003900A3: __onexit.LIBCMT ref: 003900A9
              Strings
              • InitializeConditionVariable, xrefs: 00390148
              • kernel32.dll, xrefs: 00390133
              • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00390122
              • SleepConditionVariableCS, xrefs: 00390154
              • WakeAllConditionVariable, xrefs: 00390162
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
              • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
              • API String ID: 66158676-1714406822
              • Opcode ID: 1d2d1fbafac12e4f4844b76805da8eabb03595ecf409a40152c01319e69a6f7c
              • Instruction ID: 75ef4c53ad440f99d60f67f094d24ba1ba45a87fac5cbe13958810509228f606
              • Opcode Fuzzy Hash: 1d2d1fbafac12e4f4844b76805da8eabb03595ecf409a40152c01319e69a6f7c
              • Instruction Fuzzy Hash: EA213B36644710EFEB266BA4AC49B6A7394DF05B51F11023AF901FB6D1DB789C008A99
              APIs
              • CharLowerBuffW.USER32(00000000,00000000,0040CC08), ref: 003E4527
              • _wcslen.LIBCMT ref: 003E453B
              • _wcslen.LIBCMT ref: 003E4599
              • _wcslen.LIBCMT ref: 003E45F4
              • _wcslen.LIBCMT ref: 003E463F
              • _wcslen.LIBCMT ref: 003E46A7
                • Part of subcall function 0038F9F2: _wcslen.LIBCMT ref: 0038F9FD
              • GetDriveTypeW.KERNEL32(?,00436BF0,00000061), ref: 003E4743
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: _wcslen$BuffCharDriveLowerType
              • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
              • API String ID: 2055661098-1000479233
              • Opcode ID: dbe712b4b0181933c5ec87d4afb11089a0083491a7f7105a672ccb737fdb8575
              • Instruction ID: d8b31c14072057ecec8caba71726fd7aa4746f93a6b1f02fe52acd815c9a82d6
              • Opcode Fuzzy Hash: dbe712b4b0181933c5ec87d4afb11089a0083491a7f7105a672ccb737fdb8575
              • Instruction Fuzzy Hash: BDB117316083629FC712DF29C890A6EB7E5BFA9710F518A1DF496CB2D1D734D844CB92
              APIs
                • Part of subcall function 00389BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00389BB2
              • DragQueryPoint.SHELL32(?,?), ref: 00409147
                • Part of subcall function 00407674: ClientToScreen.USER32(?,?), ref: 0040769A
                • Part of subcall function 00407674: GetWindowRect.USER32(?,?), ref: 00407710
                • Part of subcall function 00407674: PtInRect.USER32(?,?,00408B89), ref: 00407720
              • SendMessageW.USER32(?,000000B0,?,?), ref: 004091B0
              • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 004091BB
              • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 004091DE
              • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00409225
              • SendMessageW.USER32(?,000000B0,?,?), ref: 0040923E
              • SendMessageW.USER32(?,000000B1,?,?), ref: 00409255
              • SendMessageW.USER32(?,000000B1,?,?), ref: 00409277
              • DragFinish.SHELL32(?), ref: 0040927E
              • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00409371
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
              • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$p#D
              • API String ID: 221274066-33073620
              • Opcode ID: 714f737cee4fd92694c5a6cc0e54b249cd8b7cca9049557ee2d1722245fbacdf
              • Instruction ID: 66f34f870fdc282f259b61567643d61655c435dba3f55ffee9a9c70eeaba94ef
              • Opcode Fuzzy Hash: 714f737cee4fd92694c5a6cc0e54b249cd8b7cca9049557ee2d1722245fbacdf
              • Instruction Fuzzy Hash: 91618A71108301AFD712DF60CC85EAFBBE8EF89750F004A2EF595A61A1DB349A49CB56
              APIs
              • _wcslen.LIBCMT ref: 003FB198
              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 003FB1B0
              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 003FB1D4
              • _wcslen.LIBCMT ref: 003FB200
              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 003FB214
              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 003FB236
              • _wcslen.LIBCMT ref: 003FB332
                • Part of subcall function 003E05A7: GetStdHandle.KERNEL32(000000F6), ref: 003E05C6
              • _wcslen.LIBCMT ref: 003FB34B
              • _wcslen.LIBCMT ref: 003FB366
              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 003FB3B6
              • GetLastError.KERNEL32(00000000), ref: 003FB407
              • CloseHandle.KERNEL32(?), ref: 003FB439
              • CloseHandle.KERNEL32(00000000), ref: 003FB44A
              • CloseHandle.KERNEL32(00000000), ref: 003FB45C
              • CloseHandle.KERNEL32(00000000), ref: 003FB46E
              • CloseHandle.KERNEL32(?), ref: 003FB4E3
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
              • String ID:
              • API String ID: 2178637699-0
              • Opcode ID: 7929cea1e73eaea087e81d27b574c8431bf575b5ceffefdefb74b6619f828d73
              • Instruction ID: 56eb9d81d0d6d903536d108c25512100dd793fbc1ebaff9e5f1e2c2835e57b1f
              • Opcode Fuzzy Hash: 7929cea1e73eaea087e81d27b574c8431bf575b5ceffefdefb74b6619f828d73
              • Instruction Fuzzy Hash: FEF19A71608304DFC726EF24C881B2ABBE5AF85714F15895DF9999F2A2CB35EC40CB52
              APIs
              • GetMenuItemCount.USER32(00441990), ref: 003B2F8D
              • GetMenuItemCount.USER32(00441990), ref: 003B303D
              • GetCursorPos.USER32(?), ref: 003B3081
              • SetForegroundWindow.USER32(00000000), ref: 003B308A
              • TrackPopupMenuEx.USER32(00441990,00000000,?,00000000,00000000,00000000), ref: 003B309D
              • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 003B30A9
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
              • String ID: 0
              • API String ID: 36266755-4108050209
              • Opcode ID: cb48625bc8cc8b5495e3421df22cd4a6fafcef6e99b593bb4562b9758d65275f
              • Instruction ID: c6a94a58d88b607e56a6edce01c4c6088181736feeeb99a349ea6a6147a51fe2
              • Opcode Fuzzy Hash: cb48625bc8cc8b5495e3421df22cd4a6fafcef6e99b593bb4562b9758d65275f
              • Instruction Fuzzy Hash: FC711771644215BEEB329F24CC89FEABF68FF04328F204316F6196A5E1C7B1A910DB50
              APIs
              • DestroyWindow.USER32(?,?), ref: 00406DEB
                • Part of subcall function 00376B57: _wcslen.LIBCMT ref: 00376B6A
              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00406E5F
              • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00406E81
              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00406E94
              • DestroyWindow.USER32(?), ref: 00406EB5
              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00370000,00000000), ref: 00406EE4
              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00406EFD
              • GetDesktopWindow.USER32 ref: 00406F16
              • GetWindowRect.USER32(00000000), ref: 00406F1D
              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00406F35
              • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00406F4D
                • Part of subcall function 00389944: GetWindowLongW.USER32(?,000000EB), ref: 00389952
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
              • String ID: 0$tooltips_class32
              • API String ID: 2429346358-3619404913
              • Opcode ID: 27f2d6176d994e8a447501a110103dc1a827068cc5d34a5f0daeeb04af3ddfbe
              • Instruction ID: df49c08fc747b3c9ab9111e3dbb5f5e5a13b211391e62aaa1415befbb3e748d3
              • Opcode Fuzzy Hash: 27f2d6176d994e8a447501a110103dc1a827068cc5d34a5f0daeeb04af3ddfbe
              • Instruction Fuzzy Hash: BC718B74104341AFDB21DF18DC44F6BBBE9FB89300F14092EF98AA72A1C775A956CB19
              APIs
              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 003EC4B0
              • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 003EC4C3
              • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 003EC4D7
              • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 003EC4F0
              • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 003EC533
              • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 003EC549
              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 003EC554
              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 003EC584
              • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 003EC5DC
              • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 003EC5F0
              • InternetCloseHandle.WININET(00000000), ref: 003EC5FB
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
              • String ID:
              • API String ID: 3800310941-3916222277
              • Opcode ID: 33fee123f1febeb455862c7cc3b48b612153411399f4549cab0718553bf6a3c2
              • Instruction ID: 974604bd7994a08e6f348bf2a824cbc94e775067368cdfbd00b339161d785934
              • Opcode Fuzzy Hash: 33fee123f1febeb455862c7cc3b48b612153411399f4549cab0718553bf6a3c2
              • Instruction Fuzzy Hash: D1517FB0510355FFDB229F62C988AAF7BBCFF05344F005629F945A6690D734E905DB60
              APIs
              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 00408592
              • GetFileSize.KERNEL32(00000000,00000000), ref: 004085A2
              • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004085AD
              • CloseHandle.KERNEL32(00000000), ref: 004085BA
              • GlobalLock.KERNEL32(00000000), ref: 004085C8
              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004085D7
              • GlobalUnlock.KERNEL32(00000000), ref: 004085E0
              • CloseHandle.KERNEL32(00000000), ref: 004085E7
              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 004085F8
              • OleLoadPicture.OLEAUT32(?,00000000,00000000,0040FC38,?), ref: 00408611
              • GlobalFree.KERNEL32(00000000), ref: 00408621
              • GetObjectW.GDI32(?,00000018,000000FF), ref: 00408641
              • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00408671
              • DeleteObject.GDI32(00000000), ref: 00408699
              • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004086AF
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
              • String ID:
              • API String ID: 3840717409-0
              • Opcode ID: c76805f7442b019c58c757e5e6f5ebe5ced457245f0771144616e9a023ff00e3
              • Instruction ID: 41e083e8da732d6c3d48dce5dd14732d40017fd13658d4d483899e5d85b088bc
              • Opcode Fuzzy Hash: c76805f7442b019c58c757e5e6f5ebe5ced457245f0771144616e9a023ff00e3
              • Instruction Fuzzy Hash: C4414C71600204FFDB119FA5CE88EAB7BB8FF89711F108569F905E7290DB359901CB24
              APIs
              • VariantInit.OLEAUT32(00000000), ref: 003E1502
              • VariantCopy.OLEAUT32(?,?), ref: 003E150B
              • VariantClear.OLEAUT32(?), ref: 003E1517
              • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 003E15FB
              • VarR8FromDec.OLEAUT32(?,?), ref: 003E1657
              • VariantInit.OLEAUT32(?), ref: 003E1708
              • SysFreeString.OLEAUT32(?), ref: 003E178C
              • VariantClear.OLEAUT32(?), ref: 003E17D8
              • VariantClear.OLEAUT32(?), ref: 003E17E7
              • VariantInit.OLEAUT32(00000000), ref: 003E1823
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
              • String ID: %4d%02d%02d%02d%02d%02d$Default
              • API String ID: 1234038744-3931177956
              • Opcode ID: 77f05809425c07f4c28bea3ddb8b1a2dd7ff832666bc3fbd64bc05a1eb2e4f44
              • Instruction ID: ea4892a05bd0687a7189c40bed5ae41f76b3b9c923370634a278095def9bb761
              • Opcode Fuzzy Hash: 77f05809425c07f4c28bea3ddb8b1a2dd7ff832666bc3fbd64bc05a1eb2e4f44
              • Instruction Fuzzy Hash: 2DD13531A00265DBDB12AF66D884BBDB7B9BF46700F20825AF846AF5C4DB34EC44DB51
              APIs
                • Part of subcall function 00379CB3: _wcslen.LIBCMT ref: 00379CBD
                • Part of subcall function 003FC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,003FB6AE,?,?), ref: 003FC9B5
                • Part of subcall function 003FC998: _wcslen.LIBCMT ref: 003FC9F1
                • Part of subcall function 003FC998: _wcslen.LIBCMT ref: 003FCA68
                • Part of subcall function 003FC998: _wcslen.LIBCMT ref: 003FCA9E
              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 003FB6F4
              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 003FB772
              • RegDeleteValueW.ADVAPI32(?,?), ref: 003FB80A
              • RegCloseKey.ADVAPI32(?), ref: 003FB87E
              • RegCloseKey.ADVAPI32(?), ref: 003FB89C
              • LoadLibraryA.KERNEL32(advapi32.dll), ref: 003FB8F2
              • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 003FB904
              • RegDeleteKeyW.ADVAPI32(?,?), ref: 003FB922
              • FreeLibrary.KERNEL32(00000000), ref: 003FB983
              • RegCloseKey.ADVAPI32(00000000), ref: 003FB994
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
              • String ID: RegDeleteKeyExW$advapi32.dll
              • API String ID: 146587525-4033151799
              • Opcode ID: cfcf05d805c88989890245fcf018faecea91f94932fd2bae531bd1a5a3562ade
              • Instruction ID: c2704b39ea938cf35374077163f0c481ca6f8f44b2c7dc2dc2dfffc154d8d898
              • Opcode Fuzzy Hash: cfcf05d805c88989890245fcf018faecea91f94932fd2bae531bd1a5a3562ade
              • Instruction Fuzzy Hash: 6EC19C70204205EFD722DF24C495F2AFBE5BF84308F15859CE69A8B2A2CB75EC45CB91
              APIs
              • GetDC.USER32(00000000), ref: 003F25D8
              • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 003F25E8
              • CreateCompatibleDC.GDI32(?), ref: 003F25F4
              • SelectObject.GDI32(00000000,?), ref: 003F2601
              • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 003F266D
              • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 003F26AC
              • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 003F26D0
              • SelectObject.GDI32(?,?), ref: 003F26D8
              • DeleteObject.GDI32(?), ref: 003F26E1
              • DeleteDC.GDI32(?), ref: 003F26E8
              • ReleaseDC.USER32(00000000,?), ref: 003F26F3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
              • String ID: (
              • API String ID: 2598888154-3887548279
              • Opcode ID: 2e8401971f74b0a75684292172d672981e37a3f3ac74e7730c28b3316e753308
              • Instruction ID: 7c27fd0b84f97aea144a8a21beb904936dd8ce51ff4c5ac783ecb01af34b1dfa
              • Opcode Fuzzy Hash: 2e8401971f74b0a75684292172d672981e37a3f3ac74e7730c28b3316e753308
              • Instruction Fuzzy Hash: 0D61F275D00219EFCF05CFA8D984EAEBBB5FF48310F208529EA55AB250D770A951CFA4
              APIs
              • ___free_lconv_mon.LIBCMT ref: 003ADAA1
                • Part of subcall function 003AD63C: _free.LIBCMT ref: 003AD659
                • Part of subcall function 003AD63C: _free.LIBCMT ref: 003AD66B
                • Part of subcall function 003AD63C: _free.LIBCMT ref: 003AD67D
                • Part of subcall function 003AD63C: _free.LIBCMT ref: 003AD68F
                • Part of subcall function 003AD63C: _free.LIBCMT ref: 003AD6A1
                • Part of subcall function 003AD63C: _free.LIBCMT ref: 003AD6B3
                • Part of subcall function 003AD63C: _free.LIBCMT ref: 003AD6C5
                • Part of subcall function 003AD63C: _free.LIBCMT ref: 003AD6D7
                • Part of subcall function 003AD63C: _free.LIBCMT ref: 003AD6E9
                • Part of subcall function 003AD63C: _free.LIBCMT ref: 003AD6FB
                • Part of subcall function 003AD63C: _free.LIBCMT ref: 003AD70D
                • Part of subcall function 003AD63C: _free.LIBCMT ref: 003AD71F
                • Part of subcall function 003AD63C: _free.LIBCMT ref: 003AD731
              • _free.LIBCMT ref: 003ADA96
                • Part of subcall function 003A29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,003AD7D1,00000000,00000000,00000000,00000000,?,003AD7F8,00000000,00000007,00000000,?,003ADBF5,00000000), ref: 003A29DE
                • Part of subcall function 003A29C8: GetLastError.KERNEL32(00000000,?,003AD7D1,00000000,00000000,00000000,00000000,?,003AD7F8,00000000,00000007,00000000,?,003ADBF5,00000000,00000000), ref: 003A29F0
              • _free.LIBCMT ref: 003ADAB8
              • _free.LIBCMT ref: 003ADACD
              • _free.LIBCMT ref: 003ADAD8
              • _free.LIBCMT ref: 003ADAFA
              • _free.LIBCMT ref: 003ADB0D
              • _free.LIBCMT ref: 003ADB1B
              • _free.LIBCMT ref: 003ADB26
              • _free.LIBCMT ref: 003ADB5E
              • _free.LIBCMT ref: 003ADB65
              • _free.LIBCMT ref: 003ADB82
              • _free.LIBCMT ref: 003ADB9A
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
              • String ID:
              • API String ID: 161543041-0
              • Opcode ID: 881c3b6a4f727081492d266ffcc2c6aed1f68a50e94635e8b6be5f6d7aaa445e
              • Instruction ID: 849890d062aae07e382410e3ac2fb7b69587b4c29c459b0e41cdc165c8102f3b
              • Opcode Fuzzy Hash: 881c3b6a4f727081492d266ffcc2c6aed1f68a50e94635e8b6be5f6d7aaa445e
              • Instruction Fuzzy Hash: 0A316B316043049FEB63AA38E849B5B77E9FF03710F124519E44ADB5A1DF35AC508B21
              APIs
              • GetClassNameW.USER32(?,?,00000100), ref: 003D369C
              • _wcslen.LIBCMT ref: 003D36A7
              • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 003D3797
              • GetClassNameW.USER32(?,?,00000400), ref: 003D380C
              • GetDlgCtrlID.USER32(?), ref: 003D385D
              • GetWindowRect.USER32(?,?), ref: 003D3882
              • GetParent.USER32(?), ref: 003D38A0
              • ScreenToClient.USER32(00000000), ref: 003D38A7
              • GetClassNameW.USER32(?,?,00000100), ref: 003D3921
              • GetWindowTextW.USER32(?,?,00000400), ref: 003D395D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
              • String ID: %s%u
              • API String ID: 4010501982-679674701
              • Opcode ID: f6a48cdd14a0cc543316e1d0717fcfcd25ee69b0d493f95e9c68c47dbb29cbf6
              • Instruction ID: d50ce29f319643d1c5b21b80b125ac36bceed2dc822919807d7b2f33e061fd89
              • Opcode Fuzzy Hash: f6a48cdd14a0cc543316e1d0717fcfcd25ee69b0d493f95e9c68c47dbb29cbf6
              • Instruction Fuzzy Hash: 7391D672204606EFD716DF24D895FAAF7A8FF44350F00462AF999D6290DB30EE45CB92
              APIs
              • GetClassNameW.USER32(?,?,00000400), ref: 003D4994
              • GetWindowTextW.USER32(?,?,00000400), ref: 003D49DA
              • _wcslen.LIBCMT ref: 003D49EB
              • CharUpperBuffW.USER32(?,00000000), ref: 003D49F7
              • _wcsstr.LIBVCRUNTIME ref: 003D4A2C
              • GetClassNameW.USER32(00000018,?,00000400), ref: 003D4A64
              • GetWindowTextW.USER32(?,?,00000400), ref: 003D4A9D
              • GetClassNameW.USER32(00000018,?,00000400), ref: 003D4AE6
              • GetClassNameW.USER32(?,?,00000400), ref: 003D4B20
              • GetWindowRect.USER32(?,?), ref: 003D4B8B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
              • String ID: ThumbnailClass
              • API String ID: 1311036022-1241985126
              • Opcode ID: 8ef4f2cd3edb7a8b0a0017214bd19ac1cd2acaab32b3edbb9848c573a379ead0
              • Instruction ID: 40a26adbbe586252bc7f658edff8814dc8519ab43a4489ef173428d202ef366e
              • Opcode Fuzzy Hash: 8ef4f2cd3edb7a8b0a0017214bd19ac1cd2acaab32b3edbb9848c573a379ead0
              • Instruction Fuzzy Hash: E291EF32008205AFDB16CF14E985FAA77E8FF54304F04856BFD859A296EB34ED45CBA1
              APIs
              • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 003FCC64
              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 003FCC8D
              • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 003FCD48
                • Part of subcall function 003FCC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 003FCCAA
                • Part of subcall function 003FCC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 003FCCBD
                • Part of subcall function 003FCC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 003FCCCF
                • Part of subcall function 003FCC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 003FCD05
                • Part of subcall function 003FCC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 003FCD28
              • RegDeleteKeyW.ADVAPI32(?,?), ref: 003FCCF3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
              • String ID: RegDeleteKeyExW$advapi32.dll
              • API String ID: 2734957052-4033151799
              • Opcode ID: 1697ad8a9a7d7a33883adf8a231a3e76aecad14ac070748eca7bfee197ff3752
              • Instruction ID: 9e3039ab863660fa9b06864b8d9cd17f64d4545dbe6c48b41c078efccb1ea9f3
              • Opcode Fuzzy Hash: 1697ad8a9a7d7a33883adf8a231a3e76aecad14ac070748eca7bfee197ff3752
              • Instruction Fuzzy Hash: CE318E7194112CFBDB219B90DD88EFFBB7CEF45750F010275BA06E6240DA349A45DAA4
              APIs
              • timeGetTime.WINMM ref: 003DE6B4
                • Part of subcall function 0038E551: timeGetTime.WINMM(?,?,003DE6D4), ref: 0038E555
              • Sleep.KERNEL32(0000000A), ref: 003DE6E1
              • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 003DE705
              • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 003DE727
              • SetActiveWindow.USER32 ref: 003DE746
              • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 003DE754
              • SendMessageW.USER32(00000010,00000000,00000000), ref: 003DE773
              • Sleep.KERNEL32(000000FA), ref: 003DE77E
              • IsWindow.USER32 ref: 003DE78A
              • EndDialog.USER32(00000000), ref: 003DE79B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
              • String ID: BUTTON
              • API String ID: 1194449130-3405671355
              • Opcode ID: 2a5db6d825371e6b730b228216da47b070d47bf074de986e1f628d5840c3c910
              • Instruction ID: 81b06361aded2bec29db65ef9b8f64d7b4703b2e1cf3927426bafdeec13101c1
              • Opcode Fuzzy Hash: 2a5db6d825371e6b730b228216da47b070d47bf074de986e1f628d5840c3c910
              • Instruction Fuzzy Hash: C121A775200201EFEB126F60FEC9A363F69F755349F510536F805A92B1DBB29C008A1D
              APIs
                • Part of subcall function 00379CB3: _wcslen.LIBCMT ref: 00379CBD
              • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 003DEA5D
              • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 003DEA73
              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 003DEA84
              • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 003DEA96
              • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 003DEAA7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: SendString$_wcslen
              • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
              • API String ID: 2420728520-1007645807
              • Opcode ID: 414c21149980823146f9da8ac609242d45de9b82efaaaa9777dc2af4de7ec5bc
              • Instruction ID: c2d6b6ca86ecf2341aed4a54440d46dffb75602e8de41375cc57cf9801bd6c13
              • Opcode Fuzzy Hash: 414c21149980823146f9da8ac609242d45de9b82efaaaa9777dc2af4de7ec5bc
              • Instruction Fuzzy Hash: 4E11947169025A79D721B761DC4AFFF6A7CEFD5B00F11442B7815A60D0DB741905C9B0
              APIs
                • Part of subcall function 00388F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00388BE8,?,00000000,?,?,?,?,00388BBA,00000000,?), ref: 00388FC5
              • DestroyWindow.USER32(?), ref: 00388C81
              • KillTimer.USER32(00000000,?,?,?,?,00388BBA,00000000,?), ref: 00388D1B
              • DestroyAcceleratorTable.USER32(00000000), ref: 003C6973
              • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00388BBA,00000000,?), ref: 003C69A1
              • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00388BBA,00000000,?), ref: 003C69B8
              • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00388BBA,00000000), ref: 003C69D4
              • DeleteObject.GDI32(00000000), ref: 003C69E6
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
              • String ID:
              • API String ID: 641708696-0
              • Opcode ID: 4bc76de0ec3dcc5dc2e9fcd30a95882b61f1dad0a1281b05a404f440e30f2981
              • Instruction ID: 07f7bdfcfe7ae381a831c8f89c02dcd15d7d07d7a657177aae3922163d4134ec
              • Opcode Fuzzy Hash: 4bc76de0ec3dcc5dc2e9fcd30a95882b61f1dad0a1281b05a404f440e30f2981
              • Instruction Fuzzy Hash: 68618974102710DFDB22AF18DA89B25B7F1FB41312F55456CE042AB9B4CB31AD80CB98
              APIs
                • Part of subcall function 00389944: GetWindowLongW.USER32(?,000000EB), ref: 00389952
              • GetSysColor.USER32(0000000F), ref: 00389862
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ColorLongWindow
              • String ID:
              • API String ID: 259745315-0
              • Opcode ID: a746187e47834b16c916165963569d57566d012cfa80941f328fcd2f20bb60f6
              • Instruction ID: 63cc0490c136d368f48211ad64207357817d4b668846e10bd52737b64fc70d18
              • Opcode Fuzzy Hash: a746187e47834b16c916165963569d57566d012cfa80941f328fcd2f20bb60f6
              • Instruction Fuzzy Hash: 3241B431104750EFDB226F389C88BB93BA5FB46334F19469AF9A29B1E1C7319C42DB10
              APIs
              • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,003BF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 003D9717
              • LoadStringW.USER32(00000000,?,003BF7F8,00000001), ref: 003D9720
                • Part of subcall function 00379CB3: _wcslen.LIBCMT ref: 00379CBD
              • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,003BF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 003D9742
              • LoadStringW.USER32(00000000,?,003BF7F8,00000001), ref: 003D9745
              • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 003D9866
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: HandleLoadModuleString$Message_wcslen
              • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
              • API String ID: 747408836-2268648507
              • Opcode ID: d58856a588c1f4c6da336c4933bb01efc719f6fdf7f5117f1ae0acda8aba6156
              • Instruction ID: 70fb44f11d6d08fbfdf681fc9eb3a44201f153c9df145e74efa6ad539e5b066c
              • Opcode Fuzzy Hash: d58856a588c1f4c6da336c4933bb01efc719f6fdf7f5117f1ae0acda8aba6156
              • Instruction Fuzzy Hash: F0417272900209BADF16FBE0DD92EEE7378AF15300F104166F6097A092EB395F48DB61
              APIs
                • Part of subcall function 00376B57: _wcslen.LIBCMT ref: 00376B6A
              • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 003D07A2
              • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 003D07BE
              • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 003D07DA
              • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 003D0804
              • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 003D082C
              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 003D0837
              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 003D083C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
              • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
              • API String ID: 323675364-22481851
              • Opcode ID: d3f48ade57bed22c5684bd44a8dda01d3a0a38115d1f17917f5b04a01eb7afe5
              • Instruction ID: 0f073248dc4e0f5152489f76010a282da5f1a0a18bb19642c62ec9c314081f56
              • Opcode Fuzzy Hash: d3f48ade57bed22c5684bd44a8dda01d3a0a38115d1f17917f5b04a01eb7afe5
              • Instruction Fuzzy Hash: 58412A72C10228EBDF26EBA4DC95DEDB7B8BF44740F158126E905B71A1EB345E04CB90
              APIs
              • VariantInit.OLEAUT32(?), ref: 003F3C5C
              • CoInitialize.OLE32(00000000), ref: 003F3C8A
              • CoUninitialize.OLE32 ref: 003F3C94
              • _wcslen.LIBCMT ref: 003F3D2D
              • GetRunningObjectTable.OLE32(00000000,?), ref: 003F3DB1
              • SetErrorMode.KERNEL32(00000001,00000029), ref: 003F3ED5
              • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 003F3F0E
              • CoGetObject.OLE32(?,00000000,0040FB98,?), ref: 003F3F2D
              • SetErrorMode.KERNEL32(00000000), ref: 003F3F40
              • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 003F3FC4
              • VariantClear.OLEAUT32(?), ref: 003F3FD8
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
              • String ID:
              • API String ID: 429561992-0
              • Opcode ID: 61ae4a2e1abe0111bbb14b71bf214dbc572b6713d730b0f40f338a67316be7ed
              • Instruction ID: fd20d9a3bf3b72be225ddc1d713c3d8a275880562d29166a45e249847c794d20
              • Opcode Fuzzy Hash: 61ae4a2e1abe0111bbb14b71bf214dbc572b6713d730b0f40f338a67316be7ed
              • Instruction Fuzzy Hash: DFC135716083099FD711DF68C88492BB7E9FF89748F10492DFA8A9B251D731EE05CB52
              APIs
              • CoInitialize.OLE32(00000000), ref: 003E7AF3
              • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 003E7B8F
              • SHGetDesktopFolder.SHELL32(?), ref: 003E7BA3
              • CoCreateInstance.OLE32(0040FD08,00000000,00000001,00436E6C,?), ref: 003E7BEF
              • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 003E7C74
              • CoTaskMemFree.OLE32(?,?), ref: 003E7CCC
              • SHBrowseForFolderW.SHELL32(?), ref: 003E7D57
              • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 003E7D7A
              • CoTaskMemFree.OLE32(00000000), ref: 003E7D81
              • CoTaskMemFree.OLE32(00000000), ref: 003E7DD6
              • CoUninitialize.OLE32 ref: 003E7DDC
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
              • String ID:
              • API String ID: 2762341140-0
              • Opcode ID: 70650e882dec592797dd9f3ebd8e5574eb231672d9c228b56fb2d339faeef942
              • Instruction ID: ee51d1548c3368cb15f3bdff6e98d784bb02956fccb7d331fe603b7aea00b569
              • Opcode Fuzzy Hash: 70650e882dec592797dd9f3ebd8e5574eb231672d9c228b56fb2d339faeef942
              • Instruction Fuzzy Hash: 8CC14B75A04159EFCB15DFA5C884DAEBBF9FF48304B1481A9E809EB261D730EE41CB90
              APIs
              • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00405504
              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405515
              • CharNextW.USER32(00000158), ref: 00405544
              • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00405585
              • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 0040559B
              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004055AC
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: MessageSend$CharNext
              • String ID:
              • API String ID: 1350042424-0
              • Opcode ID: 5c25c99765271f03b5fe62b39392a8b21381aa261e59e13dfdd326d8c845f2dd
              • Instruction ID: 53b70cae9f1aed18182f5048dd2c3d9047e2d2d7f0ce5fadc0f1cefd64162332
              • Opcode Fuzzy Hash: 5c25c99765271f03b5fe62b39392a8b21381aa261e59e13dfdd326d8c845f2dd
              • Instruction Fuzzy Hash: BB617A74900608EBDF209F54CC84AFF7BB9EB09320F104566F925BA2D0D7789A81DF69
              APIs
              • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 003CFAAF
              • SafeArrayAllocData.OLEAUT32(?), ref: 003CFB08
              • VariantInit.OLEAUT32(?), ref: 003CFB1A
              • SafeArrayAccessData.OLEAUT32(?,?), ref: 003CFB3A
              • VariantCopy.OLEAUT32(?,?), ref: 003CFB8D
              • SafeArrayUnaccessData.OLEAUT32(?), ref: 003CFBA1
              • VariantClear.OLEAUT32(?), ref: 003CFBB6
              • SafeArrayDestroyData.OLEAUT32(?), ref: 003CFBC3
              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 003CFBCC
              • VariantClear.OLEAUT32(?), ref: 003CFBDE
              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 003CFBE9
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
              • String ID:
              • API String ID: 2706829360-0
              • Opcode ID: 277b0ba012ff8e2d57e21bc728363edd96a60571491c39db93257d03f165f7a4
              • Instruction ID: f153c507229a8f388a0c42ee6f74bd24ca5150a3f2f4964392daee20e2c72995
              • Opcode Fuzzy Hash: 277b0ba012ff8e2d57e21bc728363edd96a60571491c39db93257d03f165f7a4
              • Instruction Fuzzy Hash: B7413D35A00219DFCB05DF64C894EAEBBBAFF48344F018169E945EB261CB34AD45CFA0
              APIs
              • GetKeyboardState.USER32(?), ref: 003D9CA1
              • GetAsyncKeyState.USER32(000000A0), ref: 003D9D22
              • GetKeyState.USER32(000000A0), ref: 003D9D3D
              • GetAsyncKeyState.USER32(000000A1), ref: 003D9D57
              • GetKeyState.USER32(000000A1), ref: 003D9D6C
              • GetAsyncKeyState.USER32(00000011), ref: 003D9D84
              • GetKeyState.USER32(00000011), ref: 003D9D96
              • GetAsyncKeyState.USER32(00000012), ref: 003D9DAE
              • GetKeyState.USER32(00000012), ref: 003D9DC0
              • GetAsyncKeyState.USER32(0000005B), ref: 003D9DD8
              • GetKeyState.USER32(0000005B), ref: 003D9DEA
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: State$Async$Keyboard
              • String ID:
              • API String ID: 541375521-0
              • Opcode ID: 5afca16c674b50b51e7c7bae143cd312767c5b8f425e653504f50cb4b5af99bd
              • Instruction ID: fc72ce2e0a87e868138d26c3db5933b032045b3b0b3cef43265fde2a2f08a5a8
              • Opcode Fuzzy Hash: 5afca16c674b50b51e7c7bae143cd312767c5b8f425e653504f50cb4b5af99bd
              • Instruction Fuzzy Hash: 5C4128355047C96DFF329760A8443B5BEA16F11304F05806BDAC6573C2EBA499C8C7A2
              APIs
              • WSAStartup.WSOCK32(00000101,?), ref: 003F05BC
              • inet_addr.WSOCK32(?), ref: 003F061C
              • gethostbyname.WSOCK32(?), ref: 003F0628
              • IcmpCreateFile.IPHLPAPI ref: 003F0636
              • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 003F06C6
              • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 003F06E5
              • IcmpCloseHandle.IPHLPAPI(?), ref: 003F07B9
              • WSACleanup.WSOCK32 ref: 003F07BF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
              • String ID: Ping
              • API String ID: 1028309954-2246546115
              • Opcode ID: 52a89b1edf7c843c672c0f02c7eb1e0ceeec0e4d311512c29c40d962d94326ab
              • Instruction ID: 6e887a6ff4997d655b8cef7bbcd2f7bd4ded627b93902e75cb98002d6cddee14
              • Opcode Fuzzy Hash: 52a89b1edf7c843c672c0f02c7eb1e0ceeec0e4d311512c29c40d962d94326ab
              • Instruction Fuzzy Hash: 5F91AC34608201DFD726EF19C988F2ABBE4AF44318F1585A9E5699F7A2C734EC45CF81
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: _wcslen$BuffCharLower
              • String ID: cdecl$none$stdcall$winapi
              • API String ID: 707087890-567219261
              • Opcode ID: c2336c11ed72d2702c7bcc70200da103ba057b5c66e65fd4c51b33841f5e4153
              • Instruction ID: ad3c71b6a7e2933bef4ff58e23c2baedc41853a5ecc271ecb9b8bcab00389a0d
              • Opcode Fuzzy Hash: c2336c11ed72d2702c7bcc70200da103ba057b5c66e65fd4c51b33841f5e4153
              • Instruction Fuzzy Hash: 2F51D532A0051A9BCF2ADF6CC9519BEB3A5BF74324B214229F656EB2C0DB34DD41C790
              APIs
              • CoInitialize.OLE32 ref: 003F3774
              • CoUninitialize.OLE32 ref: 003F377F
              • CoCreateInstance.OLE32(?,00000000,00000017,0040FB78,?), ref: 003F37D9
              • IIDFromString.OLE32(?,?), ref: 003F384C
              • VariantInit.OLEAUT32(?), ref: 003F38E4
              • VariantClear.OLEAUT32(?), ref: 003F3936
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
              • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
              • API String ID: 636576611-1287834457
              • Opcode ID: da08f6fa8afa0f5db806ab8eb9f2923b27363486e3f333309cdcb7614bc5b0f1
              • Instruction ID: cbd9a35f5733d5cddfa3f34534be3438847fabca8c61d1b164b3710b6292792f
              • Opcode Fuzzy Hash: da08f6fa8afa0f5db806ab8eb9f2923b27363486e3f333309cdcb7614bc5b0f1
              • Instruction Fuzzy Hash: E561B171608305EFD312EF54C888F6AB7E8EF49750F104919FA859B291C774EE48CB96
              APIs
              • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 003E33CF
                • Part of subcall function 00379CB3: _wcslen.LIBCMT ref: 00379CBD
              • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 003E33F0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: LoadString$_wcslen
              • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
              • API String ID: 4099089115-3080491070
              • Opcode ID: d6b96d69be491ff3e2aab969a436fa87e364ad3a76f6ad2e29a3959e112e3264
              • Instruction ID: f3af80cf37e7ddc283c71d172f12687bd57ec4b599d2cdc8febe4551ef717b14
              • Opcode Fuzzy Hash: d6b96d69be491ff3e2aab969a436fa87e364ad3a76f6ad2e29a3959e112e3264
              • Instruction Fuzzy Hash: FE51B531900119BADF26EBA0CD56EEEB378AF15300F208162F509771A1DB352F58DF61
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: _wcslen$BuffCharUpper
              • String ID: APPEND$EXISTS$KEYS$REMOVE
              • API String ID: 1256254125-769500911
              • Opcode ID: 0fa19cee4f0fa55e55865b166ddac45f83893b658e39fdf4aff66db33b19c3d4
              • Instruction ID: 3414c500720fe4fa208556abc12b4d0cb17b9a7f557c86024e3c1701943f3f39
              • Opcode Fuzzy Hash: 0fa19cee4f0fa55e55865b166ddac45f83893b658e39fdf4aff66db33b19c3d4
              • Instruction Fuzzy Hash: AD41B233A00026DACB216F7D98905BEF7A5AFA4B54B27422BE421DB384E735CD81C790
              APIs
              • SetErrorMode.KERNEL32(00000001), ref: 003E53A0
              • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 003E5416
              • GetLastError.KERNEL32 ref: 003E5420
              • SetErrorMode.KERNEL32(00000000,READY), ref: 003E54A7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Error$Mode$DiskFreeLastSpace
              • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
              • API String ID: 4194297153-14809454
              • Opcode ID: 5aef2ab476e22fa3d2958fcf20d9ce925dd9640bcb37317179df0174228085ba
              • Instruction ID: 1ea9fffc2825ed6e2699d6a26dfb2f2b44f059eafedc8d18b7760863136b6938
              • Opcode Fuzzy Hash: 5aef2ab476e22fa3d2958fcf20d9ce925dd9640bcb37317179df0174228085ba
              • Instruction Fuzzy Hash: C431AE35A00155AFCB12DF6AC484AAABBB4EB04309F15C26AE405DF2D2DB74DD86CF90
              APIs
              • CreateMenu.USER32 ref: 00403C79
              • SetMenu.USER32(?,00000000), ref: 00403C88
              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00403D10
              • IsMenu.USER32(?), ref: 00403D24
              • CreatePopupMenu.USER32 ref: 00403D2E
              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00403D5B
              • DrawMenuBar.USER32 ref: 00403D63
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Menu$CreateItem$DrawInfoInsertPopup
              • String ID: 0$F
              • API String ID: 161812096-3044882817
              • Opcode ID: 5e21cda6480fdfaf2fb6ca1eac7295853344165907e975048dee1cf7af7835c9
              • Instruction ID: 542b81f7a75c4dbbf11c5ef5d3656bf68cfe795cca4464c08a876345ad366660
              • Opcode Fuzzy Hash: 5e21cda6480fdfaf2fb6ca1eac7295853344165907e975048dee1cf7af7835c9
              • Instruction Fuzzy Hash: 01417C79A01209EFDB14CF64D884EAA7BB9FF49351F140139F946A73A0D734AA10DF98
              APIs
              • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00403A9D
              • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00403AA0
              • GetWindowLongW.USER32(?,000000F0), ref: 00403AC7
              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00403AEA
              • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00403B62
              • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00403BAC
              • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00403BC7
              • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00403BE2
              • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00403BF6
              • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00403C13
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: MessageSend$LongWindow
              • String ID:
              • API String ID: 312131281-0
              • Opcode ID: df78ba890356822130437ad5e583627d6aad9e7564ad5e4c89ab36dbecab6ab6
              • Instruction ID: 75515ef7cfc9c90fea3ef2c068329cadfecb62596ba073bb25218c72c349af88
              • Opcode Fuzzy Hash: df78ba890356822130437ad5e583627d6aad9e7564ad5e4c89ab36dbecab6ab6
              • Instruction Fuzzy Hash: A3618B75900248AFDB10DF68CC81EEE77B8EB49304F1001AAFA05E72E2D774AE81DB54
              APIs
              • GetCurrentThreadId.KERNEL32 ref: 003DB151
              • GetForegroundWindow.USER32(00000000,?,?,?,?,?,003DA1E1,?,00000001), ref: 003DB165
              • GetWindowThreadProcessId.USER32(00000000), ref: 003DB16C
              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,003DA1E1,?,00000001), ref: 003DB17B
              • GetWindowThreadProcessId.USER32(?,00000000), ref: 003DB18D
              • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,003DA1E1,?,00000001), ref: 003DB1A6
              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,003DA1E1,?,00000001), ref: 003DB1B8
              • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,003DA1E1,?,00000001), ref: 003DB1FD
              • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,003DA1E1,?,00000001), ref: 003DB212
              • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,003DA1E1,?,00000001), ref: 003DB21D
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Thread$AttachInput$Window$Process$CurrentForeground
              • String ID:
              • API String ID: 2156557900-0
              • Opcode ID: 34f45136e27563a83d3b862ce297cdba6c26602810ea888ce789cb417ab7f06b
              • Instruction ID: 1b982e9341ad1b2443919700605e2cceaab63c1b3d96bf315655caa016b4a6e7
              • Opcode Fuzzy Hash: 34f45136e27563a83d3b862ce297cdba6c26602810ea888ce789cb417ab7f06b
              • Instruction Fuzzy Hash: 9B31D477500204FFDB229F24FC84F6DBB79BB11756F124626F900D6250C77099048F28
              APIs
              • _free.LIBCMT ref: 003A2C94
                • Part of subcall function 003A29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,003AD7D1,00000000,00000000,00000000,00000000,?,003AD7F8,00000000,00000007,00000000,?,003ADBF5,00000000), ref: 003A29DE
                • Part of subcall function 003A29C8: GetLastError.KERNEL32(00000000,?,003AD7D1,00000000,00000000,00000000,00000000,?,003AD7F8,00000000,00000007,00000000,?,003ADBF5,00000000,00000000), ref: 003A29F0
              • _free.LIBCMT ref: 003A2CA0
              • _free.LIBCMT ref: 003A2CAB
              • _free.LIBCMT ref: 003A2CB6
              • _free.LIBCMT ref: 003A2CC1
              • _free.LIBCMT ref: 003A2CCC
              • _free.LIBCMT ref: 003A2CD7
              • _free.LIBCMT ref: 003A2CE2
              • _free.LIBCMT ref: 003A2CED
              • _free.LIBCMT ref: 003A2CFB
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: c110f58ab37b1fed8a869d2c1697d22602d553a5114494f9b543b422f634af0c
              • Instruction ID: 6680ce2b7b8f6510e1632c3b576e71ec687b4810a9565c980ac1c3050eb027f0
              • Opcode Fuzzy Hash: c110f58ab37b1fed8a869d2c1697d22602d553a5114494f9b543b422f634af0c
              • Instruction Fuzzy Hash: 73119676100108AFCB42EF58D846CDE3BA5FF06750F4144A9FA485F222D731EA609B91
              APIs
              • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00371459
              • OleUninitialize.OLE32(?,00000000), ref: 003714F8
              • UnregisterHotKey.USER32(?), ref: 003716DD
              • DestroyWindow.USER32(?), ref: 003B24B9
              • FreeLibrary.KERNEL32(?), ref: 003B251E
              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 003B254B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
              • String ID: close all
              • API String ID: 469580280-3243417748
              • Opcode ID: 68919edf95e647275de8fb490ea6c26bcb008b94d32dba37e84764c13c51beee
              • Instruction ID: ceca172878a78d7c99e2717e0c5ab27b246afc7f095b39428eba0b0440985256
              • Opcode Fuzzy Hash: 68919edf95e647275de8fb490ea6c26bcb008b94d32dba37e84764c13c51beee
              • Instruction Fuzzy Hash: 95D1AF32701212CFCB2AEF19C495B69F7A4BF05704F1582AEE94A6B651CB34ED12CF54
              APIs
              • SetWindowLongW.USER32(?,000000EB), ref: 00375C7A
                • Part of subcall function 00375D0A: GetClientRect.USER32(?,?), ref: 00375D30
                • Part of subcall function 00375D0A: GetWindowRect.USER32(?,?), ref: 00375D71
                • Part of subcall function 00375D0A: ScreenToClient.USER32(?,?), ref: 00375D99
              • GetDC.USER32 ref: 003B46F5
              • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 003B4708
              • SelectObject.GDI32(00000000,00000000), ref: 003B4716
              • SelectObject.GDI32(00000000,00000000), ref: 003B472B
              • ReleaseDC.USER32(?,00000000), ref: 003B4733
              • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 003B47C4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
              • String ID: U
              • API String ID: 4009187628-3372436214
              • Opcode ID: ca59e35c7145d34b1acb1d471fcadd39f939609dc44ec7490fc66f544ce9ed9e
              • Instruction ID: ad61989a8d6221bfee9ccb6b5d991c2111d343666444e792104dbd6cf0b966e2
              • Opcode Fuzzy Hash: ca59e35c7145d34b1acb1d471fcadd39f939609dc44ec7490fc66f544ce9ed9e
              • Instruction Fuzzy Hash: 0C710134400205DFCF278F64C986AFA3BB5FF4A318F144269EE655A6A7CB318881DF54
              APIs
              • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 003E35E4
                • Part of subcall function 00379CB3: _wcslen.LIBCMT ref: 00379CBD
              • LoadStringW.USER32(00442390,?,00000FFF,?), ref: 003E360A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: LoadString$_wcslen
              • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
              • API String ID: 4099089115-2391861430
              • Opcode ID: 2b346d2cacb043163355c6c9339fe2941673dfc9fbeff15a6eeb4750bd3ec3e4
              • Instruction ID: 6f4e7e234f08478663725bc6e295cee8f651dcf8e1a4994bf8d45db0ff7d97e8
              • Opcode Fuzzy Hash: 2b346d2cacb043163355c6c9339fe2941673dfc9fbeff15a6eeb4750bd3ec3e4
              • Instruction Fuzzy Hash: 8C51B47180011ABADF26EBA0CC46EEDBB74AF14300F148226F509771A1DB341B98DF55
              APIs
              • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 003EC272
              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 003EC29A
              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 003EC2CA
              • GetLastError.KERNEL32 ref: 003EC322
              • SetEvent.KERNEL32(?), ref: 003EC336
              • InternetCloseHandle.WININET(00000000), ref: 003EC341
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
              • String ID:
              • API String ID: 3113390036-3916222277
              • Opcode ID: 02c55f62d2f7156e46d54ba768dde146fb365018aaf4e2241b04423fe2df7399
              • Instruction ID: 8eb64508829048106622e3977bbc9db5e3f27dbd0fc8d52f22707a8f98eac6bf
              • Opcode Fuzzy Hash: 02c55f62d2f7156e46d54ba768dde146fb365018aaf4e2241b04423fe2df7399
              • Instruction Fuzzy Hash: 0131C275510254AFD7229F668D84AAF7BFCEB49740F04962DF446E7280DB34DD068B60
              APIs
              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,003B3AAF,?,?,Bad directive syntax error,0040CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 003D98BC
              • LoadStringW.USER32(00000000,?,003B3AAF,?), ref: 003D98C3
                • Part of subcall function 00379CB3: _wcslen.LIBCMT ref: 00379CBD
              • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 003D9987
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: HandleLoadMessageModuleString_wcslen
              • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
              • API String ID: 858772685-4153970271
              • Opcode ID: ff0b0a0dda97801ce47fd177bf30e8aeacf4fcf2fb353a6e5d931ce20a7f81f2
              • Instruction ID: 874b849ddc12f44fe08694611ab7b8f8102efe3f2b5798420188868b91ed269b
              • Opcode Fuzzy Hash: ff0b0a0dda97801ce47fd177bf30e8aeacf4fcf2fb353a6e5d931ce20a7f81f2
              • Instruction Fuzzy Hash: 30215E3290021ABBDF22AF90CC56FED7779BF18300F048466B5196A0A1DB359618DB55
              APIs
              • GetParent.USER32 ref: 003D20AB
              • GetClassNameW.USER32(00000000,?,00000100), ref: 003D20C0
              • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 003D214D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ClassMessageNameParentSend
              • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
              • API String ID: 1290815626-3381328864
              • Opcode ID: 9016258901c10d36a8d5d09252468bf04374695e39b24f98aaebfaef6ce6efa1
              • Instruction ID: 8ecc514b5bbd49bfc99afbf0f0a03ff0a091eb581debd5605110a881e6e48ec4
              • Opcode Fuzzy Hash: 9016258901c10d36a8d5d09252468bf04374695e39b24f98aaebfaef6ce6efa1
              • Instruction Fuzzy Hash: 36110677688706B9FA132220EC07DA7779CCF28724F215227FB04A92D1EE6568565618
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
              • String ID:
              • API String ID: 1282221369-0
              • Opcode ID: c8f5cd4461aef749bdba16a94dae49694ae425aaede8e69b7bb703823821c72a
              • Instruction ID: 919bb7c63df423a714236a61f366e4ff3dceaa540981524980bcad4b531c0195
              • Opcode Fuzzy Hash: c8f5cd4461aef749bdba16a94dae49694ae425aaede8e69b7bb703823821c72a
              • Instruction Fuzzy Hash: F96148B2904300AFDF27AFB89885A6A7BA9EF07360F05417DFA55AB281D7319D01C791
              APIs
              • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00405186
              • ShowWindow.USER32(?,00000000), ref: 004051C7
              • ShowWindow.USER32(?,00000005,?,00000000), ref: 004051CD
              • SetFocus.USER32(?,?,00000005,?,00000000), ref: 004051D1
                • Part of subcall function 00406FBA: DeleteObject.GDI32(00000000), ref: 00406FE6
              • GetWindowLongW.USER32(?,000000F0), ref: 0040520D
              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0040521A
              • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 0040524D
              • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00405287
              • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00405296
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
              • String ID:
              • API String ID: 3210457359-0
              • Opcode ID: bcf22de8279fe8f14829b66e7edbf6583a0bd86b6d33eb40bdd1d630d80a4ffd
              • Instruction ID: a19c20abbbe892092fa961006772d22572598fb10b425e1b3ddcfb8d47aa53a3
              • Opcode Fuzzy Hash: bcf22de8279fe8f14829b66e7edbf6583a0bd86b6d33eb40bdd1d630d80a4ffd
              • Instruction Fuzzy Hash: B6518D30A40A08FEEF20AF24CC49B9B3B65EF05325F144167F615BA2E0C779A990DF49
              APIs
              • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 003C6890
              • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 003C68A9
              • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 003C68B9
              • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 003C68D1
              • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 003C68F2
              • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00388874,00000000,00000000,00000000,000000FF,00000000), ref: 003C6901
              • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 003C691E
              • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00388874,00000000,00000000,00000000,000000FF,00000000), ref: 003C692D
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Icon$DestroyExtractImageLoadMessageSend
              • String ID:
              • API String ID: 1268354404-0
              • Opcode ID: 4e929c23da394e793b4676d1990daf5da177d666bfcc7f908575d95a7298e962
              • Instruction ID: 5683a4f2309f211a344b7656138efee08731a264a0292527298f457f92249596
              • Opcode Fuzzy Hash: 4e929c23da394e793b4676d1990daf5da177d666bfcc7f908575d95a7298e962
              • Instruction Fuzzy Hash: FA514974600305EFDB229F24CC96FAA7BA5EB88750F104668F916E62A0DB70AD91DB50
              APIs
              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 003EC182
              • GetLastError.KERNEL32 ref: 003EC195
              • SetEvent.KERNEL32(?), ref: 003EC1A9
                • Part of subcall function 003EC253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 003EC272
                • Part of subcall function 003EC253: GetLastError.KERNEL32 ref: 003EC322
                • Part of subcall function 003EC253: SetEvent.KERNEL32(?), ref: 003EC336
                • Part of subcall function 003EC253: InternetCloseHandle.WININET(00000000), ref: 003EC341
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
              • String ID:
              • API String ID: 337547030-0
              • Opcode ID: fc3b8b56af3378a7d3f8ca99db1ca416fe9da2da683dab7ae1561d2b7379e911
              • Instruction ID: fdd2082253043e6c6e1a6cfc075744bc8f1b26f5dd3dd05607c95c6101815d94
              • Opcode Fuzzy Hash: fc3b8b56af3378a7d3f8ca99db1ca416fe9da2da683dab7ae1561d2b7379e911
              • Instruction Fuzzy Hash: FE31E170110691EFCB229FA6DD44A6ABBF9FF18300B005A2DFA5693650C730E812DBA0
              APIs
                • Part of subcall function 003D3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 003D3A57
                • Part of subcall function 003D3A3D: GetCurrentThreadId.KERNEL32 ref: 003D3A5E
                • Part of subcall function 003D3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,003D25B3), ref: 003D3A65
              • MapVirtualKeyW.USER32(00000025,00000000), ref: 003D25BD
              • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 003D25DB
              • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 003D25DF
              • MapVirtualKeyW.USER32(00000025,00000000), ref: 003D25E9
              • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 003D2601
              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 003D2605
              • MapVirtualKeyW.USER32(00000025,00000000), ref: 003D260F
              • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 003D2623
              • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 003D2627
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
              • String ID:
              • API String ID: 2014098862-0
              • Opcode ID: 18443dab2d5f04feac483eed1c30944f8c6f4eb239e1303ce2a4137c8c9a989b
              • Instruction ID: 4e224787edd644bcbd4f7b5d62c8aec09925cb2a115cf3484ba7d7979a8064de
              • Opcode Fuzzy Hash: 18443dab2d5f04feac483eed1c30944f8c6f4eb239e1303ce2a4137c8c9a989b
              • Instruction Fuzzy Hash: 1001B531790210BBFB2067689CCAF593E59DB5AB11F100112F354AE1D1C9F254448AAA
              APIs
              • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,003D1449,?,?,00000000), ref: 003D180C
              • HeapAlloc.KERNEL32(00000000,?,003D1449,?,?,00000000), ref: 003D1813
              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,003D1449,?,?,00000000), ref: 003D1828
              • GetCurrentProcess.KERNEL32(?,00000000,?,003D1449,?,?,00000000), ref: 003D1830
              • DuplicateHandle.KERNEL32(00000000,?,003D1449,?,?,00000000), ref: 003D1833
              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,003D1449,?,?,00000000), ref: 003D1843
              • GetCurrentProcess.KERNEL32(003D1449,00000000,?,003D1449,?,?,00000000), ref: 003D184B
              • DuplicateHandle.KERNEL32(00000000,?,003D1449,?,?,00000000), ref: 003D184E
              • CreateThread.KERNEL32(00000000,00000000,003D1874,00000000,00000000,00000000), ref: 003D1868
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
              • String ID:
              • API String ID: 1957940570-0
              • Opcode ID: 01b52fb17eafebd91a9990a5ef58ba1cf054bec9858e8689a186f3b4f7868489
              • Instruction ID: 5458e197309884f3e31f36601b3dd4e5af3049f245d4629ba2fc4a3201304bbb
              • Opcode Fuzzy Hash: 01b52fb17eafebd91a9990a5ef58ba1cf054bec9858e8689a186f3b4f7868489
              • Instruction Fuzzy Hash: 4001AC75240304FFE610AB75DD89F573B6CEB89B11F004521FA05DB191C6709C00CF24
              APIs
                • Part of subcall function 003DD4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 003DD501
                • Part of subcall function 003DD4DC: Process32FirstW.KERNEL32(00000000,?), ref: 003DD50F
                • Part of subcall function 003DD4DC: CloseHandle.KERNEL32(00000000), ref: 003DD5DC
              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 003FA16D
              • GetLastError.KERNEL32 ref: 003FA180
              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 003FA1B3
              • TerminateProcess.KERNEL32(00000000,00000000), ref: 003FA268
              • GetLastError.KERNEL32(00000000), ref: 003FA273
              • CloseHandle.KERNEL32(00000000), ref: 003FA2C4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
              • String ID: SeDebugPrivilege
              • API String ID: 2533919879-2896544425
              • Opcode ID: ab1909a247ac15d45477661a7fa507a45316de3d1ed307c63dd2b9db76b41d02
              • Instruction ID: cd7aa2599f44ae00e5bd73b8ea46b4a386e5e263a36c79b1ff504140a7c00742
              • Opcode Fuzzy Hash: ab1909a247ac15d45477661a7fa507a45316de3d1ed307c63dd2b9db76b41d02
              • Instruction Fuzzy Hash: 7D61AC71204602AFD322DF18C4D4F29BBA5AF44318F15849CE56A4F7A3C776EC45CB92
              APIs
              • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00403925
              • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 0040393A
              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00403954
              • _wcslen.LIBCMT ref: 00403999
              • SendMessageW.USER32(?,00001057,00000000,?), ref: 004039C6
              • SendMessageW.USER32(?,00001061,?,0000000F), ref: 004039F4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: MessageSend$Window_wcslen
              • String ID: SysListView32
              • API String ID: 2147712094-78025650
              • Opcode ID: b5983d623d38b2bbcc7073d6b81ba41fc3ab45c2a14694e32a33c05b7865a6ea
              • Instruction ID: eed7703068d2814efbaabf01068b3338bc8c07160c91198fb05e49128c3ad7f2
              • Opcode Fuzzy Hash: b5983d623d38b2bbcc7073d6b81ba41fc3ab45c2a14694e32a33c05b7865a6ea
              • Instruction Fuzzy Hash: 2B41A171A00218ABEB219F64CC45BEB7BA9EF08350F100536F958F72C1D7799D80CB94
              APIs
              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 003DBCFD
              • IsMenu.USER32(00000000), ref: 003DBD1D
              • CreatePopupMenu.USER32 ref: 003DBD53
              • GetMenuItemCount.USER32(01145CB8), ref: 003DBDA4
              • InsertMenuItemW.USER32(01145CB8,?,00000001,00000030), ref: 003DBDCC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Menu$Item$CountCreateInfoInsertPopup
              • String ID: 0$2
              • API String ID: 93392585-3793063076
              • Opcode ID: 845153bab7cc46b837389b0807f10d4b369b4bab1ba7298dfa0f60c89863bf98
              • Instruction ID: 78caa5e97113cfc83a08d33a90e06c0aedd62c037d2260adbf17ebeea576073e
              • Opcode Fuzzy Hash: 845153bab7cc46b837389b0807f10d4b369b4bab1ba7298dfa0f60c89863bf98
              • Instruction Fuzzy Hash: 09519172600245EBDB12CFA8E9C4BADFBFABF49314F16425AE441AB390D7709940CB51
              APIs
              • _ValidateLocalCookies.LIBCMT ref: 00392D4B
              • ___except_validate_context_record.LIBVCRUNTIME ref: 00392D53
              • _ValidateLocalCookies.LIBCMT ref: 00392DE1
              • __IsNonwritableInCurrentImage.LIBCMT ref: 00392E0C
              • _ValidateLocalCookies.LIBCMT ref: 00392E61
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
              • String ID: &H9$csm
              • API String ID: 1170836740-3902721481
              • Opcode ID: 7e42714fa4ecd24624004d01f201293f99d1568622c80844b2a5a24c8b83b2aa
              • Instruction ID: 3dd9b3020ccf8d4e58bef565e0212342f3146a4779f73f9c2a9a7fb03dbd5b81
              • Opcode Fuzzy Hash: 7e42714fa4ecd24624004d01f201293f99d1568622c80844b2a5a24c8b83b2aa
              • Instruction Fuzzy Hash: FE419234E01609ABCF16DF68C885A9FBBB5BF44324F158165E824AB392D731AE45CBD0
              APIs
              • LoadIconW.USER32(00000000,00007F03), ref: 003DC913
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: IconLoad
              • String ID: blank$info$question$stop$warning
              • API String ID: 2457776203-404129466
              • Opcode ID: 44b599eb4e43165bf1852ee00357d9c829a02bd759c2e08c85fef418a2a75c55
              • Instruction ID: d35aae2d8450f0757bd59bb523e4262b33547d8a87d06a47d8709c12b49e6900
              • Opcode Fuzzy Hash: 44b599eb4e43165bf1852ee00357d9c829a02bd759c2e08c85fef418a2a75c55
              • Instruction Fuzzy Hash: DB113D336B9307BAEB035B54FC93DAA27DCDF15324B61502BF500A6382D7745D00D268
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: _wcslen$LocalTime
              • String ID:
              • API String ID: 952045576-0
              • Opcode ID: 642d03c27b903aa901330ee4f66056aaa4beda0a0e4167ea3b0c2daf48aea430
              • Instruction ID: fe7244ed7257e0cef523e0081e4f7c448afe3cf6e1e7d43281c91352370b136d
              • Opcode Fuzzy Hash: 642d03c27b903aa901330ee4f66056aaa4beda0a0e4167ea3b0c2daf48aea430
              • Instruction Fuzzy Hash: BB418166C1021875CF12FBB48C8B9CFB7A8AF45710F508962E558EB222FB34E255C3E5
              APIs
              • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,003C682C,00000004,00000000,00000000), ref: 0038F953
              • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,003C682C,00000004,00000000,00000000), ref: 003CF3D1
              • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,003C682C,00000004,00000000,00000000), ref: 003CF454
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ShowWindow
              • String ID:
              • API String ID: 1268545403-0
              • Opcode ID: bf8042bda7f9e5743f35035c1ef8e0d725549814d16663137f2c1aa9cbc7b614
              • Instruction ID: 5ea3b9bc89bb5d330dc7c96a1ecca0d74a3a73d49c32d1b0bae5e4d82cd93f82
              • Opcode Fuzzy Hash: bf8042bda7f9e5743f35035c1ef8e0d725549814d16663137f2c1aa9cbc7b614
              • Instruction Fuzzy Hash: 0F412A35608780FED73BBB29C988B2A7B96AB56314F15457DE087A7960C736A880CB11
              APIs
              • DeleteObject.GDI32(00000000), ref: 00402D1B
              • GetDC.USER32(00000000), ref: 00402D23
              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00402D2E
              • ReleaseDC.USER32(00000000,00000000), ref: 00402D3A
              • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00402D76
              • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00402D87
              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00405A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00402DC2
              • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00402DE1
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
              • String ID:
              • API String ID: 3864802216-0
              • Opcode ID: c38bea09b39ea9f9c24ebb64b9d94c39580ca1b7a9944e3282e99458b880d1c7
              • Instruction ID: 1be4d317e68232733c7121cc9e075da050426d62f86a185ec45976965bd32700
              • Opcode Fuzzy Hash: c38bea09b39ea9f9c24ebb64b9d94c39580ca1b7a9944e3282e99458b880d1c7
              • Instruction Fuzzy Hash: F9317F72201214BFEB214F50CD89FEB3BADEF09755F044165FE08AA2D1C6B59C51CBA8
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: _memcmp
              • String ID:
              • API String ID: 2931989736-0
              • Opcode ID: e4c496fecb08f274b85e314c38acb353ffffc8fafc487fea71dba04fe9179a93
              • Instruction ID: fc276b970acabc494372bc924ca5e2bea64c7542b43b8c6c101d751fd7a11a1b
              • Opcode Fuzzy Hash: e4c496fecb08f274b85e314c38acb353ffffc8fafc487fea71dba04fe9179a93
              • Instruction Fuzzy Hash: 1221AA67645A09B7E6175520AD82FBA336CAF11385F640033FD047EB81F734ED1485A9
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID:
              • String ID: NULL Pointer assignment$Not an Object type
              • API String ID: 0-572801152
              • Opcode ID: 51c63d1aaaeb2d4185a0866c0790dda8e1a9581666163e1fd9cbd84112c6870d
              • Instruction ID: 248aad4d44aa40b588ce8044aea742e16d093d195ee5abf4a130e074daafc6e1
              • Opcode Fuzzy Hash: 51c63d1aaaeb2d4185a0866c0790dda8e1a9581666163e1fd9cbd84112c6870d
              • Instruction Fuzzy Hash: 54D1B175A0060EAFDF11CFA8C880BBEB7B5BF48344F158569EA15AB281D770ED45CB90
              APIs
              • GetCPInfo.KERNEL32(?,?), ref: 003B15CE
              • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 003B1651
              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 003B16E4
              • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 003B16FB
                • Part of subcall function 003A3820: RtlAllocateHeap.NTDLL(00000000,?,00441444,?,0038FDF5,?,?,0037A976,00000010,00441440,003713FC,?,003713C6,?,00371129), ref: 003A3852
              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 003B1777
              • __freea.LIBCMT ref: 003B17A2
              • __freea.LIBCMT ref: 003B17AE
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
              • String ID:
              • API String ID: 2829977744-0
              • Opcode ID: 29acf06168ccb87c1ba72878dee5fcb22a21e556a91c85ac0159281d80067195
              • Instruction ID: 9b1021d397ba27e579c26af9d7d25a08928d80a20a20accad3f75ee4c8a38f99
              • Opcode Fuzzy Hash: 29acf06168ccb87c1ba72878dee5fcb22a21e556a91c85ac0159281d80067195
              • Instruction Fuzzy Hash: 0891E971E102069EDF228F74C8A2AEF7BB5DF46318F950629EA01E7540DB35CC44C760
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Variant$ClearInit
              • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
              • API String ID: 2610073882-625585964
              • Opcode ID: 2655efee2280646bdfc90bc1dfaae8964acabdfb191691259ddbc4f9d229b139
              • Instruction ID: 2e1d13ce97047e6488376848379725e4556f6ac140c7cff9704e8dd3833dc195
              • Opcode Fuzzy Hash: 2655efee2280646bdfc90bc1dfaae8964acabdfb191691259ddbc4f9d229b139
              • Instruction Fuzzy Hash: 53919D71A00219ABDF25DFA5C884FBFBBB8EF46710F108569F615AB280D7709945CFA0
              APIs
              • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 003E125C
              • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 003E1284
              • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 003E12A8
              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 003E12D8
              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 003E135F
              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 003E13C4
              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 003E1430
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ArraySafe$Data$Access$UnaccessVartype
              • String ID:
              • API String ID: 2550207440-0
              • Opcode ID: 4c629720526cbebeb4f7f5903f777b2b1243cebebdc845d789563c6431a83344
              • Instruction ID: ad68eafa304078e9b2e45ca8462a5d07c78bd4e85447d1b9ab3b699131249b86
              • Opcode Fuzzy Hash: 4c629720526cbebeb4f7f5903f777b2b1243cebebdc845d789563c6431a83344
              • Instruction Fuzzy Hash: B191E175A00268DFDB02DFA6C885BBEB7B9FF45314F114629EA00EB2D1D774A941CB90
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ObjectSelect$BeginCreatePath
              • String ID:
              • API String ID: 3225163088-0
              • Opcode ID: b058a5661b5c1c8d2fa9f4f651a84730e0ac6744a16d6505b2061966bbd7c414
              • Instruction ID: 35685665b2642e265abae0366d339d0228d27087be00e7ec2ff107786df6aa35
              • Opcode Fuzzy Hash: b058a5661b5c1c8d2fa9f4f651a84730e0ac6744a16d6505b2061966bbd7c414
              • Instruction Fuzzy Hash: 42911771900219EFCB11DFA9C884AEEBBB8FF49320F18459AE915B7251D374AA41CF60
              APIs
              • VariantInit.OLEAUT32(?), ref: 003F396B
              • CharUpperBuffW.USER32(?,?), ref: 003F3A7A
              • _wcslen.LIBCMT ref: 003F3A8A
              • VariantClear.OLEAUT32(?), ref: 003F3C1F
                • Part of subcall function 003E0CDF: VariantInit.OLEAUT32(00000000), ref: 003E0D1F
                • Part of subcall function 003E0CDF: VariantCopy.OLEAUT32(?,?), ref: 003E0D28
                • Part of subcall function 003E0CDF: VariantClear.OLEAUT32(?), ref: 003E0D34
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
              • String ID: AUTOIT.ERROR$Incorrect Parameter format
              • API String ID: 4137639002-1221869570
              • Opcode ID: 8754023ae855aeda738fbd9e0bd50a31f591f0da545e59fdd40edf9cc5e42434
              • Instruction ID: 7f68eae111bab92acd3eaec91fbf816571a1bfce21cf937cbebcb1be5b1f2f4d
              • Opcode Fuzzy Hash: 8754023ae855aeda738fbd9e0bd50a31f591f0da545e59fdd40edf9cc5e42434
              • Instruction Fuzzy Hash: 59918A746083059FCB15EF28C48196AB7E4FF88314F14896EF98A9B351DB31EE45CB92
              APIs
                • Part of subcall function 003D000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,003CFF41,80070057,?,?,?,003D035E), ref: 003D002B
                • Part of subcall function 003D000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,003CFF41,80070057,?,?), ref: 003D0046
                • Part of subcall function 003D000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,003CFF41,80070057,?,?), ref: 003D0054
                • Part of subcall function 003D000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,003CFF41,80070057,?), ref: 003D0064
              • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 003F4C51
              • _wcslen.LIBCMT ref: 003F4D59
              • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 003F4DCF
              • CoTaskMemFree.OLE32(?), ref: 003F4DDA
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
              • String ID: NULL Pointer assignment
              • API String ID: 614568839-2785691316
              • Opcode ID: 685d8e292f9051ee65b8e8638fc0f37f2dc0baa0458cd8902018dab88f046eb2
              • Instruction ID: dcfad94634e0fe26a872d5754c44b64ac93723844a3136235f71da597f0a918e
              • Opcode Fuzzy Hash: 685d8e292f9051ee65b8e8638fc0f37f2dc0baa0458cd8902018dab88f046eb2
              • Instruction Fuzzy Hash: C2910A71D0021DEFDF26DFA4D891EEEB7B8BF48314F10816AE519AB251DB349A448F60
              APIs
              • GetMenu.USER32(?), ref: 00402183
              • GetMenuItemCount.USER32(00000000), ref: 004021B5
              • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 004021DD
              • _wcslen.LIBCMT ref: 00402213
              • GetMenuItemID.USER32(?,?), ref: 0040224D
              • GetSubMenu.USER32(?,?), ref: 0040225B
                • Part of subcall function 003D3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 003D3A57
                • Part of subcall function 003D3A3D: GetCurrentThreadId.KERNEL32 ref: 003D3A5E
                • Part of subcall function 003D3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,003D25B3), ref: 003D3A65
              • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 004022E3
                • Part of subcall function 003DE97B: Sleep.KERNEL32 ref: 003DE9F3
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
              • String ID:
              • API String ID: 4196846111-0
              • Opcode ID: a64653faa6738796b7f0c94e83186f12cf82ad4d08568a9c53dacaeb3988922b
              • Instruction ID: 119edc1eeb309ebbf6aa019364f9eb206b0bec22743727bc6e7a4db5f901f08f
              • Opcode Fuzzy Hash: a64653faa6738796b7f0c94e83186f12cf82ad4d08568a9c53dacaeb3988922b
              • Instruction Fuzzy Hash: 4A718375A00215AFCB11EFA4C985AAEB7F5EF48310F1484A9E816FB381D778ED418B94
              APIs
              • GetParent.USER32(?), ref: 003DAEF9
              • GetKeyboardState.USER32(?), ref: 003DAF0E
              • SetKeyboardState.USER32(?), ref: 003DAF6F
              • PostMessageW.USER32(?,00000101,00000010,?), ref: 003DAF9D
              • PostMessageW.USER32(?,00000101,00000011,?), ref: 003DAFBC
              • PostMessageW.USER32(?,00000101,00000012,?), ref: 003DAFFD
              • PostMessageW.USER32(?,00000101,0000005B,?), ref: 003DB020
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: MessagePost$KeyboardState$Parent
              • String ID:
              • API String ID: 87235514-0
              • Opcode ID: 891f3067d93fafee15b42e649df282b7f38da3ad0a3c91c77010722181a4869a
              • Instruction ID: 2bde09360076d66d81dd5b666d7b41b372bdb14924394bb6e7ccd57c2ee1679b
              • Opcode Fuzzy Hash: 891f3067d93fafee15b42e649df282b7f38da3ad0a3c91c77010722181a4869a
              • Instruction Fuzzy Hash: 335103A2A04BD57DFB3343349C45BBBBEE95B06304F0A898AE1D9559C2C3D8ADC8D351
              APIs
              • GetParent.USER32(00000000), ref: 003DAD19
              • GetKeyboardState.USER32(?), ref: 003DAD2E
              • SetKeyboardState.USER32(?), ref: 003DAD8F
              • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 003DADBB
              • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 003DADD8
              • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 003DAE17
              • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 003DAE38
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: MessagePost$KeyboardState$Parent
              • String ID:
              • API String ID: 87235514-0
              • Opcode ID: bae9a32ef09c82999887f15345d4d5a57f66901b1e26f2851ad27d81232b31c7
              • Instruction ID: 920769793d57a9e3b24b53e4c21bcc1a6800688ee594826ef8ea8c5824fe26cf
              • Opcode Fuzzy Hash: bae9a32ef09c82999887f15345d4d5a57f66901b1e26f2851ad27d81232b31c7
              • Instruction Fuzzy Hash: 54512AA3504BD53DFB334334DD55B7ABF996B06300F09898AE0D546AC2C394EC98E362
              APIs
              • GetConsoleCP.KERNEL32(003B3CD6,?,?,?,?,?,?,?,?,003A5BA3,?,?,003B3CD6,?,?), ref: 003A5470
              • __fassign.LIBCMT ref: 003A54EB
              • __fassign.LIBCMT ref: 003A5506
              • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,003B3CD6,00000005,00000000,00000000), ref: 003A552C
              • WriteFile.KERNEL32(?,003B3CD6,00000000,003A5BA3,00000000,?,?,?,?,?,?,?,?,?,003A5BA3,?), ref: 003A554B
              • WriteFile.KERNEL32(?,?,00000001,003A5BA3,00000000,?,?,?,?,?,?,?,?,?,003A5BA3,?), ref: 003A5584
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
              • String ID:
              • API String ID: 1324828854-0
              • Opcode ID: a82b23714d93a5bf9d298251f9682e2829c0a3f9cc10321497dc29863b06f9cf
              • Instruction ID: ca9b67b8cdaee76c2a193f2af34197dff163c1b15b7dcbb9d225d39953ca9e7a
              • Opcode Fuzzy Hash: a82b23714d93a5bf9d298251f9682e2829c0a3f9cc10321497dc29863b06f9cf
              • Instruction Fuzzy Hash: 5551C571E006499FDB11CFA8D885AEEBBF9EF0A300F14412AF956E7291D730DA45CB64
              APIs
                • Part of subcall function 003F304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 003F307A
                • Part of subcall function 003F304E: _wcslen.LIBCMT ref: 003F309B
              • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 003F1112
              • WSAGetLastError.WSOCK32 ref: 003F1121
              • WSAGetLastError.WSOCK32 ref: 003F11C9
              • closesocket.WSOCK32(00000000), ref: 003F11F9
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
              • String ID:
              • API String ID: 2675159561-0
              • Opcode ID: 0936ee9880f1e68a83bdbbe05f8e6a49c6e0ac998e8027fc41c9a6567621ad34
              • Instruction ID: 147c845c5099f860d8232e389ad60ca816ecd76c469f869591c0684b68cb8d61
              • Opcode Fuzzy Hash: 0936ee9880f1e68a83bdbbe05f8e6a49c6e0ac998e8027fc41c9a6567621ad34
              • Instruction Fuzzy Hash: 2B41D431600208EFDB219F24D885BBAB7E9EF45324F148169FA19AF291C774AD41CBE5
              APIs
                • Part of subcall function 003DDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,003DCF22,?), ref: 003DDDFD
                • Part of subcall function 003DDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,003DCF22,?), ref: 003DDE16
              • lstrcmpiW.KERNEL32(?,?), ref: 003DCF45
              • MoveFileW.KERNEL32(?,?), ref: 003DCF7F
              • _wcslen.LIBCMT ref: 003DD005
              • _wcslen.LIBCMT ref: 003DD01B
              • SHFileOperationW.SHELL32(?), ref: 003DD061
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
              • String ID: \*.*
              • API String ID: 3164238972-1173974218
              • Opcode ID: 58fbcc52cf14a05b4fa85b9da9d0aab39ddb5d52344b7911d2e9a2a0cd380064
              • Instruction ID: 480e316087b1ff632e4de6dbe055005925f76eb6087d65a160e24000485b5826
              • Opcode Fuzzy Hash: 58fbcc52cf14a05b4fa85b9da9d0aab39ddb5d52344b7911d2e9a2a0cd380064
              • Instruction Fuzzy Hash: 714156729552199FDF13EBA4D981EDDB7BDAF08780F1000E7E509EB241EB34A648CB50
              APIs
              • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00402E1C
              • GetWindowLongW.USER32(00000000,000000F0), ref: 00402E4F
              • GetWindowLongW.USER32(00000000,000000F0), ref: 00402E84
              • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00402EB6
              • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00402EE0
              • GetWindowLongW.USER32(00000000,000000F0), ref: 00402EF1
              • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00402F0B
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: LongWindow$MessageSend
              • String ID:
              • API String ID: 2178440468-0
              • Opcode ID: 539af94d766928d004d985f5f1874b385dd7531e2097d5495ea5450a56d92259
              • Instruction ID: d3cccf2422f1d46d505961081031bee019b921736404247e78e31c904dd6afc9
              • Opcode Fuzzy Hash: 539af94d766928d004d985f5f1874b385dd7531e2097d5495ea5450a56d92259
              • Instruction Fuzzy Hash: AF310734684150EFDB21CF58DE88F6637E5EB8A750F150176FA04AB2F1CBB5A840DB89
              APIs
              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 003D7769
              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 003D778F
              • SysAllocString.OLEAUT32(00000000), ref: 003D7792
              • SysAllocString.OLEAUT32(?), ref: 003D77B0
              • SysFreeString.OLEAUT32(?), ref: 003D77B9
              • StringFromGUID2.OLE32(?,?,00000028), ref: 003D77DE
              • SysAllocString.OLEAUT32(?), ref: 003D77EC
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
              • String ID:
              • API String ID: 3761583154-0
              • Opcode ID: 80b14234adc1fb7ec66b4abd972b07adbacac830c6aea9344cc031aeb1e1b4fa
              • Instruction ID: 4ad2638a2898fb0983182720c7810614b34824a7e2c6bae065f6eaeef5b7e18a
              • Opcode Fuzzy Hash: 80b14234adc1fb7ec66b4abd972b07adbacac830c6aea9344cc031aeb1e1b4fa
              • Instruction Fuzzy Hash: DA21B076604219AFDB11EFB8DC88CBB73ACFB093647008926FA14DB290E670DC418B64
              APIs
              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 003D7842
              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 003D7868
              • SysAllocString.OLEAUT32(00000000), ref: 003D786B
              • SysAllocString.OLEAUT32 ref: 003D788C
              • SysFreeString.OLEAUT32 ref: 003D7895
              • StringFromGUID2.OLE32(?,?,00000028), ref: 003D78AF
              • SysAllocString.OLEAUT32(?), ref: 003D78BD
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
              • String ID:
              • API String ID: 3761583154-0
              • Opcode ID: 230aaa4c689fde0b410a6aaafa8907dab1e551c44c632e4f319445fd95a4e593
              • Instruction ID: 36bba7f77379beca84655be5867aff107ff56716361638807e24a4ea40029c8b
              • Opcode Fuzzy Hash: 230aaa4c689fde0b410a6aaafa8907dab1e551c44c632e4f319445fd95a4e593
              • Instruction Fuzzy Hash: 3F218632604204EFDB11AFB8DC8EDAA77ECFB097607118126F915DB2A1E670DC41DB68
              APIs
              • GetStdHandle.KERNEL32(0000000C), ref: 003E04F2
              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 003E052E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: CreateHandlePipe
              • String ID: nul
              • API String ID: 1424370930-2873401336
              • Opcode ID: 7f023ce5379895187af463a2121e1c38e7f73502821c0fa01cf85303614a5e8e
              • Instruction ID: 76f7675ac2fcf7048197b089497155198802cfd00e169af3dbb66d4d0f8aab04
              • Opcode Fuzzy Hash: 7f023ce5379895187af463a2121e1c38e7f73502821c0fa01cf85303614a5e8e
              • Instruction Fuzzy Hash: D1218D75504355EBDB259F2ADC44A9A77B8AF46724F204B29F8E1E62E0D7B0D980CF20
              APIs
              • GetStdHandle.KERNEL32(000000F6), ref: 003E05C6
              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 003E0601
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: CreateHandlePipe
              • String ID: nul
              • API String ID: 1424370930-2873401336
              • Opcode ID: 9ee1400e97b54fd03ea7d898cadfde03f4130c13ce73f235e6af0614ee86564a
              • Instruction ID: 32c63cbc17a9267e8526e159086d064b3d1630e399e43d283ce3c9162fef36c1
              • Opcode Fuzzy Hash: 9ee1400e97b54fd03ea7d898cadfde03f4130c13ce73f235e6af0614ee86564a
              • Instruction Fuzzy Hash: 02219F35500365DBDB259F6A9C44B9A77A8EF85720F200B19E8A1E72E0D7B098A0CB14
              APIs
                • Part of subcall function 0037600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0037604C
                • Part of subcall function 0037600E: GetStockObject.GDI32(00000011), ref: 00376060
                • Part of subcall function 0037600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0037606A
              • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00404112
              • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0040411F
              • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0040412A
              • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00404139
              • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00404145
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: MessageSend$CreateObjectStockWindow
              • String ID: Msctls_Progress32
              • API String ID: 1025951953-3636473452
              • Opcode ID: e7d426e5f884652880c4722bb6f3521353b51b38edfbe5a075884771f407c4f7
              • Instruction ID: 8aa0cab16fec5c3c3d333e99afab9de84d0676911ea25425d83e85c8a3cbaf53
              • Opcode Fuzzy Hash: e7d426e5f884652880c4722bb6f3521353b51b38edfbe5a075884771f407c4f7
              • Instruction Fuzzy Hash: 6311B6B214011DBEEF219F64CC86EE77F5DEF08798F004121B718A6190CB769C61DBA4
              APIs
                • Part of subcall function 003AD7A3: _free.LIBCMT ref: 003AD7CC
              • _free.LIBCMT ref: 003AD82D
                • Part of subcall function 003A29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,003AD7D1,00000000,00000000,00000000,00000000,?,003AD7F8,00000000,00000007,00000000,?,003ADBF5,00000000), ref: 003A29DE
                • Part of subcall function 003A29C8: GetLastError.KERNEL32(00000000,?,003AD7D1,00000000,00000000,00000000,00000000,?,003AD7F8,00000000,00000007,00000000,?,003ADBF5,00000000,00000000), ref: 003A29F0
              • _free.LIBCMT ref: 003AD838
              • _free.LIBCMT ref: 003AD843
              • _free.LIBCMT ref: 003AD897
              • _free.LIBCMT ref: 003AD8A2
              • _free.LIBCMT ref: 003AD8AD
              • _free.LIBCMT ref: 003AD8B8
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
              • Instruction ID: 1fb63285f9c56c4f7c83b1c46e82600fd9d055a38eb6ea40749a365d986213d5
              • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
              • Instruction Fuzzy Hash: 31112171540B04AAD567BFB0CC4BFCB7BDCEF07700F404829B29AAE8A2DB67B5154651
              APIs
              • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 003DDA74
              • LoadStringW.USER32(00000000), ref: 003DDA7B
              • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 003DDA91
              • LoadStringW.USER32(00000000), ref: 003DDA98
              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 003DDADC
              Strings
              • %s (%d) : ==> %s: %s %s, xrefs: 003DDAB9
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: HandleLoadModuleString$Message
              • String ID: %s (%d) : ==> %s: %s %s
              • API String ID: 4072794657-3128320259
              • Opcode ID: f1168b336655925d872902093b5c6f8b51090074e6c2c91d9b4c8e562d6fdd52
              • Instruction ID: 4a3714a1a480eca7f9cf81999cc6d2d97784ae2563232b7c44d4c378d782de68
              • Opcode Fuzzy Hash: f1168b336655925d872902093b5c6f8b51090074e6c2c91d9b4c8e562d6fdd52
              • Instruction Fuzzy Hash: 860162F6900208BFE7119BA49EC9EE7326CE708301F4449A2B706F6081E6749E844F78
              APIs
              • InterlockedExchange.KERNEL32(0113D948,0113D948), ref: 003E097B
              • EnterCriticalSection.KERNEL32(0113D928,00000000), ref: 003E098D
              • TerminateThread.KERNEL32(0113D940,000001F6), ref: 003E099B
              • WaitForSingleObject.KERNEL32(0113D940,000003E8), ref: 003E09A9
              • CloseHandle.KERNEL32(0113D940), ref: 003E09B8
              • InterlockedExchange.KERNEL32(0113D948,000001F6), ref: 003E09C8
              • LeaveCriticalSection.KERNEL32(0113D928), ref: 003E09CF
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
              • String ID:
              • API String ID: 3495660284-0
              • Opcode ID: f2a896317e966c60ae4e53948426d34895af459c1a389a75e198bc919f84fb05
              • Instruction ID: 2b0e951a412a50a6beefea964218dae10655f6b3786ea0723c5317fe73ef07fb
              • Opcode Fuzzy Hash: f2a896317e966c60ae4e53948426d34895af459c1a389a75e198bc919f84fb05
              • Instruction Fuzzy Hash: 94F01D31442512EBD7465FA4EFC8AD67A25BF01702F401225F10160CA1C7749465CF94
              APIs
              • __allrem.LIBCMT ref: 003A00BA
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 003A00D6
              • __allrem.LIBCMT ref: 003A00ED
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 003A010B
              • __allrem.LIBCMT ref: 003A0122
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 003A0140
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
              • String ID:
              • API String ID: 1992179935-0
              • Opcode ID: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
              • Instruction ID: 75437bfd2d9815ef6c844d77a7f14b00d2c3029fd4eee3eec147697f53783b1a
              • Opcode Fuzzy Hash: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
              • Instruction Fuzzy Hash: FF811776A007069FEB269F78CC41BABB3E8EF42724F25463AF551DB681E774D9008B50
              APIs
              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,003982D9,003982D9,?,?,?,003A644F,00000001,00000001,8BE85006), ref: 003A6258
              • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,003A644F,00000001,00000001,8BE85006,?,?,?), ref: 003A62DE
              • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 003A63D8
              • __freea.LIBCMT ref: 003A63E5
                • Part of subcall function 003A3820: RtlAllocateHeap.NTDLL(00000000,?,00441444,?,0038FDF5,?,?,0037A976,00000010,00441440,003713FC,?,003713C6,?,00371129), ref: 003A3852
              • __freea.LIBCMT ref: 003A63EE
              • __freea.LIBCMT ref: 003A6413
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ByteCharMultiWide__freea$AllocateHeap
              • String ID:
              • API String ID: 1414292761-0
              • Opcode ID: e40a2c737b88fd044169f8f5916ddf5c668b0fb4b6e65b22ea8f02179c510b6d
              • Instruction ID: 8105d3485dbc01e21882946602313c07c1805ef7e1ca540e16169715d044424e
              • Opcode Fuzzy Hash: e40a2c737b88fd044169f8f5916ddf5c668b0fb4b6e65b22ea8f02179c510b6d
              • Instruction Fuzzy Hash: 4D51B472A00216AFDF278F64CC82EAF77A9EF46750F1A4629FD05DA190DB34DC45C660
              APIs
                • Part of subcall function 00379CB3: _wcslen.LIBCMT ref: 00379CBD
                • Part of subcall function 003FC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,003FB6AE,?,?), ref: 003FC9B5
                • Part of subcall function 003FC998: _wcslen.LIBCMT ref: 003FC9F1
                • Part of subcall function 003FC998: _wcslen.LIBCMT ref: 003FCA68
                • Part of subcall function 003FC998: _wcslen.LIBCMT ref: 003FCA9E
              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 003FBCCA
              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 003FBD25
              • RegCloseKey.ADVAPI32(00000000), ref: 003FBD6A
              • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 003FBD99
              • RegCloseKey.ADVAPI32(?,?,00000000), ref: 003FBDF3
              • RegCloseKey.ADVAPI32(?), ref: 003FBDFF
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
              • String ID:
              • API String ID: 1120388591-0
              • Opcode ID: 140d9b14c0f279f44ebd86485a71209c48eef698c6fade2578087bc8615194c7
              • Instruction ID: abafbda6018fa209eb918f49d1b59915671d34fde84455e870329a07cc0d61eb
              • Opcode Fuzzy Hash: 140d9b14c0f279f44ebd86485a71209c48eef698c6fade2578087bc8615194c7
              • Instruction Fuzzy Hash: 7581A070208245EFD716DF24C881E2ABBE9FF84308F14856DF5594B2A2DB31ED45CB92
              APIs
              • VariantInit.OLEAUT32(00000035), ref: 003CF7B9
              • SysAllocString.OLEAUT32(00000001), ref: 003CF860
              • VariantCopy.OLEAUT32(003CFA64,00000000), ref: 003CF889
              • VariantClear.OLEAUT32(003CFA64), ref: 003CF8AD
              • VariantCopy.OLEAUT32(003CFA64,00000000), ref: 003CF8B1
              • VariantClear.OLEAUT32(?), ref: 003CF8BB
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Variant$ClearCopy$AllocInitString
              • String ID:
              • API String ID: 3859894641-0
              • Opcode ID: a8ac0ba6bf0103afa9cd2fa5f63adf858d8355242c76876f84c7f58ebdf4d077
              • Instruction ID: 4c38ba58cd43c2266a16a2e02f637dbfa94e28da7d94124710346a8654e227c1
              • Opcode Fuzzy Hash: a8ac0ba6bf0103afa9cd2fa5f63adf858d8355242c76876f84c7f58ebdf4d077
              • Instruction Fuzzy Hash: 0A51D135600310FFCF26AB65D895F29B3AAEF45310B20956BE906EF295DB748C40CB97
              APIs
                • Part of subcall function 00377620: _wcslen.LIBCMT ref: 00377625
                • Part of subcall function 00376B57: _wcslen.LIBCMT ref: 00376B6A
              • GetOpenFileNameW.COMDLG32(00000058), ref: 003E94E5
              • _wcslen.LIBCMT ref: 003E9506
              • _wcslen.LIBCMT ref: 003E952D
              • GetSaveFileNameW.COMDLG32(00000058), ref: 003E9585
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: _wcslen$FileName$OpenSave
              • String ID: X
              • API String ID: 83654149-3081909835
              • Opcode ID: 53dd4cada6f81b7a598100878278a67a9f9daae7b7027aca1d145deffa81dd7f
              • Instruction ID: 305132647472c3ccc2c474306d4426e4e83831ff784e4a39fc6c12be2708a2de
              • Opcode Fuzzy Hash: 53dd4cada6f81b7a598100878278a67a9f9daae7b7027aca1d145deffa81dd7f
              • Instruction Fuzzy Hash: D9E1C2305043509FD726DF25C481B6AB7E4BF85314F058A6EF8899B2E2DB30ED05CB92
              APIs
                • Part of subcall function 00389BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00389BB2
              • BeginPaint.USER32(?,?,?), ref: 00389241
              • GetWindowRect.USER32(?,?), ref: 003892A5
              • ScreenToClient.USER32(?,?), ref: 003892C2
              • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 003892D3
              • EndPaint.USER32(?,?,?,?,?), ref: 00389321
              • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 003C71EA
                • Part of subcall function 00389339: BeginPath.GDI32(00000000), ref: 00389357
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
              • String ID:
              • API String ID: 3050599898-0
              • Opcode ID: 6e7d5bab1bbfcfb6532411cd0a79b5f14e97dd985f92443a0e14c45a4427d077
              • Instruction ID: a6a0eee0223402cf336cfb27df321a88f428b88a7c5d80b621bf3becaabb1561
              • Opcode Fuzzy Hash: 6e7d5bab1bbfcfb6532411cd0a79b5f14e97dd985f92443a0e14c45a4427d077
              • Instruction Fuzzy Hash: D8418074104300EFD722EF24D885FBA7BA8EB4A320F18066AF9959B1F1C7719845DB65
              APIs
              • InterlockedExchange.KERNEL32(?,000001F5), ref: 003E080C
              • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 003E0847
              • EnterCriticalSection.KERNEL32(?), ref: 003E0863
              • LeaveCriticalSection.KERNEL32(?), ref: 003E08DC
              • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 003E08F3
              • InterlockedExchange.KERNEL32(?,000001F6), ref: 003E0921
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
              • String ID:
              • API String ID: 3368777196-0
              • Opcode ID: 42afab9a70e76ad9e434b1ecbb6d34ba3bb49b508ca0c40b7c67fdbe9564b8b0
              • Instruction ID: 31fec14e673ff73b9ab8a971c2cb2309c4186f35b5266b0f5f2ecb0d31947f2e
              • Opcode Fuzzy Hash: 42afab9a70e76ad9e434b1ecbb6d34ba3bb49b508ca0c40b7c67fdbe9564b8b0
              • Instruction Fuzzy Hash: C9415A71900205EFDF15AF54DC85A6AB778FF44300B1441A9E900AE297DB70EE60DBA4
              APIs
              • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,003CF3AB,00000000,?,?,00000000,?,003C682C,00000004,00000000,00000000), ref: 0040824C
              • EnableWindow.USER32(00000000,00000000), ref: 00408272
              • ShowWindow.USER32(FFFFFFFF,00000000), ref: 004082D1
              • ShowWindow.USER32(00000000,00000004), ref: 004082E5
              • EnableWindow.USER32(00000000,00000001), ref: 0040830B
              • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 0040832F
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Window$Show$Enable$MessageSend
              • String ID:
              • API String ID: 642888154-0
              • Opcode ID: e8d672a699b6861628bad4a8c1b730ac3eaf91633c746b4f985c6b3034711a77
              • Instruction ID: 7a4967caaecb2dbbe0340c3b4b31896dd3f68e0010469eee2b03e6d2878326c0
              • Opcode Fuzzy Hash: e8d672a699b6861628bad4a8c1b730ac3eaf91633c746b4f985c6b3034711a77
              • Instruction Fuzzy Hash: 94419534601644EFDF21CF15CA99FA57BE0BB4A714F1842BEE9486B2F2CB365841CB58
              APIs
              • IsWindowVisible.USER32(?), ref: 003D4C95
              • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 003D4CB2
              • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 003D4CEA
              • _wcslen.LIBCMT ref: 003D4D08
              • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 003D4D10
              • _wcsstr.LIBVCRUNTIME ref: 003D4D1A
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
              • String ID:
              • API String ID: 72514467-0
              • Opcode ID: 70356a692dd15da93b3b68a66f831df4033f1ca6cdccffba6d2c77a559e7f4e9
              • Instruction ID: 97f448390abb293e0ea0974a777354668a9d5293a88bc4e31e3c65ce7ffd0d42
              • Opcode Fuzzy Hash: 70356a692dd15da93b3b68a66f831df4033f1ca6cdccffba6d2c77a559e7f4e9
              • Instruction Fuzzy Hash: 0B210432204200BBEB266B39BC49E7B7B9DDF45750F10807AF809DA292EA71DC4187A0
              APIs
                • Part of subcall function 00373AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00373A97,?,?,00372E7F,?,?,?,00000000), ref: 00373AC2
              • _wcslen.LIBCMT ref: 003E587B
              • CoInitialize.OLE32(00000000), ref: 003E5995
              • CoCreateInstance.OLE32(0040FCF8,00000000,00000001,0040FB68,?), ref: 003E59AE
              • CoUninitialize.OLE32 ref: 003E59CC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
              • String ID: .lnk
              • API String ID: 3172280962-24824748
              • Opcode ID: 50b6c061d9cf875354b715712f61bb7d070457b3a38c3c5c5295d24e544c1e37
              • Instruction ID: 499aa0f1ec5cf9ccd959bcb4325fba6b3e22b84df5c532ec94f28dd9df74c658
              • Opcode Fuzzy Hash: 50b6c061d9cf875354b715712f61bb7d070457b3a38c3c5c5295d24e544c1e37
              • Instruction Fuzzy Hash: 33D17571604711DFC716DF25C480A6ABBE1EF89728F118A5DF8899B3A2C731EC05CB92
              APIs
                • Part of subcall function 003D0FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 003D0FCA
                • Part of subcall function 003D0FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 003D0FD6
                • Part of subcall function 003D0FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 003D0FE5
                • Part of subcall function 003D0FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 003D0FEC
                • Part of subcall function 003D0FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 003D1002
              • GetLengthSid.ADVAPI32(?,00000000,003D1335), ref: 003D17AE
              • GetProcessHeap.KERNEL32(00000008,00000000), ref: 003D17BA
              • HeapAlloc.KERNEL32(00000000), ref: 003D17C1
              • CopySid.ADVAPI32(00000000,00000000,?), ref: 003D17DA
              • GetProcessHeap.KERNEL32(00000000,00000000,003D1335), ref: 003D17EE
              • HeapFree.KERNEL32(00000000), ref: 003D17F5
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
              • String ID:
              • API String ID: 3008561057-0
              • Opcode ID: ccb4ebe1d8da6e3546aa5b5c2f1a16d0cb425338b4988400259f8a253d9a6658
              • Instruction ID: b9d170ea41431abb81620f5d0cfcdfe0666d95604510aba71e6e6ca962d32a2e
              • Opcode Fuzzy Hash: ccb4ebe1d8da6e3546aa5b5c2f1a16d0cb425338b4988400259f8a253d9a6658
              • Instruction Fuzzy Hash: D711BE72600205FFDB219FA4ED89FAF7BB9FB45355F10422AF441AB220C736A940CB60
              APIs
              • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 003D14FF
              • OpenProcessToken.ADVAPI32(00000000), ref: 003D1506
              • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 003D1515
              • CloseHandle.KERNEL32(00000004), ref: 003D1520
              • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 003D154F
              • DestroyEnvironmentBlock.USERENV(00000000), ref: 003D1563
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
              • String ID:
              • API String ID: 1413079979-0
              • Opcode ID: 21319b6b5a886f0dc47702a6d7d432ad549356c6b8ad34394440252c2681207b
              • Instruction ID: 73b6424108ae8d806e2bafcc8a85b4a6eef0dde5561ac9c91036c46aa2b22cdf
              • Opcode Fuzzy Hash: 21319b6b5a886f0dc47702a6d7d432ad549356c6b8ad34394440252c2681207b
              • Instruction Fuzzy Hash: 47112972500209FBDF128FA8EE49BDE7BB9EF49744F058125FA05A21A0C3758E60DB60
              APIs
              • GetLastError.KERNEL32(?,?,00393379,00392FE5), ref: 00393390
              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0039339E
              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 003933B7
              • SetLastError.KERNEL32(00000000,?,00393379,00392FE5), ref: 00393409
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ErrorLastValue___vcrt_
              • String ID:
              • API String ID: 3852720340-0
              • Opcode ID: 8a4b2a6be941dd8f3504141438609e809d90be37a8212b280fb6d868e4e16b04
              • Instruction ID: 623a69b721445398cd6f76b0cf36ecf48f1021f0eac634963cdfcd1f5ee7c625
              • Opcode Fuzzy Hash: 8a4b2a6be941dd8f3504141438609e809d90be37a8212b280fb6d868e4e16b04
              • Instruction Fuzzy Hash: 250124B224D312BEEF2B27B97DC59672AA4EB153793210339F810991F0EF214D015248
              APIs
              • GetLastError.KERNEL32(?,?,003A5686,003B3CD6,?,00000000,?,003A5B6A,?,?,?,?,?,0039E6D1,?,00438A48), ref: 003A2D78
              • _free.LIBCMT ref: 003A2DAB
              • _free.LIBCMT ref: 003A2DD3
              • SetLastError.KERNEL32(00000000,?,?,?,?,0039E6D1,?,00438A48,00000010,00374F4A,?,?,00000000,003B3CD6), ref: 003A2DE0
              • SetLastError.KERNEL32(00000000,?,?,?,?,0039E6D1,?,00438A48,00000010,00374F4A,?,?,00000000,003B3CD6), ref: 003A2DEC
              • _abort.LIBCMT ref: 003A2DF2
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ErrorLast$_free$_abort
              • String ID:
              • API String ID: 3160817290-0
              • Opcode ID: 87276c2569ec83def7f3b3a71e1ebc2f63b22ea016c82dbeac80bc605b00db2c
              • Instruction ID: ecbe3d20a2bde0c8bd32776891ed0110c494bf46ee76ca8870de3a05326fc16a
              • Opcode Fuzzy Hash: 87276c2569ec83def7f3b3a71e1ebc2f63b22ea016c82dbeac80bc605b00db2c
              • Instruction Fuzzy Hash: 92F0C232545A006BC623273DBC4AF5B365AEFC37A1F260628F834AA1D3EF3488015265
              APIs
                • Part of subcall function 00389639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00389693
                • Part of subcall function 00389639: SelectObject.GDI32(?,00000000), ref: 003896A2
                • Part of subcall function 00389639: BeginPath.GDI32(?), ref: 003896B9
                • Part of subcall function 00389639: SelectObject.GDI32(?,00000000), ref: 003896E2
              • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00408A4E
              • LineTo.GDI32(?,00000003,00000000), ref: 00408A62
              • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00408A70
              • LineTo.GDI32(?,00000000,00000003), ref: 00408A80
              • EndPath.GDI32(?), ref: 00408A90
              • StrokePath.GDI32(?), ref: 00408AA0
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
              • String ID:
              • API String ID: 43455801-0
              • Opcode ID: 164e44c407e12cd9003d784939ab7599d31f874fd0409cd8107f295f7531f91c
              • Instruction ID: 9edc487609da31e553c2df0590724f9dd9cdfbafc612ab1f82b657892c91478a
              • Opcode Fuzzy Hash: 164e44c407e12cd9003d784939ab7599d31f874fd0409cd8107f295f7531f91c
              • Instruction Fuzzy Hash: 8111177600010CFFEF129F90DD88EAA7F6CEB08350F048122FA19AA1A1C7719D95DFA4
              APIs
              • GetDC.USER32(00000000), ref: 003D5218
              • GetDeviceCaps.GDI32(00000000,00000058), ref: 003D5229
              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 003D5230
              • ReleaseDC.USER32(00000000,00000000), ref: 003D5238
              • MulDiv.KERNEL32(000009EC,?,00000000), ref: 003D524F
              • MulDiv.KERNEL32(000009EC,00000001,?), ref: 003D5261
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: CapsDevice$Release
              • String ID:
              • API String ID: 1035833867-0
              • Opcode ID: ddde769e1bb3249919f9be839a6b33f02a9b17e771358cc033ff236479ab0795
              • Instruction ID: bba351f27f3a532546ec7f3c74bbcf56d93a79fc4d75566eb4079d7c5ff452be
              • Opcode Fuzzy Hash: ddde769e1bb3249919f9be839a6b33f02a9b17e771358cc033ff236479ab0795
              • Instruction Fuzzy Hash: 07018F75A01708FBEB109BA59D89F4EBFB8EB48351F044566FA04AB280D6709C04CFA4
              APIs
              • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00371BF4
              • MapVirtualKeyW.USER32(00000010,00000000), ref: 00371BFC
              • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00371C07
              • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00371C12
              • MapVirtualKeyW.USER32(00000011,00000000), ref: 00371C1A
              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00371C22
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Virtual
              • String ID:
              • API String ID: 4278518827-0
              • Opcode ID: 8f7cc237e81da5c842682182284883185508f11a56cde9552644de574556804f
              • Instruction ID: b17aa6607ba9858041bb864917bff1697e0a552c25d371580589993b1c345298
              • Opcode Fuzzy Hash: 8f7cc237e81da5c842682182284883185508f11a56cde9552644de574556804f
              • Instruction Fuzzy Hash: 07016CB0902759BDE3008F5A8C85B52FFA8FF19354F00411B915C47941C7F5A864CBE5
              APIs
              • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 003DEB30
              • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 003DEB46
              • GetWindowThreadProcessId.USER32(?,?), ref: 003DEB55
              • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 003DEB64
              • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 003DEB6E
              • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 003DEB75
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
              • String ID:
              • API String ID: 839392675-0
              • Opcode ID: 2a38d5d4b5904fc9dc31891c78a58666b415bf0e5e6c65a854219e270eaae2e7
              • Instruction ID: 3826180105263fa5d9e4d5136b72b845248ce26cc0952d550f4c0ce03fdf84d6
              • Opcode Fuzzy Hash: 2a38d5d4b5904fc9dc31891c78a58666b415bf0e5e6c65a854219e270eaae2e7
              • Instruction Fuzzy Hash: E1F03072140158FBE72157629D4DEEF3E7CEFCAB11F004269F601E5191D7B15A01CAB9
              APIs
              • GetClientRect.USER32(?), ref: 003C7452
              • SendMessageW.USER32(?,00001328,00000000,?), ref: 003C7469
              • GetWindowDC.USER32(?), ref: 003C7475
              • GetPixel.GDI32(00000000,?,?), ref: 003C7484
              • ReleaseDC.USER32(?,00000000), ref: 003C7496
              • GetSysColor.USER32(00000005), ref: 003C74B0
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ClientColorMessagePixelRectReleaseSendWindow
              • String ID:
              • API String ID: 272304278-0
              • Opcode ID: 2c63ab5e92f27980dda6ca54927e93d49f15f3e349dfe589d124ca06b6ebaa04
              • Instruction ID: 3203ba67490369e908c38c4d2bb3fe01cb6d7ce46d74fbc4a4edea35f33f402f
              • Opcode Fuzzy Hash: 2c63ab5e92f27980dda6ca54927e93d49f15f3e349dfe589d124ca06b6ebaa04
              • Instruction Fuzzy Hash: A7017831400215EFEB215F64DD48BAA7BB9FB04321F110664FE15A20A0CB311E41AF54
              APIs
              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 003D187F
              • UnloadUserProfile.USERENV(?,?), ref: 003D188B
              • CloseHandle.KERNEL32(?), ref: 003D1894
              • CloseHandle.KERNEL32(?), ref: 003D189C
              • GetProcessHeap.KERNEL32(00000000,?), ref: 003D18A5
              • HeapFree.KERNEL32(00000000), ref: 003D18AC
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
              • String ID:
              • API String ID: 146765662-0
              • Opcode ID: a906a694b908f4fea31940c0648d38793f93fb378d1ffd59ec3f91992a9a41b8
              • Instruction ID: 6417558baee8d7b0c1a9fd6010d56d01d3c69fad6f71c3c71cca34e46f1e77ce
              • Opcode Fuzzy Hash: a906a694b908f4fea31940c0648d38793f93fb378d1ffd59ec3f91992a9a41b8
              • Instruction Fuzzy Hash: A4E0C236004101FBDA016BB1EE4CD0ABB39FB49B22B108330F225A50B0CB329420DF98
              APIs
              • __Init_thread_footer.LIBCMT ref: 0037BEB3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Init_thread_footer
              • String ID: D%D$D%D$D%D$D%DD%D
              • API String ID: 1385522511-2851881395
              • Opcode ID: 36828c531a990163e70055d45e571f33880f933d40f7a716c24c81c6ff4f5da4
              • Instruction ID: 80dedb854c564fef468c9944ffd24fa73b3fca05daf6070f296b46a0bf8c5d67
              • Opcode Fuzzy Hash: 36828c531a990163e70055d45e571f33880f933d40f7a716c24c81c6ff4f5da4
              • Instruction Fuzzy Hash: 5F916B75A0020ADFCB2ACF58C0917AAF7F5FF58310F25C16AE949AB350D775A981CB90
              APIs
                • Part of subcall function 00390242: EnterCriticalSection.KERNEL32(0044070C,00441884,?,?,0038198B,00442518,?,?,?,003712F9,00000000), ref: 0039024D
                • Part of subcall function 00390242: LeaveCriticalSection.KERNEL32(0044070C,?,0038198B,00442518,?,?,?,003712F9,00000000), ref: 0039028A
                • Part of subcall function 00379CB3: _wcslen.LIBCMT ref: 00379CBD
                • Part of subcall function 003900A3: __onexit.LIBCMT ref: 003900A9
              • __Init_thread_footer.LIBCMT ref: 003F7BFB
                • Part of subcall function 003901F8: EnterCriticalSection.KERNEL32(0044070C,?,?,00388747,00442514), ref: 00390202
                • Part of subcall function 003901F8: LeaveCriticalSection.KERNEL32(0044070C,?,00388747,00442514), ref: 00390235
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
              • String ID: +T<$5$G$Variable must be of type 'Object'.
              • API String ID: 535116098-2746437690
              • Opcode ID: 04b86cf5df8d5bd4ca604a517ff5b2f24264b8b6ba60e11824c774313ea4517a
              • Instruction ID: 1d1520874a72de0ea2e1aeb441122bcaaf66dbb3e0e75ea7a385eb938bed2ba1
              • Opcode Fuzzy Hash: 04b86cf5df8d5bd4ca604a517ff5b2f24264b8b6ba60e11824c774313ea4517a
              • Instruction Fuzzy Hash: 4D919B74A04209EFCB16EF54D891DBDB7B5FF49300F50805AFA06AB2A2DB71AE41CB51
              APIs
                • Part of subcall function 00377620: _wcslen.LIBCMT ref: 00377625
              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 003DC6EE
              • _wcslen.LIBCMT ref: 003DC735
              • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 003DC79C
              • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 003DC7CA
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ItemMenu$Info_wcslen$Default
              • String ID: 0
              • API String ID: 1227352736-4108050209
              • Opcode ID: 4131aa9886d2d045a7bb42988441ea87865b2979c39728696ce056706f415539
              • Instruction ID: 790420aae74a8554dffce4d963aa2434b787b1d15af6f6d92f3741e05467f183
              • Opcode Fuzzy Hash: 4131aa9886d2d045a7bb42988441ea87865b2979c39728696ce056706f415539
              • Instruction Fuzzy Hash: 8C5102726343029FD7169F28E885B6B77E8AF45310F042A2AF595D73E0DB74D844CB52
              APIs
              • ShellExecuteExW.SHELL32(0000003C), ref: 003FAEA3
                • Part of subcall function 00377620: _wcslen.LIBCMT ref: 00377625
              • GetProcessId.KERNEL32(00000000), ref: 003FAF38
              • CloseHandle.KERNEL32(00000000), ref: 003FAF67
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: CloseExecuteHandleProcessShell_wcslen
              • String ID: <$@
              • API String ID: 146682121-1426351568
              • Opcode ID: 03cb566321d01a281a6d41afeaa9282c70257aa8d618921002d1ccc3fafc319d
              • Instruction ID: 0c2eb170da08ab78e49b3a6b0aedaa5fbb99d2566cfa85e82954a4fa833409b6
              • Opcode Fuzzy Hash: 03cb566321d01a281a6d41afeaa9282c70257aa8d618921002d1ccc3fafc319d
              • Instruction Fuzzy Hash: CD715A71A00619DFCB16DF54C484AAEBBF0BF08314F1584A9E91AAF352C774ED41CB91
              APIs
              • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 003D7206
              • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 003D723C
              • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 003D724D
              • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 003D72CF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ErrorMode$AddressCreateInstanceProc
              • String ID: DllGetClassObject
              • API String ID: 753597075-1075368562
              • Opcode ID: 1677c6a7f179e95a063d42b018d49e534ca0e51ff9ae3a8c2ac712b8c0a547e8
              • Instruction ID: de3dbe95df14ea66670a32bc06b8bd3b4586335b51467b54ba278c27bc5f00cb
              • Opcode Fuzzy Hash: 1677c6a7f179e95a063d42b018d49e534ca0e51ff9ae3a8c2ac712b8c0a547e8
              • Instruction Fuzzy Hash: 47418172604204EFDB16CF54D884A9A7BB9EF44310F1585AEBD059F30AE7B5D944CBA0
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: _wcslen
              • String ID: HKEY_LOCAL_MACHINE$HKLM
              • API String ID: 176396367-4004644295
              • Opcode ID: 9af9bc6bc843c2d0d05aa2639ade7f9a217c44beda0be9fb8f49226290110b83
              • Instruction ID: 252d1c7f78c4eb97a8f15b881485b73b33e8b12a0226353a94933d6f58a695bb
              • Opcode Fuzzy Hash: 9af9bc6bc843c2d0d05aa2639ade7f9a217c44beda0be9fb8f49226290110b83
              • Instruction Fuzzy Hash: 90313673AA016D4BCF33EF2C8A515BE33A15BA1750F17602AED45AB245EB71ED40D3A0
              APIs
              • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00402F8D
              • LoadLibraryW.KERNEL32(?), ref: 00402F94
              • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00402FA9
              • DestroyWindow.USER32(?), ref: 00402FB1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: MessageSend$DestroyLibraryLoadWindow
              • String ID: SysAnimate32
              • API String ID: 3529120543-1011021900
              • Opcode ID: 9a9137b59eab63cd4a0307dd54af9f95a086ccc322ae1f8db87665883ffe83db
              • Instruction ID: 34c35f2fa268af2769eda6577c77a3d6b81c2555b29bcd059fabf9b6938b250a
              • Opcode Fuzzy Hash: 9a9137b59eab63cd4a0307dd54af9f95a086ccc322ae1f8db87665883ffe83db
              • Instruction Fuzzy Hash: 1121D471100206EBEB115F64DD88EBB77BDEB593A4F10063AF950E22D0C7B5DC41A768
              APIs
              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00394D1E,003A28E9,?,00394CBE,003A28E9,004388B8,0000000C,00394E15,003A28E9,00000002), ref: 00394D8D
              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00394DA0
              • FreeLibrary.KERNEL32(00000000,?,?,?,00394D1E,003A28E9,?,00394CBE,003A28E9,004388B8,0000000C,00394E15,003A28E9,00000002,00000000), ref: 00394DC3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: AddressFreeHandleLibraryModuleProc
              • String ID: CorExitProcess$mscoree.dll
              • API String ID: 4061214504-1276376045
              • Opcode ID: 5b46a86efffa9dd90056b4cbb7a087ec2853094ba7de45f1b373037c1a78141e
              • Instruction ID: 6c11d16d7b0ed871af4fa265ff995d35be68e742efe6563448aa7d50d8121907
              • Opcode Fuzzy Hash: 5b46a86efffa9dd90056b4cbb7a087ec2853094ba7de45f1b373037c1a78141e
              • Instruction Fuzzy Hash: 25F0AF34A00208FBDB129F90DC89BEDBBB4EF04712F0002A5F809B62A0DB745981CB98
              APIs
              • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00374EDD,?,00441418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00374E9C
              • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00374EAE
              • FreeLibrary.KERNEL32(00000000,?,?,00374EDD,?,00441418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00374EC0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Library$AddressFreeLoadProc
              • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
              • API String ID: 145871493-3689287502
              • Opcode ID: 723120d5d30dcbdad45c40db4c97ecbe03ba79c686ba419403d34316e7154bea
              • Instruction ID: 3f11657195f8ac1c653ce3d314a8df893bb267462f3e3402733c62ed7da69587
              • Opcode Fuzzy Hash: 723120d5d30dcbdad45c40db4c97ecbe03ba79c686ba419403d34316e7154bea
              • Instruction Fuzzy Hash: 44E08636A02522DBD2321B256C58B6B6594AF81B72B064225FC04F6144DB7CDD0188A8
              APIs
              • LoadLibraryA.KERNEL32(kernel32.dll,?,?,003B3CDE,?,00441418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00374E62
              • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00374E74
              • FreeLibrary.KERNEL32(00000000,?,?,003B3CDE,?,00441418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00374E87
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Library$AddressFreeLoadProc
              • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
              • API String ID: 145871493-1355242751
              • Opcode ID: d09080ef0622523027bca22289bdbaa5252ed54b13a8df424da5b4ac588d5820
              • Instruction ID: 6627611ad73bb38880a6c61593fb41a1c4976494adacbedaa60a0366552f06f4
              • Opcode Fuzzy Hash: d09080ef0622523027bca22289bdbaa5252ed54b13a8df424da5b4ac588d5820
              • Instruction Fuzzy Hash: 42D0C232502621E7C6331B247C08E8B2A1CEF85B213064331B808FA154CF7CDD019AD8
              APIs
              • GetCurrentProcessId.KERNEL32 ref: 003FA427
              • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 003FA435
              • GetProcessIoCounters.KERNEL32(00000000,?), ref: 003FA468
              • CloseHandle.KERNEL32(?), ref: 003FA63D
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Process$CloseCountersCurrentHandleOpen
              • String ID:
              • API String ID: 3488606520-0
              • Opcode ID: 83720cba4fee24543ce3d68193793afc4ab938b2ca0379fedcd6ba378f3d4cb8
              • Instruction ID: 08d871fb248b37b16f853012893ea790af715dac79bc5661bb057c9583907643
              • Opcode Fuzzy Hash: 83720cba4fee24543ce3d68193793afc4ab938b2ca0379fedcd6ba378f3d4cb8
              • Instruction Fuzzy Hash: C3A190B16047009FD721DF24C886F2AB7E5AF84714F14885DFA9E9B392D774EC418B92
              APIs
                • Part of subcall function 003DDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,003DCF22,?), ref: 003DDDFD
                • Part of subcall function 003DDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,003DCF22,?), ref: 003DDE16
                • Part of subcall function 003DE199: GetFileAttributesW.KERNEL32(?,003DCF95), ref: 003DE19A
              • lstrcmpiW.KERNEL32(?,?), ref: 003DE473
              • MoveFileW.KERNEL32(?,?), ref: 003DE4AC
              • _wcslen.LIBCMT ref: 003DE5EB
              • _wcslen.LIBCMT ref: 003DE603
              • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 003DE650
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
              • String ID:
              • API String ID: 3183298772-0
              • Opcode ID: 188255033b600b1e52ca2517d4e693e52b69d5e5be6b408fd3f7f2408ac3ba77
              • Instruction ID: 7dc18f2f2b997dda5b06f00d36eaf86865bd218a45bdd754405ce388c0ce2c03
              • Opcode Fuzzy Hash: 188255033b600b1e52ca2517d4e693e52b69d5e5be6b408fd3f7f2408ac3ba77
              • Instruction Fuzzy Hash: 285184B24083459BC726EB90DC81ADF77ECAF85340F00492FF589DB291EF74A6888756
              APIs
                • Part of subcall function 00379CB3: _wcslen.LIBCMT ref: 00379CBD
                • Part of subcall function 003FC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,003FB6AE,?,?), ref: 003FC9B5
                • Part of subcall function 003FC998: _wcslen.LIBCMT ref: 003FC9F1
                • Part of subcall function 003FC998: _wcslen.LIBCMT ref: 003FCA68
                • Part of subcall function 003FC998: _wcslen.LIBCMT ref: 003FCA9E
              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 003FBAA5
              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 003FBB00
              • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 003FBB63
              • RegCloseKey.ADVAPI32(?,?), ref: 003FBBA6
              • RegCloseKey.ADVAPI32(00000000), ref: 003FBBB3
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
              • String ID:
              • API String ID: 826366716-0
              • Opcode ID: d5f183e135ffd46ea7c199776c75bf6e3bf673102b8912e971f0f8b922a37cfc
              • Instruction ID: e0736415b855b4fc21e78a683523dd81783cd66e9962ee5a7744a6eab0825916
              • Opcode Fuzzy Hash: d5f183e135ffd46ea7c199776c75bf6e3bf673102b8912e971f0f8b922a37cfc
              • Instruction Fuzzy Hash: 43618C71208205EFD716DF14C490E2ABBE9FF84308F1485ADF5998B2A2DB35ED45CB92
              APIs
              • VariantInit.OLEAUT32(?), ref: 003D8BCD
              • VariantClear.OLEAUT32 ref: 003D8C3E
              • VariantClear.OLEAUT32 ref: 003D8C9D
              • VariantClear.OLEAUT32(?), ref: 003D8D10
              • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 003D8D3B
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Variant$Clear$ChangeInitType
              • String ID:
              • API String ID: 4136290138-0
              • Opcode ID: eaaaa6d0ec9ee3149469e39f87ca5c064a8830c04eb7479acfab7c349a895792
              • Instruction ID: 2ac91ae09c77386b750b1b089ec4f21a1f2e47255d31d403d7855e40d981eec2
              • Opcode Fuzzy Hash: eaaaa6d0ec9ee3149469e39f87ca5c064a8830c04eb7479acfab7c349a895792
              • Instruction Fuzzy Hash: A7516AB5A00219EFCB15CF68D884AAAB7F9FF89314B15856AE905DB350E730E911CF90
              APIs
              • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 003E8BAE
              • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 003E8BDA
              • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 003E8C32
              • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 003E8C57
              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 003E8C5F
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: PrivateProfile$SectionWrite$String
              • String ID:
              • API String ID: 2832842796-0
              • Opcode ID: 0e7aedfb227cb691ac8403c26fabc609cceacc3c9c3989900f487ad1a85e0c19
              • Instruction ID: 147fd4107bdc1ac973f50f7d579dbe5fb4d116794a0e392492749b76f87fe0b5
              • Opcode Fuzzy Hash: 0e7aedfb227cb691ac8403c26fabc609cceacc3c9c3989900f487ad1a85e0c19
              • Instruction Fuzzy Hash: F2514835A00215AFCB16DF65C881A6DBBF5FF49314F18C498E849AB3A2CB35ED51CB90
              APIs
              • LoadLibraryW.KERNEL32(?,00000000,?), ref: 003F8F40
              • GetProcAddress.KERNEL32(00000000,?), ref: 003F8FD0
              • GetProcAddress.KERNEL32(00000000,00000000), ref: 003F8FEC
              • GetProcAddress.KERNEL32(00000000,?), ref: 003F9032
              • FreeLibrary.KERNEL32(00000000), ref: 003F9052
                • Part of subcall function 0038F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,003E1043,?,753CE610), ref: 0038F6E6
                • Part of subcall function 0038F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,003CFA64,00000000,00000000,?,?,003E1043,?,753CE610,?,003CFA64), ref: 0038F70D
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
              • String ID:
              • API String ID: 666041331-0
              • Opcode ID: 5556bb843eb49a0705ab61135435f025e819e8b92419bc2f5b0a44b7d2881aa2
              • Instruction ID: 31be847ede50efc28b451ab1103a2e9c3a3c5c9e69cad1af2e7a8f2497b2f1cf
              • Opcode Fuzzy Hash: 5556bb843eb49a0705ab61135435f025e819e8b92419bc2f5b0a44b7d2881aa2
              • Instruction Fuzzy Hash: 95513934600209DFC716DF58C484AADBBB1FF49324B0581A9E90AAF762DB35ED85CB91
              APIs
              • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00406C33
              • SetWindowLongW.USER32(?,000000EC,?), ref: 00406C4A
              • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00406C73
              • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,003EAB79,00000000,00000000), ref: 00406C98
              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00406CC7
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Window$Long$MessageSendShow
              • String ID:
              • API String ID: 3688381893-0
              • Opcode ID: 8c9ea448b250702079a9ce6327f1cb0a8aed0a0df4831f2c51e54a3a9329d053
              • Instruction ID: 01a52d1ab425d0376474e4fcdbdf1f9fd8d9ca7ab77569f77d2e0bd41a808a62
              • Opcode Fuzzy Hash: 8c9ea448b250702079a9ce6327f1cb0a8aed0a0df4831f2c51e54a3a9329d053
              • Instruction Fuzzy Hash: DD410A35608114AFE724CF28CD94FA67BA4EB09350F16023AF956B73E0C375ED61CA48
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: _free
              • String ID:
              • API String ID: 269201875-0
              • Opcode ID: 9e8733f5d0822a1bcc521b2acdc4c87dda01ee935abc4c40693237e110273759
              • Instruction ID: 3766cb7727156579966240dc0c7f90669011a340e3129239ab20ea1fe0d8a750
              • Opcode Fuzzy Hash: 9e8733f5d0822a1bcc521b2acdc4c87dda01ee935abc4c40693237e110273759
              • Instruction Fuzzy Hash: 9A41B176A002009FCB26DF7CC881A5EB7F5EF8A714F1645A9E615EB391DB31AD01CB81
              APIs
              • GetCursorPos.USER32(?), ref: 00389141
              • ScreenToClient.USER32(00000000,?), ref: 0038915E
              • GetAsyncKeyState.USER32(00000001), ref: 00389183
              • GetAsyncKeyState.USER32(00000002), ref: 0038919D
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: AsyncState$ClientCursorScreen
              • String ID:
              • API String ID: 4210589936-0
              • Opcode ID: 25edc5c88f83a07a670de556e0fb37240e116710669c6b23560a6d07596cfc6f
              • Instruction ID: 5e98ea654a4e513614ed7744ed4b06e3ad1c0ddf3d3908047d4ba7c8fb9a4538
              • Opcode Fuzzy Hash: 25edc5c88f83a07a670de556e0fb37240e116710669c6b23560a6d07596cfc6f
              • Instruction Fuzzy Hash: 70413D31A0861AFBDF16AF64C848BFEB774FB05324F25426AE825A62D0C7746D50CF51
              APIs
              • GetInputState.USER32 ref: 003E38CB
              • TranslateAcceleratorW.USER32(?,00000000,?), ref: 003E3922
              • TranslateMessage.USER32(?), ref: 003E394B
              • DispatchMessageW.USER32(?), ref: 003E3955
              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 003E3966
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Message$Translate$AcceleratorDispatchInputPeekState
              • String ID:
              • API String ID: 2256411358-0
              • Opcode ID: 00e9742bcaaae30e8a61f9c920d17f953b1abaf46bb6187fdd3bdfa8ed08e913
              • Instruction ID: 92040661f6cbb36671c4b75c051942f7b808a1605dfd0e161488e2fc90eeae18
              • Opcode Fuzzy Hash: 00e9742bcaaae30e8a61f9c920d17f953b1abaf46bb6187fdd3bdfa8ed08e913
              • Instruction Fuzzy Hash: 8E31C8745043E1EEEB36CB36984CBB637A8AB06304F050779F452931E1D3F49684CB25
              APIs
              • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 003ECF38
              • InternetReadFile.WININET(?,00000000,?,?), ref: 003ECF6F
              • GetLastError.KERNEL32(?,00000000,?,?,?,003EC21E,00000000), ref: 003ECFB4
              • SetEvent.KERNEL32(?,?,00000000,?,?,?,003EC21E,00000000), ref: 003ECFC8
              • SetEvent.KERNEL32(?,?,00000000,?,?,?,003EC21E,00000000), ref: 003ECFF2
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
              • String ID:
              • API String ID: 3191363074-0
              • Opcode ID: 9abdc53fa88d515a30f3f721f3e716b845d0abd0128b4f9d576b56fedef950b8
              • Instruction ID: 83336d2b64a630aaf6e72d2ccc53a64d2aced8887615312da30231ff9a3c4523
              • Opcode Fuzzy Hash: 9abdc53fa88d515a30f3f721f3e716b845d0abd0128b4f9d576b56fedef950b8
              • Instruction Fuzzy Hash: C9317C71610355EFDB21DFA6C984AAFBBF9EF04311B10466EF506E2181DB30AE429B60
              APIs
              • GetWindowRect.USER32(?,?), ref: 003D1915
              • PostMessageW.USER32(00000001,00000201,00000001), ref: 003D19C1
              • Sleep.KERNEL32(00000000,?,?,?), ref: 003D19C9
              • PostMessageW.USER32(00000001,00000202,00000000), ref: 003D19DA
              • Sleep.KERNEL32(00000000,?,?,?,?), ref: 003D19E2
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: MessagePostSleep$RectWindow
              • String ID:
              • API String ID: 3382505437-0
              • Opcode ID: 97701538d4e199fec35e87492bb437f04bc928ecc95ab32de3d8be505546b049
              • Instruction ID: a9d606f34c11232919d705c474a25a4a1baf179cbccce4fc2e238b11d43e18df
              • Opcode Fuzzy Hash: 97701538d4e199fec35e87492bb437f04bc928ecc95ab32de3d8be505546b049
              • Instruction Fuzzy Hash: 40319F72A00219EFCB14CFA8DDA9ADE7BB5EB44315F10432AF921AB2D1C7709D54DB90
              APIs
              • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00405745
              • SendMessageW.USER32(?,00001074,?,00000001), ref: 0040579D
              • _wcslen.LIBCMT ref: 004057AF
              • _wcslen.LIBCMT ref: 004057BA
              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00405816
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: MessageSend$_wcslen
              • String ID:
              • API String ID: 763830540-0
              • Opcode ID: de35f5aacfeead352417b9468b1bb4b89a2966eb2286d96ae2ffa591e9c09060
              • Instruction ID: 7001ebbb522776b7136b30f64521c03524b194d7d723c62abe7e015495af67ec
              • Opcode Fuzzy Hash: de35f5aacfeead352417b9468b1bb4b89a2966eb2286d96ae2ffa591e9c09060
              • Instruction Fuzzy Hash: B9218075904618AADB209F60CC84AEF77B8EB44324F108227E919FB2C0D7789986CF59
              APIs
              • IsWindow.USER32(00000000), ref: 003F0951
              • GetForegroundWindow.USER32 ref: 003F0968
              • GetDC.USER32(00000000), ref: 003F09A4
              • GetPixel.GDI32(00000000,?,00000003), ref: 003F09B0
              • ReleaseDC.USER32(00000000,00000003), ref: 003F09E8
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Window$ForegroundPixelRelease
              • String ID:
              • API String ID: 4156661090-0
              • Opcode ID: 5788aeed4ccedeaade6a1ff970f1db09a7b98ab04719e473c4c75de49a44a97b
              • Instruction ID: a7fc8048568aa3144487a535198708b814fd040806bb68deea1f98a727e7211d
              • Opcode Fuzzy Hash: 5788aeed4ccedeaade6a1ff970f1db09a7b98ab04719e473c4c75de49a44a97b
              • Instruction Fuzzy Hash: AD216235600214AFD714EF69C985A6EB7F5EF45700F048578F94AAB762DB70AC04CB50
              APIs
              • GetEnvironmentStringsW.KERNEL32 ref: 003ACDC6
              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 003ACDE9
                • Part of subcall function 003A3820: RtlAllocateHeap.NTDLL(00000000,?,00441444,?,0038FDF5,?,?,0037A976,00000010,00441440,003713FC,?,003713C6,?,00371129), ref: 003A3852
              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 003ACE0F
              • _free.LIBCMT ref: 003ACE22
              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 003ACE31
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
              • String ID:
              • API String ID: 336800556-0
              • Opcode ID: 154dd30d87c2b93901f429a4874adc422256f40712226c5637b59a24c4e6c100
              • Instruction ID: 575d963f2fe11ff166d1b9d8ce156b31380fd576800f8a784a3d8e0385390755
              • Opcode Fuzzy Hash: 154dd30d87c2b93901f429a4874adc422256f40712226c5637b59a24c4e6c100
              • Instruction Fuzzy Hash: F301F772611215BFA72317BA6C8CC7BB96DEEC7BA23161229FD05DB201EA708D0181F4
              APIs
              • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00389693
              • SelectObject.GDI32(?,00000000), ref: 003896A2
              • BeginPath.GDI32(?), ref: 003896B9
              • SelectObject.GDI32(?,00000000), ref: 003896E2
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ObjectSelect$BeginCreatePath
              • String ID:
              • API String ID: 3225163088-0
              • Opcode ID: 670bc5b4a1f2ddc8a6639769cdd7478fbd9d3863da5f86e7c011508c01b93ad7
              • Instruction ID: 9010a1fb85d8d9ef7783c621bb8f374ec1822c2a20bd5dd36ba8b922ab0d04ed
              • Opcode Fuzzy Hash: 670bc5b4a1f2ddc8a6639769cdd7478fbd9d3863da5f86e7c011508c01b93ad7
              • Instruction Fuzzy Hash: 902192B4802305EFDB12AF64DD44BB93BA8BB01325F150277F820A61B0E37098D1CF98
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: _memcmp
              • String ID:
              • API String ID: 2931989736-0
              • Opcode ID: b5a03dfa1acd7a6270fe0a67e5d9ae7b7b2eabad9282f0fa5272d3d7f1323583
              • Instruction ID: ff7d35b4d32a7c963aa22e8a305225e81ed96d5564c9bc64c097d7db080000ed
              • Opcode Fuzzy Hash: b5a03dfa1acd7a6270fe0a67e5d9ae7b7b2eabad9282f0fa5272d3d7f1323583
              • Instruction Fuzzy Hash: 6701D6A7645605FAE61A5510AD82FBA736C9B21394B200032FD04BEB81F730ED1486A4
              APIs
              • GetLastError.KERNEL32(?,?,?,0039F2DE,003A3863,00441444,?,0038FDF5,?,?,0037A976,00000010,00441440,003713FC,?,003713C6), ref: 003A2DFD
              • _free.LIBCMT ref: 003A2E32
              • _free.LIBCMT ref: 003A2E59
              • SetLastError.KERNEL32(00000000,00371129), ref: 003A2E66
              • SetLastError.KERNEL32(00000000,00371129), ref: 003A2E6F
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ErrorLast$_free
              • String ID:
              • API String ID: 3170660625-0
              • Opcode ID: c0bc813873d3e267c9b4f8f7b0d8a20f8a593fe446001f04acbdb531aaba13f8
              • Instruction ID: 0478cf5fa1c29eb51afb429b0bf4ad635034df53bbb1b1737dfd972c44a7556c
              • Opcode Fuzzy Hash: c0bc813873d3e267c9b4f8f7b0d8a20f8a593fe446001f04acbdb531aaba13f8
              • Instruction Fuzzy Hash: 7D0128322456006BC613273D6C8AE2B265DEBD37B1B220538F825F61D3EF78CC414120
              APIs
              • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,003CFF41,80070057,?,?,?,003D035E), ref: 003D002B
              • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,003CFF41,80070057,?,?), ref: 003D0046
              • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,003CFF41,80070057,?,?), ref: 003D0054
              • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,003CFF41,80070057,?), ref: 003D0064
              • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,003CFF41,80070057,?,?), ref: 003D0070
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: From$Prog$FreeStringTasklstrcmpi
              • String ID:
              • API String ID: 3897988419-0
              • Opcode ID: 4589fcd4af7337bcd64c2c8fe23967457522fbe3f2b48943ddf5daecbd215eb6
              • Instruction ID: e136b60e40e0e245f94f3cf4b65e98ee1e60343e7041487fd51d225d25279e25
              • Opcode Fuzzy Hash: 4589fcd4af7337bcd64c2c8fe23967457522fbe3f2b48943ddf5daecbd215eb6
              • Instruction Fuzzy Hash: FA018B73600204FFDB165F68ED84BAE7AADEB84B92F148225F905E2210E771DD408BA4
              APIs
              • QueryPerformanceCounter.KERNEL32(?), ref: 003DE997
              • QueryPerformanceFrequency.KERNEL32(?), ref: 003DE9A5
              • Sleep.KERNEL32(00000000), ref: 003DE9AD
              • QueryPerformanceCounter.KERNEL32(?), ref: 003DE9B7
              • Sleep.KERNEL32 ref: 003DE9F3
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: PerformanceQuery$CounterSleep$Frequency
              • String ID:
              • API String ID: 2833360925-0
              • Opcode ID: b2bcdcc41ccf0a1131955f5c1b63d876864a53690c4855cafa3c4ba8ebfdcdf4
              • Instruction ID: 3b452e49bbd38485a35627f1cb45ab2d2fd9de012dd1e0ee51b0bcff3845d217
              • Opcode Fuzzy Hash: b2bcdcc41ccf0a1131955f5c1b63d876864a53690c4855cafa3c4ba8ebfdcdf4
              • Instruction Fuzzy Hash: 9D016D32C02529DBCF01AFE4EDA9ADDBB78FF08300F010666E502B6240CB349550CBA5
              APIs
              • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 003D1114
              • GetLastError.KERNEL32(?,00000000,00000000,?,?,003D0B9B,?,?,?), ref: 003D1120
              • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,003D0B9B,?,?,?), ref: 003D112F
              • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,003D0B9B,?,?,?), ref: 003D1136
              • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 003D114D
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
              • String ID:
              • API String ID: 842720411-0
              • Opcode ID: 754d209b35c14a9604109a40f18e6f84c905344142a9c1ab025de6afdca9dc77
              • Instruction ID: 87ba6c7f9f024d7cba94b7c32c6bff641aec76344437bdff9accd1b95496f221
              • Opcode Fuzzy Hash: 754d209b35c14a9604109a40f18e6f84c905344142a9c1ab025de6afdca9dc77
              • Instruction Fuzzy Hash: EF011D75100205FFDB124FA5ED89E6A3B7EEF89360B214525FA45D7350DA31DC009A64
              APIs
              • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 003D0FCA
              • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 003D0FD6
              • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 003D0FE5
              • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 003D0FEC
              • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 003D1002
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: HeapInformationToken$AllocErrorLastProcess
              • String ID:
              • API String ID: 44706859-0
              • Opcode ID: 62abfd928371d1c7d4a1fcbc643a444860bb89720508cbffa6d1b32fa2a168cd
              • Instruction ID: a86c026ada7d1ef4750c6ba2b4b47e1b42cbfe43787c0fd1b345483c99077e55
              • Opcode Fuzzy Hash: 62abfd928371d1c7d4a1fcbc643a444860bb89720508cbffa6d1b32fa2a168cd
              • Instruction Fuzzy Hash: A7F06D36240301FBDB225FA4ED8DF563BADEF89762F114525FA45EB291CA70DC50CA60
              APIs
              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 003D102A
              • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 003D1036
              • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 003D1045
              • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 003D104C
              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 003D1062
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: HeapInformationToken$AllocErrorLastProcess
              • String ID:
              • API String ID: 44706859-0
              • Opcode ID: 08dadc3df5205d48b1dd198f6d1ebe934fa778f2da0b541fb189474808443a44
              • Instruction ID: 30b571995592101a40612a90ec8f80d2ebcc1aff077ff5dafe3b53823a5d0e91
              • Opcode Fuzzy Hash: 08dadc3df5205d48b1dd198f6d1ebe934fa778f2da0b541fb189474808443a44
              • Instruction Fuzzy Hash: 90F06D36240301FBDB226FA4ED89F563BADEF89761F110525FA45EB250CA70D840CA60
              APIs
              • CloseHandle.KERNEL32(?,?,?,?,003E017D,?,003E32FC,?,00000001,003B2592,?), ref: 003E0324
              • CloseHandle.KERNEL32(?,?,?,?,003E017D,?,003E32FC,?,00000001,003B2592,?), ref: 003E0331
              • CloseHandle.KERNEL32(?,?,?,?,003E017D,?,003E32FC,?,00000001,003B2592,?), ref: 003E033E
              • CloseHandle.KERNEL32(?,?,?,?,003E017D,?,003E32FC,?,00000001,003B2592,?), ref: 003E034B
              • CloseHandle.KERNEL32(?,?,?,?,003E017D,?,003E32FC,?,00000001,003B2592,?), ref: 003E0358
              • CloseHandle.KERNEL32(?,?,?,?,003E017D,?,003E32FC,?,00000001,003B2592,?), ref: 003E0365
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: CloseHandle
              • String ID:
              • API String ID: 2962429428-0
              • Opcode ID: 5c69762123b3c65973c1fea2f5b8f2987fbfa67907565c600770df62b66c8c64
              • Instruction ID: a14d5c5dd097ece253b61cbfd56d8817c4b9feda2bc2ced4c348cb7374c97acb
              • Opcode Fuzzy Hash: 5c69762123b3c65973c1fea2f5b8f2987fbfa67907565c600770df62b66c8c64
              • Instruction Fuzzy Hash: 2101A276800B65DFCB369F66D880416F7F5BF503153168A3FD19652971C3B1A994CF80
              APIs
              • _free.LIBCMT ref: 003AD752
                • Part of subcall function 003A29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,003AD7D1,00000000,00000000,00000000,00000000,?,003AD7F8,00000000,00000007,00000000,?,003ADBF5,00000000), ref: 003A29DE
                • Part of subcall function 003A29C8: GetLastError.KERNEL32(00000000,?,003AD7D1,00000000,00000000,00000000,00000000,?,003AD7F8,00000000,00000007,00000000,?,003ADBF5,00000000,00000000), ref: 003A29F0
              • _free.LIBCMT ref: 003AD764
              • _free.LIBCMT ref: 003AD776
              • _free.LIBCMT ref: 003AD788
              • _free.LIBCMT ref: 003AD79A
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: 3bc25798ed6aa81d3fda2558c3f12f8b45f3b836cb724547f79d26c8c1bd40a1
              • Instruction ID: 3822f0ba3964ba39cf5a9049d070c612f979071076b4c1e2c2fd8c1cb4f629d3
              • Opcode Fuzzy Hash: 3bc25798ed6aa81d3fda2558c3f12f8b45f3b836cb724547f79d26c8c1bd40a1
              • Instruction Fuzzy Hash: 92F04F72504208AF866AFF68F9C5C1B77DDFB07710B961819F049EB911C721FC808765
              APIs
              • _free.LIBCMT ref: 003A22BE
                • Part of subcall function 003A29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,003AD7D1,00000000,00000000,00000000,00000000,?,003AD7F8,00000000,00000007,00000000,?,003ADBF5,00000000), ref: 003A29DE
                • Part of subcall function 003A29C8: GetLastError.KERNEL32(00000000,?,003AD7D1,00000000,00000000,00000000,00000000,?,003AD7F8,00000000,00000007,00000000,?,003ADBF5,00000000,00000000), ref: 003A29F0
              • _free.LIBCMT ref: 003A22D0
              • _free.LIBCMT ref: 003A22E3
              • _free.LIBCMT ref: 003A22F4
              • _free.LIBCMT ref: 003A2305
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: 6808fb2101d916ec09f4aa115376e40f69f90f7bf0c4e22b06c5e74e6e01280d
              • Instruction ID: 3823d90bad98d4faf191204b62edee8f5dc62da6d3d53e95c306c1a778831e15
              • Opcode Fuzzy Hash: 6808fb2101d916ec09f4aa115376e40f69f90f7bf0c4e22b06c5e74e6e01280d
              • Instruction Fuzzy Hash: 8CF03A788002208FD757BF68BC4580A3B64F71BB62B01157AF510EA2B1C7710961ABED
              APIs
              • EndPath.GDI32(?), ref: 003895D4
              • StrokeAndFillPath.GDI32(?,?,003C71F7,00000000,?,?,?), ref: 003895F0
              • SelectObject.GDI32(?,00000000), ref: 00389603
              • DeleteObject.GDI32 ref: 00389616
              • StrokePath.GDI32(?), ref: 00389631
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Path$ObjectStroke$DeleteFillSelect
              • String ID:
              • API String ID: 2625713937-0
              • Opcode ID: acd091f5d9e9142926301e1d7bdf372338629c2a9fdf27c2b1d4909b48df97da
              • Instruction ID: 5e30c8e316e04e0c3baa6762eb0a8447d703b701e2ff3a8da7d7400cdd20fb84
              • Opcode Fuzzy Hash: acd091f5d9e9142926301e1d7bdf372338629c2a9fdf27c2b1d4909b48df97da
              • Instruction Fuzzy Hash: 70F0EC79006304EBDB166FA5EE5C7743B65AB02332F088375F469690F0D7348995DF68
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: __freea$_free
              • String ID: a/p$am/pm
              • API String ID: 3432400110-3206640213
              • Opcode ID: 351760100788abfddbd9dbad7dd030f4dde1e3a91ebb2629da00f2a84d3fdba7
              • Instruction ID: 9eb2e3ba801063e28eef91ce923d5839d4c5513744d793ced561fe986ed48adf
              • Opcode Fuzzy Hash: 351760100788abfddbd9dbad7dd030f4dde1e3a91ebb2629da00f2a84d3fdba7
              • Instruction Fuzzy Hash: 79D1F339900206DADF2BDF68C855BFEB7B5EF07310F294159E901ABA90D3759D80CB91
              APIs
                • Part of subcall function 00390242: EnterCriticalSection.KERNEL32(0044070C,00441884,?,?,0038198B,00442518,?,?,?,003712F9,00000000), ref: 0039024D
                • Part of subcall function 00390242: LeaveCriticalSection.KERNEL32(0044070C,?,0038198B,00442518,?,?,?,003712F9,00000000), ref: 0039028A
                • Part of subcall function 003900A3: __onexit.LIBCMT ref: 003900A9
              • __Init_thread_footer.LIBCMT ref: 003F6238
                • Part of subcall function 003901F8: EnterCriticalSection.KERNEL32(0044070C,?,?,00388747,00442514), ref: 00390202
                • Part of subcall function 003901F8: LeaveCriticalSection.KERNEL32(0044070C,?,00388747,00442514), ref: 00390235
                • Part of subcall function 003E359C: LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 003E35E4
                • Part of subcall function 003E359C: LoadStringW.USER32(00442390,?,00000FFF,?), ref: 003E360A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: CriticalSection$EnterLeaveLoadString$Init_thread_footer__onexit
              • String ID: x#D$x#D$x#D
              • API String ID: 1072379062-1009279002
              • Opcode ID: 6bb035251d23ca8e50969de346ea8167d0209f35bdb492326fec73843470c3e7
              • Instruction ID: 345498840c0220eaffb46840de6cb181ff87ca8626f2bb7f1c38c07603771738
              • Opcode Fuzzy Hash: 6bb035251d23ca8e50969de346ea8167d0209f35bdb492326fec73843470c3e7
              • Instruction Fuzzy Hash: F3C1A371A00109AFDB16DF58C891EBEB7B9FF49300F11806AFA15AB291D774ED44CB90
              APIs
              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000002,00000000,?,?,?,00000000,?,?,?,?), ref: 003A8B6E
              • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,00000000,00001000,?), ref: 003A8B7A
              • __dosmaperr.LIBCMT ref: 003A8B81
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ByteCharErrorLastMultiWide__dosmaperr
              • String ID: .9
              • API String ID: 2434981716-4137932486
              • Opcode ID: afa29d29b903f75c44e432055914f31c621b67a8d9a1d5118389e2c2291a163f
              • Instruction ID: 211ab83fbc7d05584a2be871e4766b15be13bd983afd7ab1509bbe77b62cc496
              • Opcode Fuzzy Hash: afa29d29b903f75c44e432055914f31c621b67a8d9a1d5118389e2c2291a163f
              • Instruction Fuzzy Hash: A5418FB4A04045AFDB269F68CC80A7D7FA5DF47304F2985A9F8859B552DE31CC12C7A4
              APIs
                • Part of subcall function 003DB403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,003D21D0,?,?,00000034,00000800,?,00000034), ref: 003DB42D
              • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 003D2760
                • Part of subcall function 003DB3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,003D21FF,?,?,00000800,?,00001073,00000000,?,?), ref: 003DB3F8
                • Part of subcall function 003DB32A: GetWindowThreadProcessId.USER32(?,?), ref: 003DB355
                • Part of subcall function 003DB32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,003D2194,00000034,?,?,00001004,00000000,00000000), ref: 003DB365
                • Part of subcall function 003DB32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,003D2194,00000034,?,?,00001004,00000000,00000000), ref: 003DB37B
              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 003D27CD
              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 003D281A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
              • String ID: @
              • API String ID: 4150878124-2766056989
              • Opcode ID: 11970d83d3ff7f8ea2fa8ef3c50aeb3fc8b4571b2262d1f8b110b6c43e2d834c
              • Instruction ID: 7c5eb6e69addb83389d147e7f2f93ed02725e2cb8251d0704a87cfa9af803954
              • Opcode Fuzzy Hash: 11970d83d3ff7f8ea2fa8ef3c50aeb3fc8b4571b2262d1f8b110b6c43e2d834c
              • Instruction Fuzzy Hash: 3F413D76900218AFDB21DBA4DD81EDEBBB8EF05300F014056FA55B7281DB716E45DBA0
              APIs
              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\whiteee.exe,00000104), ref: 003A1769
              • _free.LIBCMT ref: 003A1834
              • _free.LIBCMT ref: 003A183E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: _free$FileModuleName
              • String ID: C:\Users\user\Desktop\whiteee.exe
              • API String ID: 2506810119-155594162
              • Opcode ID: 8f1f3b0e72b975244f37361794176d41a4c406d5774a85c150c1cb5cf9c6b41a
              • Instruction ID: 0b7e043728b1955eb438f36274eed96e6230ccd5a56c3fb5dc804c88cc79d8cf
              • Opcode Fuzzy Hash: 8f1f3b0e72b975244f37361794176d41a4c406d5774a85c150c1cb5cf9c6b41a
              • Instruction Fuzzy Hash: 70318075A00218EFDB22DB99D885D9EBBFCEB86310F1141A6F804DB211D7B08E80DB94
              APIs
              • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 003DC306
              • DeleteMenu.USER32(?,00000007,00000000), ref: 003DC34C
              • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00441990,01145CB8), ref: 003DC395
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Menu$Delete$InfoItem
              • String ID: 0
              • API String ID: 135850232-4108050209
              • Opcode ID: e0f3faf7a38244a6df057d678813690c7c67d0846df34c29dafed448438e9d45
              • Instruction ID: 9d7709e6fa98c39b86f2d129d92502c334d8c801ed735436405650270bfc7c63
              • Opcode Fuzzy Hash: e0f3faf7a38244a6df057d678813690c7c67d0846df34c29dafed448438e9d45
              • Instruction Fuzzy Hash: 1741C336224342AFDB21DF28E884B1ABBE4AF85310F01961EF9659B3D1C734E904CB52
              APIs
              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0040CC08,00000000,?,?,?,?), ref: 004044AA
              • GetWindowLongW.USER32 ref: 004044C7
              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004044D7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Window$Long
              • String ID: SysTreeView32
              • API String ID: 847901565-1698111956
              • Opcode ID: 28238564a3a1a4f061f7a85c53096ea839d90e2b3824c3e712d5909c4754ee7c
              • Instruction ID: b87c0ef79bb0a99877828c36c54cf3e4fe252be30286ea1f8520c147a6c33468
              • Opcode Fuzzy Hash: 28238564a3a1a4f061f7a85c53096ea839d90e2b3824c3e712d5909c4754ee7c
              • Instruction Fuzzy Hash: 3231B071200605AFDB219F38DC45BEB77A9EB48334F204726FA75A22D0D778EC509754
              APIs
              • SysReAllocString.OLEAUT32(?,?), ref: 003D6EED
              • VariantCopyInd.OLEAUT32(?,?), ref: 003D6F08
              • VariantClear.OLEAUT32(?), ref: 003D6F12
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Variant$AllocClearCopyString
              • String ID: *j=
              • API String ID: 2173805711-232903960
              • Opcode ID: 09465e16bf879fc44e31a1793e78d6d9fad0d7b5f4b0eb6fefb51a73b3dd46d4
              • Instruction ID: 9f48e440253908e1bfe7d3aa0d60c74538a2e47f7a12554904f207fa9052d497
              • Opcode Fuzzy Hash: 09465e16bf879fc44e31a1793e78d6d9fad0d7b5f4b0eb6fefb51a73b3dd46d4
              • Instruction Fuzzy Hash: 0331A1B2604605DFCB16AF64E8929BE7779FF45304B1044AAF9264F3A1C7349D21DBD0
              APIs
                • Part of subcall function 003F335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,003F3077,?,?), ref: 003F3378
              • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 003F307A
              • _wcslen.LIBCMT ref: 003F309B
              • htons.WSOCK32(00000000,?,?,00000000), ref: 003F3106
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
              • String ID: 255.255.255.255
              • API String ID: 946324512-2422070025
              • Opcode ID: 7a11ed713ef3392faa8a8a57fa785a31a88ec750d2497159b0f7c0f1edffb02a
              • Instruction ID: aa2b852ce5d97659169e3235c209b8371c07d8735af397341fb296c1e4df37eb
              • Opcode Fuzzy Hash: 7a11ed713ef3392faa8a8a57fa785a31a88ec750d2497159b0f7c0f1edffb02a
              • Instruction Fuzzy Hash: B231E43520420A9FCB22DF28C585E7A77E4EF14318F25C15AEA168F392CB32DE41C761
              APIs
              • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00404705
              • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00404713
              • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0040471A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: MessageSend$DestroyWindow
              • String ID: msctls_updown32
              • API String ID: 4014797782-2298589950
              • Opcode ID: ceb3c3b988292cc950ed1a47ad5d82ab3366e7cfe25963e8ab11c7cdcc6c70c4
              • Instruction ID: 9ecd31fed8bddda889deea946db2e8dc045a488537781c4490e4a69d4e40f827
              • Opcode Fuzzy Hash: ceb3c3b988292cc950ed1a47ad5d82ab3366e7cfe25963e8ab11c7cdcc6c70c4
              • Instruction Fuzzy Hash: 922151F5600208AFDB11DF68DCD1DA737ADEB8A354B04056AF600AB3A1DB35EC51CA64
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: _wcslen
              • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
              • API String ID: 176396367-2734436370
              • Opcode ID: 11e9413fb0b6c5536eeee829899eb27afeaae10332af52fc0f050867e142e333
              • Instruction ID: 02b67e36068dfcfccfdd735f37424306cea44cd5f9aa4ebafa34439b9b40cc97
              • Opcode Fuzzy Hash: 11e9413fb0b6c5536eeee829899eb27afeaae10332af52fc0f050867e142e333
              • Instruction Fuzzy Hash: B121233320421166C733BB24B802FBB73A99F92320F114037F9499B681EB69ED95C395
              APIs
              • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00403840
              • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00403850
              • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00403876
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: MessageSend$MoveWindow
              • String ID: Listbox
              • API String ID: 3315199576-2633736733
              • Opcode ID: 7b9b87110418420e3d379c20203eaeb4582c31ee0100facaf942723cb8cd8058
              • Instruction ID: f57100482d03c2e7f9a15da7c5163c4e28fda9d04e98e3ee982bcef29d150c39
              • Opcode Fuzzy Hash: 7b9b87110418420e3d379c20203eaeb4582c31ee0100facaf942723cb8cd8058
              • Instruction Fuzzy Hash: 4521C272610118BBEF219F54CC81FBB3BAEEF89751F108125F944AB2D0CA75DC5287A4
              APIs
              • SetErrorMode.KERNEL32(00000001), ref: 003E4A08
              • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 003E4A5C
              • SetErrorMode.KERNEL32(00000000,?,?,0040CC08), ref: 003E4AD0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ErrorMode$InformationVolume
              • String ID: %lu
              • API String ID: 2507767853-685833217
              • Opcode ID: d3e4faaeedd195787943678235fa94b617a8e9550dcd6dd17fd146bc84ea0892
              • Instruction ID: 54d809b5002dfdc73699a98104b12b705fdf6c965944bb1fb2b14b2024149e52
              • Opcode Fuzzy Hash: d3e4faaeedd195787943678235fa94b617a8e9550dcd6dd17fd146bc84ea0892
              • Instruction Fuzzy Hash: 11318F71A00109AFDB11DF64C985EAA7BF8EF08318F1481A9F809EF292D775ED45CB61
              APIs
              • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 0040424F
              • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00404264
              • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00404271
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: msctls_trackbar32
              • API String ID: 3850602802-1010561917
              • Opcode ID: 8b28665a626d3dabfd97d30f2c33d07d2e1dd01cf6fa4136f096a99fada32cd6
              • Instruction ID: 4ea6c67294a1928bbf0c2526274a298186d5cf238ee83d70e397d117dcef877a
              • Opcode Fuzzy Hash: 8b28665a626d3dabfd97d30f2c33d07d2e1dd01cf6fa4136f096a99fada32cd6
              • Instruction Fuzzy Hash: 1111C171240208BEEF205F29CC06FAB3BACEF85B64F110529FA55E61E0D675D8619B28
              APIs
                • Part of subcall function 00376B57: _wcslen.LIBCMT ref: 00376B6A
                • Part of subcall function 003D2DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 003D2DC5
                • Part of subcall function 003D2DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 003D2DD6
                • Part of subcall function 003D2DA7: GetCurrentThreadId.KERNEL32 ref: 003D2DDD
                • Part of subcall function 003D2DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 003D2DE4
              • GetFocus.USER32 ref: 003D2F78
                • Part of subcall function 003D2DEE: GetParent.USER32(00000000), ref: 003D2DF9
              • GetClassNameW.USER32(?,?,00000100), ref: 003D2FC3
              • EnumChildWindows.USER32(?,003D303B), ref: 003D2FEB
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
              • String ID: %s%d
              • API String ID: 1272988791-1110647743
              • Opcode ID: c4b04755db2acc3870cbe242124f9a43b41ab47a55a7729693d697981cc7dc37
              • Instruction ID: 9e69f44e9cee7858dcd56e59c6d512e31f7feb289b4234482919e1dfa1421946
              • Opcode Fuzzy Hash: c4b04755db2acc3870cbe242124f9a43b41ab47a55a7729693d697981cc7dc37
              • Instruction Fuzzy Hash: 5D11D872600205ABCF127F749CD5EEE376AAF94304F044076FD199B292DE355E098B61
              APIs
              • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 004058C1
              • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 004058EE
              • DrawMenuBar.USER32(?), ref: 004058FD
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Menu$InfoItem$Draw
              • String ID: 0
              • API String ID: 3227129158-4108050209
              • Opcode ID: 599079f4b5cc6ebbe2c9b8bd68876adc18ff237fceaf2f66a7fbc767c821c82d
              • Instruction ID: 3446217cd5c052ce4fae164a53db0fd7091914e7c4c8b32f7ba8f90b52bcbb93
              • Opcode Fuzzy Hash: 599079f4b5cc6ebbe2c9b8bd68876adc18ff237fceaf2f66a7fbc767c821c82d
              • Instruction Fuzzy Hash: A201C071500218EFDB21AF11DC44BAFBBB4FF45361F0080AAE848EA291DB349A90DF25
              APIs
              • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 003CD3BF
              • FreeLibrary.KERNEL32 ref: 003CD3E5
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: AddressFreeLibraryProc
              • String ID: GetSystemWow64DirectoryW$X64
              • API String ID: 3013587201-2590602151
              • Opcode ID: e423cf4a523a6d9a69e4c3f48e2eda7d515aee91d0181bfa93110ee44daa824e
              • Instruction ID: 91820bf012b7c088af7f18c5c04227aafb1263961b2a435e040ec8c5bd438e17
              • Opcode Fuzzy Hash: e423cf4a523a6d9a69e4c3f48e2eda7d515aee91d0181bfa93110ee44daa824e
              • Instruction Fuzzy Hash: DAF02075901A21CAD33313104CA4F6A7318AF50701F668A7EB803F5088D738CD808B8A
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8dd2b06276a89ad2b2a478a35c3394ff71725447ff2eee41123de0c422f4abbe
              • Instruction ID: 70a4edd32aff6340eb718d8d26f7236efe2b9021975ed2c233ff461a8d21ac26
              • Opcode Fuzzy Hash: 8dd2b06276a89ad2b2a478a35c3394ff71725447ff2eee41123de0c422f4abbe
              • Instruction Fuzzy Hash: 3EC14876A00206EFCB19CFA4D894BAEB7B5FF48B04F118599E505EB251D731EE41CB90
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Variant$ClearInitInitializeUninitialize
              • String ID:
              • API String ID: 1998397398-0
              • Opcode ID: a30e4dacde29ec917a3484465c4eb78640a9e5cfe556ed7c8a55f678bd6965a3
              • Instruction ID: aec02535cc21711c1734331fb01b77ea6143af35aecb5c0fdf1cfe2ae201432c
              • Opcode Fuzzy Hash: a30e4dacde29ec917a3484465c4eb78640a9e5cfe556ed7c8a55f678bd6965a3
              • Instruction Fuzzy Hash: 0BA15A752043049FC712EF24C485A2AB7E5FF89724F148859F98A9F362DB34EE05CB51
              APIs
              • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,0040FC08,?), ref: 003D05F0
              • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,0040FC08,?), ref: 003D0608
              • CLSIDFromProgID.OLE32(?,?,00000000,0040CC40,000000FF,?,00000000,00000800,00000000,?,0040FC08,?), ref: 003D062D
              • _memcmp.LIBVCRUNTIME ref: 003D064E
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: FromProg$FreeTask_memcmp
              • String ID:
              • API String ID: 314563124-0
              • Opcode ID: ad49083838302ddf5185b4e15fba39664945dfd16610cf8f5f94dec9f1052de1
              • Instruction ID: 6eb6a6696cbecaddd66c82275fe18df47c6d7595c5a5d8bd648bde9389f2e3fd
              • Opcode Fuzzy Hash: ad49083838302ddf5185b4e15fba39664945dfd16610cf8f5f94dec9f1052de1
              • Instruction Fuzzy Hash: FF814C72A00109EFCB05DF94D984EEEB7B9FF89715F204199E506AB250DB71AE06CF60
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: _free
              • String ID:
              • API String ID: 269201875-0
              • Opcode ID: c18ac5d5a9934cb032b499ca9129d4767dc9c6ee51c025a8ff102a3a7efda99c
              • Instruction ID: 08f51a54cfe0ba7cf6fd7ea276182b4c5cf8be0df09eca96b9e6899b799fd01e
              • Opcode Fuzzy Hash: c18ac5d5a9934cb032b499ca9129d4767dc9c6ee51c025a8ff102a3a7efda99c
              • Instruction Fuzzy Hash: 0E417C35A00100AFDF236BBE8C567FE3AB4EF42334F650626F618DA992E63049015362
              APIs
              • GetWindowRect.USER32(0114E140,?), ref: 004062E2
              • ScreenToClient.USER32(?,?), ref: 00406315
              • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00406382
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Window$ClientMoveRectScreen
              • String ID:
              • API String ID: 3880355969-0
              • Opcode ID: bc65e7e986b92cdd9ad05382d0d04d74e5156d0cbd415e0fa4d3e9939166a424
              • Instruction ID: bc38aa7035e94a66ab3beab974b59b9560f5161e42fdaeb71c6ce4e86e74fe68
              • Opcode Fuzzy Hash: bc65e7e986b92cdd9ad05382d0d04d74e5156d0cbd415e0fa4d3e9939166a424
              • Instruction Fuzzy Hash: 2B512D74900209EFDB20DF54D980AAE7BB5EB45360F11826AF816AB3E0D734ED91CB94
              APIs
              • socket.WSOCK32(00000002,00000002,00000011), ref: 003F1AFD
              • WSAGetLastError.WSOCK32 ref: 003F1B0B
              • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 003F1B8A
              • WSAGetLastError.WSOCK32 ref: 003F1B94
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ErrorLast$socket
              • String ID:
              • API String ID: 1881357543-0
              • Opcode ID: 049a408468be41a14b54390b4b37757b97a9345e812b19eb80378b8f87338352
              • Instruction ID: 343cf156f22efebc942f0ac8d8c60fe87f3da2167850515919a7c15a3c20f096
              • Opcode Fuzzy Hash: 049a408468be41a14b54390b4b37757b97a9345e812b19eb80378b8f87338352
              • Instruction Fuzzy Hash: 9C41AD34640200AFE722AF24D886F3A77E5AB44718F54C598FA1A9F3D3D776ED418B90
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3a90aad6943160051c8eb90561041aa810da2cf2716d71afa4c535cf3d9bb018
              • Instruction ID: e1e42903030d84c490ea3d739e69bf01dcedd8d67b55685c86673f6e6d323c83
              • Opcode Fuzzy Hash: 3a90aad6943160051c8eb90561041aa810da2cf2716d71afa4c535cf3d9bb018
              • Instruction Fuzzy Hash: D0410476A00304AFD7269F79CC41BAABBA9EF8A710F10852EF541DF683D771A9018780
              APIs
              • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 003E5783
              • GetLastError.KERNEL32(?,00000000), ref: 003E57A9
              • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 003E57CE
              • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 003E57FA
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: CreateHardLink$DeleteErrorFileLast
              • String ID:
              • API String ID: 3321077145-0
              • Opcode ID: fee7ff5ad8c58281fc3e87e93232cbc1161ad11f27205b157a2b662a8e71bdd6
              • Instruction ID: 7bcdbdd793ecf0710fe0296db54771dfbbd90d2abe9417b7bd65b20f474047a3
              • Opcode Fuzzy Hash: fee7ff5ad8c58281fc3e87e93232cbc1161ad11f27205b157a2b662a8e71bdd6
              • Instruction Fuzzy Hash: 1241FF35600610DFCB22DF15C585A5DBBE2EF89724B19C498E84A6F361CB34FD41CB91
              APIs
              • MultiByteToWideChar.KERNEL32(?,00000000,?,00396D71,00000000,00000000,003982D9,?,003982D9,?,00000001,00396D71,?,00000001,003982D9,003982D9), ref: 003AD910
              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 003AD999
              • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 003AD9AB
              • __freea.LIBCMT ref: 003AD9B4
                • Part of subcall function 003A3820: RtlAllocateHeap.NTDLL(00000000,?,00441444,?,0038FDF5,?,?,0037A976,00000010,00441440,003713FC,?,003713C6,?,00371129), ref: 003A3852
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
              • String ID:
              • API String ID: 2652629310-0
              • Opcode ID: 08a4c5e98d4a9a379b0725b2d9cded54c3f79c25bc6b6b25444f2aad4d8b85ec
              • Instruction ID: 90b99929bc100c4249d94b150afd1fdd0a97087ec7f1fbad110c1e54bd93adc5
              • Opcode Fuzzy Hash: 08a4c5e98d4a9a379b0725b2d9cded54c3f79c25bc6b6b25444f2aad4d8b85ec
              • Instruction Fuzzy Hash: CD31B072A0020AABDF269F64DC85EAF7BA9EB42310F064268FC05DB150EB35CD54CB90
              APIs
              • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405352
              • GetWindowLongW.USER32(?,000000F0), ref: 00405375
              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00405382
              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 004053A8
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: LongWindow$InvalidateMessageRectSend
              • String ID:
              • API String ID: 3340791633-0
              • Opcode ID: 69d27c31603481ed808054dc6d6e5df7a8bcf7c1e675319bf3430764ba9294d4
              • Instruction ID: 13be3864b6b11c1d6562733497500c0b5f2264252ca81f8c96192a632b8b1681
              • Opcode Fuzzy Hash: 69d27c31603481ed808054dc6d6e5df7a8bcf7c1e675319bf3430764ba9294d4
              • Instruction Fuzzy Hash: 7A31A334A55A08EFEB309B14DC46BEB7765EB05390F584123FE10B62E1C7B99980DF4A
              APIs
              • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 003DABF1
              • SetKeyboardState.USER32(00000080,?,00008000), ref: 003DAC0D
              • PostMessageW.USER32(00000000,00000101,00000000), ref: 003DAC74
              • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 003DACC6
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: KeyboardState$InputMessagePostSend
              • String ID:
              • API String ID: 432972143-0
              • Opcode ID: 28ecd1f2541504db5b777c4dddafba9d3a94698062a3e0cd49974bebd3daa4aa
              • Instruction ID: 55e37060ad6dd607b48ef2542e8b9750a5bab41a3cd29e82866c02b3be7ed8d4
              • Opcode Fuzzy Hash: 28ecd1f2541504db5b777c4dddafba9d3a94698062a3e0cd49974bebd3daa4aa
              • Instruction Fuzzy Hash: 63312872A24A18AFEF36CB64AD047FA7BA5AB85330F04471BE481D73D0C37589858792
              APIs
              • ClientToScreen.USER32(?,?), ref: 0040769A
              • GetWindowRect.USER32(?,?), ref: 00407710
              • PtInRect.USER32(?,?,00408B89), ref: 00407720
              • MessageBeep.USER32(00000000), ref: 0040778C
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Rect$BeepClientMessageScreenWindow
              • String ID:
              • API String ID: 1352109105-0
              • Opcode ID: 4f1c448effee9258bd9d60a8eafa0fba12754be6abe1cc1ebd6b8c0df8a46f2b
              • Instruction ID: e95cdfee989b3f10d94f70fa97d84ababe46cfb985c253f51d19e32c56e23173
              • Opcode Fuzzy Hash: 4f1c448effee9258bd9d60a8eafa0fba12754be6abe1cc1ebd6b8c0df8a46f2b
              • Instruction Fuzzy Hash: 2141B038A05214DFCB01DF58C894EA977F0FB49354F1441BAE814AB3A1C739B941CF95
              APIs
              • GetForegroundWindow.USER32 ref: 004016EB
                • Part of subcall function 003D3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 003D3A57
                • Part of subcall function 003D3A3D: GetCurrentThreadId.KERNEL32 ref: 003D3A5E
                • Part of subcall function 003D3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,003D25B3), ref: 003D3A65
              • GetCaretPos.USER32(?), ref: 004016FF
              • ClientToScreen.USER32(00000000,?), ref: 0040174C
              • GetForegroundWindow.USER32 ref: 00401752
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
              • String ID:
              • API String ID: 2759813231-0
              • Opcode ID: 6847cf094a1f7a631cf97768621d9298745b2e33482693380ddd75f0b7d62c97
              • Instruction ID: 8a37b63593b98e32b43c6e6944cd8a97f9019bb39678d9efcaff48779cc40b37
              • Opcode Fuzzy Hash: 6847cf094a1f7a631cf97768621d9298745b2e33482693380ddd75f0b7d62c97
              • Instruction Fuzzy Hash: 25314F75D00149AFC711EFA9C8C1CAEBBF9EF48304B5080AAE415EB251E7359E45CBA1
              APIs
              • CreateToolhelp32Snapshot.KERNEL32 ref: 003DD501
              • Process32FirstW.KERNEL32(00000000,?), ref: 003DD50F
              • Process32NextW.KERNEL32(00000000,?), ref: 003DD52F
              • CloseHandle.KERNEL32(00000000), ref: 003DD5DC
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
              • String ID:
              • API String ID: 420147892-0
              • Opcode ID: 52bded7bbc71e453d784806e0a324e2289d47f4a74091981afb1f05446b1cf14
              • Instruction ID: c2eb1d1c181b1558477e2d8f34061ccf8e03e846dc043bb10c738a2fd202dccc
              • Opcode Fuzzy Hash: 52bded7bbc71e453d784806e0a324e2289d47f4a74091981afb1f05446b1cf14
              • Instruction Fuzzy Hash: C631A4320083009FD312EF54D881AAFBBF8EF99354F10452DF5859A2A1EB719945CB92
              APIs
                • Part of subcall function 00389BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00389BB2
              • GetCursorPos.USER32(?), ref: 00409001
              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,003C7711,?,?,?,?,?), ref: 00409016
              • GetCursorPos.USER32(?), ref: 0040905E
              • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,003C7711,?,?,?), ref: 00409094
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Cursor$LongMenuPopupProcTrackWindow
              • String ID:
              • API String ID: 2864067406-0
              • Opcode ID: 1c195a3700be5e665a47844bfece78641caaa69c6941a44c5c43c059dd434bd3
              • Instruction ID: e67da235173500ba7486da621d8e9a2964b90b1a9f9bc05fb50ddfbf374c5aa7
              • Opcode Fuzzy Hash: 1c195a3700be5e665a47844bfece78641caaa69c6941a44c5c43c059dd434bd3
              • Instruction Fuzzy Hash: 80219C35600018EFDB268F94CC98EEB7BB9EB8A350F044166F9456B2A2C3359D90DB64
              APIs
              • GetFileAttributesW.KERNEL32(?,0040CB68), ref: 003DD2FB
              • GetLastError.KERNEL32 ref: 003DD30A
              • CreateDirectoryW.KERNEL32(?,00000000), ref: 003DD319
              • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0040CB68), ref: 003DD376
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: CreateDirectory$AttributesErrorFileLast
              • String ID:
              • API String ID: 2267087916-0
              • Opcode ID: b64824aa7ec80252d7c5911b6c6fe4c4edd74b1470543db255b6f369d499a64e
              • Instruction ID: 8f1607e508b986d19474a230c8af854d697a5a2b751a32fea13d42665307c364
              • Opcode Fuzzy Hash: b64824aa7ec80252d7c5911b6c6fe4c4edd74b1470543db255b6f369d499a64e
              • Instruction Fuzzy Hash: CC219F75508201DFC311DF28E88196A77E8AE56324F104B6EF499D73E1D731D945CB93
              APIs
                • Part of subcall function 003D1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 003D102A
                • Part of subcall function 003D1014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 003D1036
                • Part of subcall function 003D1014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 003D1045
                • Part of subcall function 003D1014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 003D104C
                • Part of subcall function 003D1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 003D1062
              • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 003D15BE
              • _memcmp.LIBVCRUNTIME ref: 003D15E1
              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 003D1617
              • HeapFree.KERNEL32(00000000), ref: 003D161E
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
              • String ID:
              • API String ID: 1592001646-0
              • Opcode ID: 0e638a9559f547134259545263fb8117005c942c34681e21b1eb33794f133fb1
              • Instruction ID: 7416fa23d7db843bd44ea4f273fbd52d8e9b2f6b4f01050bb796c84fb70c1d8a
              • Opcode Fuzzy Hash: 0e638a9559f547134259545263fb8117005c942c34681e21b1eb33794f133fb1
              • Instruction Fuzzy Hash: 2C21AC32E00108FFDF01DFA4E944BEEB7B8EF40344F09445AE841AB241E734AA48CBA0
              APIs
              • GetWindowLongW.USER32(?,000000EC), ref: 0040280A
              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00402824
              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00402832
              • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00402840
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Window$Long$AttributesLayered
              • String ID:
              • API String ID: 2169480361-0
              • Opcode ID: 0a56572f45eba3f7ad0a19281c6abca1c9a6b19b4cc1cfb032e0e3880912e499
              • Instruction ID: d4444f61135fdcdcf536200523251423800f17eec1c8142fabaaedb633d4727e
              • Opcode Fuzzy Hash: 0a56572f45eba3f7ad0a19281c6abca1c9a6b19b4cc1cfb032e0e3880912e499
              • Instruction Fuzzy Hash: 02210635204510AFD7149B24CD88F6AB7A5AF46324F14826AF4169B6D2CBB9FC42CB94
              APIs
                • Part of subcall function 003D8D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,003D790A,?,000000FF,?,003D8754,00000000,?,0000001C,?,?), ref: 003D8D8C
                • Part of subcall function 003D8D7D: lstrcpyW.KERNEL32(00000000,?), ref: 003D8DB2
                • Part of subcall function 003D8D7D: lstrcmpiW.KERNEL32(00000000,?,003D790A,?,000000FF,?,003D8754,00000000,?,0000001C,?,?), ref: 003D8DE3
              • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,003D8754,00000000,?,0000001C,?,?,00000000), ref: 003D7923
              • lstrcpyW.KERNEL32(00000000,?), ref: 003D7949
              • lstrcmpiW.KERNEL32(00000002,cdecl,?,003D8754,00000000,?,0000001C,?,?,00000000), ref: 003D7984
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: lstrcmpilstrcpylstrlen
              • String ID: cdecl
              • API String ID: 4031866154-3896280584
              • Opcode ID: 97e8617df120d419e38704ce5a2a6f8b46b3b92c69d22a3e376ab187e4963fae
              • Instruction ID: 4e500ab4395c3900cea2abb8eab0d2b935bea3ec0a9502acbfb06d327cc3c31f
              • Opcode Fuzzy Hash: 97e8617df120d419e38704ce5a2a6f8b46b3b92c69d22a3e376ab187e4963fae
              • Instruction Fuzzy Hash: B111B43B200302ABCB16AF34E855D7A77A9FF85350B50402BE946CB3A4FB319811C765
              APIs
              • SendMessageW.USER32(?,00001060,?,00000004), ref: 004056BB
              • _wcslen.LIBCMT ref: 004056CD
              • _wcslen.LIBCMT ref: 004056D8
              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00405816
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: MessageSend_wcslen
              • String ID:
              • API String ID: 455545452-0
              • Opcode ID: 2f570ac0221d3396aa1eacb79db4d5dc7bafc2abc2d812b27dc551994fe60803
              • Instruction ID: 6f0c3cd85845ba989dbd150f2c1abcd6329070a6c1938999055a29ff7ed47768
              • Opcode Fuzzy Hash: 2f570ac0221d3396aa1eacb79db4d5dc7bafc2abc2d812b27dc551994fe60803
              • Instruction Fuzzy Hash: 6A11DF75A00608A6DF20EB61CC85AEF37ACEF00360B104437F905A61C1EB788A85CF69
              APIs
              • SendMessageW.USER32(?,000000B0,?,?), ref: 003D1A47
              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 003D1A59
              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 003D1A6F
              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 003D1A8A
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: MessageSend
              • String ID:
              • API String ID: 3850602802-0
              • Opcode ID: d4b58147be752bd7596c6278f0bd53d16ab03dcdeaadde065cd3a0eb6b42268e
              • Instruction ID: 7ee34051d9f25b7b5d4b5fcf29124fa19cc497be21c0666ea474700358025f65
              • Opcode Fuzzy Hash: d4b58147be752bd7596c6278f0bd53d16ab03dcdeaadde065cd3a0eb6b42268e
              • Instruction Fuzzy Hash: 3C113C7AD01219FFEB11DBA4DD85FADBB78EB04750F210092E600B7290D671AE50DB94
              APIs
              • GetCurrentThreadId.KERNEL32 ref: 003DE1FD
              • MessageBoxW.USER32(?,?,?,?), ref: 003DE230
              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 003DE246
              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 003DE24D
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
              • String ID:
              • API String ID: 2880819207-0
              • Opcode ID: f3e8ced0fa635e5b29a242c8ae24333878e8ea13fdc48cf99b88bfc7d1417a75
              • Instruction ID: ae988cbf814264dd2e6599d8f508712a5dffee3f5d6ed88188b0b30178f7eb97
              • Opcode Fuzzy Hash: f3e8ced0fa635e5b29a242c8ae24333878e8ea13fdc48cf99b88bfc7d1417a75
              • Instruction Fuzzy Hash: 3C110876904214BBD702AFA8EC45A9F7FAC9B45310F00472AF924E7390D270DE0487A4
              APIs
              • CreateThread.KERNEL32(00000000,?,0039CFF9,00000000,00000004,00000000), ref: 0039D218
              • GetLastError.KERNEL32 ref: 0039D224
              • __dosmaperr.LIBCMT ref: 0039D22B
              • ResumeThread.KERNEL32(00000000), ref: 0039D249
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Thread$CreateErrorLastResume__dosmaperr
              • String ID:
              • API String ID: 173952441-0
              • Opcode ID: 364334752f3793f78fa67e507f23205966e22d41724897fa104abd3ba434f8e8
              • Instruction ID: c22bac48676e12c0acbdd9f825087ac7b4a81b330d049dc4aa25baeb7fb6b30f
              • Opcode Fuzzy Hash: 364334752f3793f78fa67e507f23205966e22d41724897fa104abd3ba434f8e8
              • Instruction Fuzzy Hash: 8C01F536805208BBDF135BA5DC0ABAF7A6DDF81730F210729F9259A1D0CB71C901C7A0
              APIs
              • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0037604C
              • GetStockObject.GDI32(00000011), ref: 00376060
              • SendMessageW.USER32(00000000,00000030,00000000), ref: 0037606A
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: CreateMessageObjectSendStockWindow
              • String ID:
              • API String ID: 3970641297-0
              • Opcode ID: 474a5697a8304ff00c610a4c072b8647a00d40b492c5948fba18c544ff06eff5
              • Instruction ID: 86947eb8f7cdd346bf0f2273489926bb8f2132cb39b7c025be7cb114edb46763
              • Opcode Fuzzy Hash: 474a5697a8304ff00c610a4c072b8647a00d40b492c5948fba18c544ff06eff5
              • Instruction Fuzzy Hash: 0F118B72105909BFEF224FA48C95AEABB6DEF083A4F014215FA0852020C7369C60EFA0
              APIs
              • ___BuildCatchObject.LIBVCRUNTIME ref: 00393B56
                • Part of subcall function 00393AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00393AD2
                • Part of subcall function 00393AA3: ___AdjustPointer.LIBCMT ref: 00393AED
              • _UnwindNestedFrames.LIBCMT ref: 00393B6B
              • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00393B7C
              • CallCatchBlock.LIBVCRUNTIME ref: 00393BA4
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
              • String ID:
              • API String ID: 737400349-0
              • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
              • Instruction ID: 382909c6f94ad7715d729f14d3fbbfb84f4fb08eb09353399be9a54788cee36b
              • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
              • Instruction Fuzzy Hash: 7E01E972100149BBDF126E95CC46EEB7B6AFF58754F054014FE489A121D732E962EBA0
              APIs
              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,003713C6,00000000,00000000,?,003A301A,003713C6,00000000,00000000,00000000,?,003A328B,00000006,FlsSetValue), ref: 003A30A5
              • GetLastError.KERNEL32(?,003A301A,003713C6,00000000,00000000,00000000,?,003A328B,00000006,FlsSetValue,00412290,FlsSetValue,00000000,00000364,?,003A2E46), ref: 003A30B1
              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,003A301A,003713C6,00000000,00000000,00000000,?,003A328B,00000006,FlsSetValue,00412290,FlsSetValue,00000000), ref: 003A30BF
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: LibraryLoad$ErrorLast
              • String ID:
              • API String ID: 3177248105-0
              • Opcode ID: b7ba2b197775b3b3cc0210b8dc92956bf1900b1bc3134eb28fcaf81f8bfb28a1
              • Instruction ID: 155dc8fb6abe1cd149c64a8fe6da39e222e768c239c851da64f90ca1a86830d6
              • Opcode Fuzzy Hash: b7ba2b197775b3b3cc0210b8dc92956bf1900b1bc3134eb28fcaf81f8bfb28a1
              • Instruction Fuzzy Hash: 31018836751222EBC7228B799C889677B98DF467A1B214734F907E7190D731D901C6D4
              APIs
              • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 003D747F
              • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 003D7497
              • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 003D74AC
              • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 003D74CA
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Type$Register$FileLoadModuleNameUser
              • String ID:
              • API String ID: 1352324309-0
              • Opcode ID: bb49b5b94c190b8b5a5631cef762bc6ec09a0749961207164fd56ba7c83d3490
              • Instruction ID: b2ed2c573423b10b5fa4e0f80f26f438f5a684721876a51a1131a816bec1d6a8
              • Opcode Fuzzy Hash: bb49b5b94c190b8b5a5631cef762bc6ec09a0749961207164fd56ba7c83d3490
              • Instruction Fuzzy Hash: FD11C4B2205310DFE7228F15ED48FA2BFFCFB00B00F10856AA616D6691E770E904DB90
              APIs
              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,003DACD3,?,00008000), ref: 003DB0C4
              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,003DACD3,?,00008000), ref: 003DB0E9
              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,003DACD3,?,00008000), ref: 003DB0F3
              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,003DACD3,?,00008000), ref: 003DB126
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: CounterPerformanceQuerySleep
              • String ID:
              • API String ID: 2875609808-0
              • Opcode ID: 28ac3ecf01d71ae31c177010b917c685cd54465985c78b78ef326357e911b80b
              • Instruction ID: 49f7528fe59dfbbd69d5128809656e20b97d6f5ecdb8fa88b547598b31b1686d
              • Opcode Fuzzy Hash: 28ac3ecf01d71ae31c177010b917c685cd54465985c78b78ef326357e911b80b
              • Instruction Fuzzy Hash: D4116D32C0162CE7CF01AFE4E999AEEFB78FF09711F124196D981B6281CB3096508B95
              APIs
              • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 003D2DC5
              • GetWindowThreadProcessId.USER32(?,00000000), ref: 003D2DD6
              • GetCurrentThreadId.KERNEL32 ref: 003D2DDD
              • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 003D2DE4
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
              • String ID:
              • API String ID: 2710830443-0
              • Opcode ID: d000fac8b0647eca5cd59c75b24c9fd434291408a44372412f3d8ba5a54078da
              • Instruction ID: 2ac6322734782727c6842e773ad7e6baa95463fd786b623698ca9c7b377ede8b
              • Opcode Fuzzy Hash: d000fac8b0647eca5cd59c75b24c9fd434291408a44372412f3d8ba5a54078da
              • Instruction Fuzzy Hash: BEE09272141224FBD7301B72AD4DFEB3E6DEF56BA1F000626F505E11809AB1C840C6B0
              APIs
                • Part of subcall function 00389639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00389693
                • Part of subcall function 00389639: SelectObject.GDI32(?,00000000), ref: 003896A2
                • Part of subcall function 00389639: BeginPath.GDI32(?), ref: 003896B9
                • Part of subcall function 00389639: SelectObject.GDI32(?,00000000), ref: 003896E2
              • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00408887
              • LineTo.GDI32(?,?,?), ref: 00408894
              • EndPath.GDI32(?), ref: 004088A4
              • StrokePath.GDI32(?), ref: 004088B2
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
              • String ID:
              • API String ID: 1539411459-0
              • Opcode ID: ff770ab50176afb24cb317137261ae12a194e149ee3b79137ba0131fb0949ae9
              • Instruction ID: a014d5348402b5a3df1471037bcb05c2f5e3d9256099cb4b954ddf91a8baf2c2
              • Opcode Fuzzy Hash: ff770ab50176afb24cb317137261ae12a194e149ee3b79137ba0131fb0949ae9
              • Instruction Fuzzy Hash: 04F09A36002218FAEB122F94AD09FCA3E19AF06310F048121FA01750E1C7780550CFED
              APIs
              • GetSysColor.USER32(00000008), ref: 003898CC
              • SetTextColor.GDI32(?,?), ref: 003898D6
              • SetBkMode.GDI32(?,00000001), ref: 003898E9
              • GetStockObject.GDI32(00000005), ref: 003898F1
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Color$ModeObjectStockText
              • String ID:
              • API String ID: 4037423528-0
              • Opcode ID: 133b53849db16ceae6bdd1af511436cc3935637ce258c73288c3d3a00dbdf371
              • Instruction ID: d7ea22e0875fbdccc80a0775d1be24435590882980a6f517335f8efbe6a3c140
              • Opcode Fuzzy Hash: 133b53849db16ceae6bdd1af511436cc3935637ce258c73288c3d3a00dbdf371
              • Instruction Fuzzy Hash: D9E06531244240EEDB215B74AD49BE83F10AB52335F048329FAF5A80E1C77146519F10
              APIs
              • GetCurrentThread.KERNEL32 ref: 003D1634
              • OpenThreadToken.ADVAPI32(00000000,?,?,?,003D11D9), ref: 003D163B
              • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,003D11D9), ref: 003D1648
              • OpenProcessToken.ADVAPI32(00000000,?,?,?,003D11D9), ref: 003D164F
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: CurrentOpenProcessThreadToken
              • String ID:
              • API String ID: 3974789173-0
              • Opcode ID: a9a4cd331fcc5c3c4db30c7dbcb1d37b256951b43dbaa900aed705bb2cf64793
              • Instruction ID: 053bc463617d07955b3b9fea2bc1858508215bf9070a26825e3f6b149dd92918
              • Opcode Fuzzy Hash: a9a4cd331fcc5c3c4db30c7dbcb1d37b256951b43dbaa900aed705bb2cf64793
              • Instruction Fuzzy Hash: 62E08632601211EBE7201FF0AF4DB463B7CAF44791F158929F645E9080D6348440C798
              APIs
              • GetDesktopWindow.USER32 ref: 003CD858
              • GetDC.USER32(00000000), ref: 003CD862
              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 003CD882
              • ReleaseDC.USER32(?), ref: 003CD8A3
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: CapsDesktopDeviceReleaseWindow
              • String ID:
              • API String ID: 2889604237-0
              • Opcode ID: 13e43656d5eb0c68bfc7edd9b06a1ac5fd633201950a4349bcdb88a8fa860f91
              • Instruction ID: e9096da57c82a980d925e0ba5d8537ed7da6fa04f9fb6af8c519b4af3a7cebdb
              • Opcode Fuzzy Hash: 13e43656d5eb0c68bfc7edd9b06a1ac5fd633201950a4349bcdb88a8fa860f91
              • Instruction Fuzzy Hash: 2BE09AB5800205DFCF52AFA0DA88A6DBBB6FB08311F149569F846F7250CB399942AF54
              APIs
              • GetDesktopWindow.USER32 ref: 003CD86C
              • GetDC.USER32(00000000), ref: 003CD876
              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 003CD882
              • ReleaseDC.USER32(?), ref: 003CD8A3
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: CapsDesktopDeviceReleaseWindow
              • String ID:
              • API String ID: 2889604237-0
              • Opcode ID: 6a98bbe2127404e64e3bdc509e95853022be4d9a4b9ebadf632cca82d1ed9130
              • Instruction ID: b96638ab04ea76a4c231268316cafaa0906ca4f4c15e49d778308e48dde0fd86
              • Opcode Fuzzy Hash: 6a98bbe2127404e64e3bdc509e95853022be4d9a4b9ebadf632cca82d1ed9130
              • Instruction Fuzzy Hash: 91E09AB5800204DFCF61AFA0D98866DBBB5BB08311F149559E94AF7250CB3959029F54
              APIs
                • Part of subcall function 00377620: _wcslen.LIBCMT ref: 00377625
              • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 003E4ED4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Connection_wcslen
              • String ID: *$LPT
              • API String ID: 1725874428-3443410124
              • Opcode ID: 19f7aaafadce0dba41465dc67f580b89f08ff983d5135bbb778dfbc732789f55
              • Instruction ID: 0ce32193688131c149b07976ff1f0d973c96178ec6abe6cfe59a87abea810cb2
              • Opcode Fuzzy Hash: 19f7aaafadce0dba41465dc67f580b89f08ff983d5135bbb778dfbc732789f55
              • Instruction Fuzzy Hash: 6091C474A00254DFCB16DF55C484EAABBF5BF48704F198199E80A9F3A2C735ED86CB90
              APIs
              • __startOneArgErrorHandling.LIBCMT ref: 0039E30D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ErrorHandling__start
              • String ID: pow
              • API String ID: 3213639722-2276729525
              • Opcode ID: bcf31c5a36f9d94dd59d5dcd5208731adc98c2e6d462cc9d8b5e0a7c8ae2e4f0
              • Instruction ID: f96b72e8917c9326d45635cb4090ed87d5d2c7dc1fe03af8c11652ea9161d880
              • Opcode Fuzzy Hash: bcf31c5a36f9d94dd59d5dcd5208731adc98c2e6d462cc9d8b5e0a7c8ae2e4f0
              • Instruction Fuzzy Hash: F2516E61A0C20296CF17F714CDC17BA3BA8EB42740F358D78E0D5862E9EB358C919A4A
              APIs
              • CharUpperBuffW.USER32(003C569E,00000000,?,0040CC08,?,00000000,00000000), ref: 003F78DD
                • Part of subcall function 00376B57: _wcslen.LIBCMT ref: 00376B6A
              • CharUpperBuffW.USER32(003C569E,00000000,?,0040CC08,00000000,?,00000000,00000000), ref: 003F783B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: BuffCharUpper$_wcslen
              • String ID: <sC
              • API String ID: 3544283678-972554233
              • Opcode ID: 9295956608ecd175517e8d6f5a8403551e86a2acf78e4533d3a0e2980281f70c
              • Instruction ID: 62d494273189a23f25098033160bb6fc7d56985f88af82d8fd9d89915fa9af92
              • Opcode Fuzzy Hash: 9295956608ecd175517e8d6f5a8403551e86a2acf78e4533d3a0e2980281f70c
              • Instruction Fuzzy Hash: CE61527591411DEACF26EBA4CC92DFDB3B8BF14300B548125F646BB091EF785A05DBA0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID:
              • String ID: #
              • API String ID: 0-1885708031
              • Opcode ID: b06c976a52b387aef39274447e76bfb8cdb6dd7e779616965699ce3b4816db15
              • Instruction ID: 02cffc4429db72ee7eb44f3275926c2a96661c4892d98f4467e8d70da15e2a8b
              • Opcode Fuzzy Hash: b06c976a52b387aef39274447e76bfb8cdb6dd7e779616965699ce3b4816db15
              • Instruction Fuzzy Hash: B0510275500346DFDB27EF68C481BBA7BA8EF25310F248499EC91DB290D6349D52CBA0
              APIs
              • Sleep.KERNEL32(00000000), ref: 0038F2A2
              • GlobalMemoryStatusEx.KERNEL32(?), ref: 0038F2BB
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: GlobalMemorySleepStatus
              • String ID: @
              • API String ID: 2783356886-2766056989
              • Opcode ID: d1bae9dfd6ac2aa701057a6ff20cc6d1e1f843283a41879d9a46d1ead39f1516
              • Instruction ID: 32b3328469abaa5a77be2f0068a9619b1d00ee9b06999c4a59282d14fffa6ee9
              • Opcode Fuzzy Hash: d1bae9dfd6ac2aa701057a6ff20cc6d1e1f843283a41879d9a46d1ead39f1516
              • Instruction Fuzzy Hash: 9F5164724187449BD331AF20DC86BAFBBF8FB94304F81885CF1D9450A5EB708529CB6A
              APIs
              • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 003F57E0
              • _wcslen.LIBCMT ref: 003F57EC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: BuffCharUpper_wcslen
              • String ID: CALLARGARRAY
              • API String ID: 157775604-1150593374
              • Opcode ID: ba909e77695216ec6cc7285658f82d94b6c33ff8a4d527fba8f28b0dc999df84
              • Instruction ID: 427e3a2d09943a711463f13c1a6880e829e912d5b9ffbe4f8c8c784f42e4b744
              • Opcode Fuzzy Hash: ba909e77695216ec6cc7285658f82d94b6c33ff8a4d527fba8f28b0dc999df84
              • Instruction Fuzzy Hash: 1E41A471E00209DFCB15EFA9C8819BEBBB5FF59350F11416AF605AB291E7349D81CB90
              APIs
              • _wcslen.LIBCMT ref: 003ED130
              • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 003ED13A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: CrackInternet_wcslen
              • String ID: |
              • API String ID: 596671847-2343686810
              • Opcode ID: 0a02d7d5a790f9383f3cc9dc08e36431dcac69d0ef9b80cede116c055facda23
              • Instruction ID: 1c30d1d08f4c80378a6e22574aeed2549226466778a9f3e7a612c7adde967300
              • Opcode Fuzzy Hash: 0a02d7d5a790f9383f3cc9dc08e36431dcac69d0ef9b80cede116c055facda23
              • Instruction Fuzzy Hash: F8313E71D00219ABCF16EFA5CD85EEE7FB9FF04300F004119F819AA162D735AA06DB61
              APIs
              • DestroyWindow.USER32(?,?,?,?), ref: 00403621
              • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 0040365C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Window$DestroyMove
              • String ID: static
              • API String ID: 2139405536-2160076837
              • Opcode ID: 894a43f010d1c2e3e6c997a5c5a1e623ab69dfa9cc65e669504632caf3dacdcb
              • Instruction ID: 32d6da8242b096c4aeb46cab2db2f9a6b24e53cc880a527e5ef11b1a358953c0
              • Opcode Fuzzy Hash: 894a43f010d1c2e3e6c997a5c5a1e623ab69dfa9cc65e669504632caf3dacdcb
              • Instruction Fuzzy Hash: 9D31A171100604AADB20DF74DC80EBB77ADFF48714F10962EF895A7290DA39AD81C764
              APIs
              • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040461F
              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00404634
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: '
              • API String ID: 3850602802-1997036262
              • Opcode ID: a5baa77e7ddc583a5e809c3f5c4768b7b6e058d3c38e92e54d8a47580679dc2a
              • Instruction ID: 4b9a1dca9b26412cbf88e3c337a3dd89499a02deb68cdf234c8267733541f754
              • Opcode Fuzzy Hash: a5baa77e7ddc583a5e809c3f5c4768b7b6e058d3c38e92e54d8a47580679dc2a
              • Instruction Fuzzy Hash: BB313DB4A01309AFDB14CFA5C980BDA7BB5FF89300F10447AEA04AB391E775A941CF94
              APIs
              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0040327C
              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00403287
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: Combobox
              • API String ID: 3850602802-2096851135
              • Opcode ID: b2ae1c2465a2f43b88dc021fc4e433e8e9f97af36f56937e602f345ca4b23000
              • Instruction ID: edaa5f3c3aa831077fe0a969cd538b4b0ba1af553172766865f2185be612a3fa
              • Opcode Fuzzy Hash: b2ae1c2465a2f43b88dc021fc4e433e8e9f97af36f56937e602f345ca4b23000
              • Instruction Fuzzy Hash: C411B2713002087FEF219F94DC81EBB3B6EEB983A5F10457AF918AB2D0D6399D518764
              APIs
                • Part of subcall function 0037600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0037604C
                • Part of subcall function 0037600E: GetStockObject.GDI32(00000011), ref: 00376060
                • Part of subcall function 0037600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0037606A
              • GetWindowRect.USER32(00000000,?), ref: 0040377A
              • GetSysColor.USER32(00000012), ref: 00403794
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Window$ColorCreateMessageObjectRectSendStock
              • String ID: static
              • API String ID: 1983116058-2160076837
              • Opcode ID: 3731b9627e053435bfe936fb5f7bb19ed6154c0bdc6d7d2320f0259b3f9b7b3d
              • Instruction ID: 2620eaf5c9f76d8460e8b8c5f2de65ffceacc25b7ad43313c7a7773f22d631ce
              • Opcode Fuzzy Hash: 3731b9627e053435bfe936fb5f7bb19ed6154c0bdc6d7d2320f0259b3f9b7b3d
              • Instruction Fuzzy Hash: 9A1129B2610209AFDB11DFA8CC46EEA7BB8EB08315F004A25F955E3290D739E8619B54
              APIs
              • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 003ECD7D
              • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 003ECDA6
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Internet$OpenOption
              • String ID: <local>
              • API String ID: 942729171-4266983199
              • Opcode ID: 09b1b7203dba9b23f6c54cfc59b9ce8f6ebc115ca25bd257abad674cb2829ef0
              • Instruction ID: ecf2ca49f2838c672a8055871e7415412e7547b4f4246d59216568d532b5854a
              • Opcode Fuzzy Hash: 09b1b7203dba9b23f6c54cfc59b9ce8f6ebc115ca25bd257abad674cb2829ef0
              • Instruction Fuzzy Hash: 0B11A371225672BAD7254B678C85EEBBEACEB127A4F005336B109930C0D6759842D6F0
              APIs
              • GetWindowTextLengthW.USER32(00000000), ref: 004034AB
              • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 004034BA
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: LengthMessageSendTextWindow
              • String ID: edit
              • API String ID: 2978978980-2167791130
              • Opcode ID: 46c419ba51b0f7bbf17c16607aa2b1666ebb698c1bac3b0804362004de00cf0c
              • Instruction ID: 3865e2c556960f7be338165a6936e74303dd8127eae46a7ca59d1d7b5d163567
              • Opcode Fuzzy Hash: 46c419ba51b0f7bbf17c16607aa2b1666ebb698c1bac3b0804362004de00cf0c
              • Instruction Fuzzy Hash: AC11BF71100108ABEB224F64DC80AAB3B6EEF05379F504735F960AB2E0C779EC519B59
              APIs
                • Part of subcall function 00379CB3: _wcslen.LIBCMT ref: 00379CBD
              • CharUpperBuffW.USER32(?,?,?), ref: 003D6CB6
              • _wcslen.LIBCMT ref: 003D6CC2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: _wcslen$BuffCharUpper
              • String ID: STOP
              • API String ID: 1256254125-2411985666
              • Opcode ID: 9e5d0e75b1767cf058dee91c841c316f02ed082b370948eb994cb86db63c6e60
              • Instruction ID: abc1a2d8340419db36dd74636faa12c94f7f0baedff8bfde01690853796e19d9
              • Opcode Fuzzy Hash: 9e5d0e75b1767cf058dee91c841c316f02ed082b370948eb994cb86db63c6e60
              • Instruction Fuzzy Hash: 5A0104336109278ACB22AFBDEC829BF33A9EB607107010536E87297295EB35D800C650
              APIs
                • Part of subcall function 00379CB3: _wcslen.LIBCMT ref: 00379CBD
                • Part of subcall function 003D3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 003D3CCA
              • SendMessageW.USER32(?,00000180,00000000,?), ref: 003D1C46
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ClassMessageNameSend_wcslen
              • String ID: ComboBox$ListBox
              • API String ID: 624084870-1403004172
              • Opcode ID: 3cdd8979a12a75b72ea71249ec2da0b9ad62b7b27e51e469cdd2dddbd46c4983
              • Instruction ID: 738f3b393fe58f31e8079f6b46e652d4c2c581ef720d461d16d5f2bc5ed5ad12
              • Opcode Fuzzy Hash: 3cdd8979a12a75b72ea71249ec2da0b9ad62b7b27e51e469cdd2dddbd46c4983
              • Instruction Fuzzy Hash: B401A776B9110477DF16EB90EE52EFF77AC9B15340F14011BA4067B382EA249E08D6B6
              APIs
                • Part of subcall function 00379CB3: _wcslen.LIBCMT ref: 00379CBD
                • Part of subcall function 003D3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 003D3CCA
              • SendMessageW.USER32(?,00000182,?,00000000), ref: 003D1CC8
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: ClassMessageNameSend_wcslen
              • String ID: ComboBox$ListBox
              • API String ID: 624084870-1403004172
              • Opcode ID: 6618ef80113c123879e7eb66dc3dce8d6ca1cfe4fb2c174c2e4ff8859691e05d
              • Instruction ID: 7329f3b73e06940a72ff569e19d612796ee26e93e3adc804a8d4b727f3c70344
              • Opcode Fuzzy Hash: 6618ef80113c123879e7eb66dc3dce8d6ca1cfe4fb2c174c2e4ff8859691e05d
              • Instruction Fuzzy Hash: B401A2B279011877CB26EBA0DA02FFE73ACAB11340F140117B80677381EA259F08D672
              APIs
              • __Init_thread_footer.LIBCMT ref: 0038A529
                • Part of subcall function 00379CB3: _wcslen.LIBCMT ref: 00379CBD
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Init_thread_footer_wcslen
              • String ID: ,%D$3y<
              • API String ID: 2551934079-3079420674
              • Opcode ID: 56ce6d8cab664613b43ecb53d864043d1815550aa53fda83210795c3970c0817
              • Instruction ID: 846f43838b866db4a0c00779a2ca7e95264f80494b3304e79f3fb5e72f644bf1
              • Opcode Fuzzy Hash: 56ce6d8cab664613b43ecb53d864043d1815550aa53fda83210795c3970c0817
              • Instruction Fuzzy Hash: E7017B31700B109BEA17F368E80BBAD7364DB06710F5041A7F5451F2C2DF645D418B9B
              APIs
              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00443018,0044305C), ref: 004081BF
              • CloseHandle.KERNEL32 ref: 004081D1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: CloseCreateHandleProcess
              • String ID: \0D
              • API String ID: 3712363035-873512380
              • Opcode ID: 9f451495f0f4c32b39adedff28c1f49a6f959be130f30092447b0d7c1a0cca8a
              • Instruction ID: 97c2e66bbaa2716629e3c5e1a80ee840ee94bdbe8143f5bde66ab4e01e23b236
              • Opcode Fuzzy Hash: 9f451495f0f4c32b39adedff28c1f49a6f959be130f30092447b0d7c1a0cca8a
              • Instruction Fuzzy Hash: D6F054B5640300BAF7206F616C45F773A5CDB06B52F004531BF08E91A2D67A8E0082BC
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: _wcslen
              • String ID: 3, 3, 16, 1
              • API String ID: 176396367-3042988571
              • Opcode ID: 376cbd4b179227cf864863dfb2882fc165f799ed810a5ddfc9805dbd77ef7d3f
              • Instruction ID: a5b6abfbc573c55feaf235a7d38e53c757b9dc51ad33babd88fde7381961b529
              • Opcode Fuzzy Hash: 376cbd4b179227cf864863dfb2882fc165f799ed810a5ddfc9805dbd77ef7d3f
              • Instruction Fuzzy Hash: F0E02B02204224109233227B9CC5E7F5689CFC9790710182BFA81C6366EB948D9293A0
              APIs
              • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 003D0B23
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Message
              • String ID: AutoIt$Error allocating memory.
              • API String ID: 2030045667-4017498283
              • Opcode ID: dc353cc89b42b423a254a9e8eedba10fa287593566995c3a09f0f4f9a500ce89
              • Instruction ID: c15205c0488cba405c7b0796a4654259ad18e8b610f769bc09dd49a99fff3248
              • Opcode Fuzzy Hash: dc353cc89b42b423a254a9e8eedba10fa287593566995c3a09f0f4f9a500ce89
              • Instruction Fuzzy Hash: B0E04832248358AAD62537947C47F897B848F05F51F204477F758695C38AE5649046ED
              APIs
                • Part of subcall function 0038F7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00390D71,?,?,?,0037100A), ref: 0038F7CE
              • IsDebuggerPresent.KERNEL32(?,?,?,0037100A), ref: 00390D75
              • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0037100A), ref: 00390D84
              Strings
              • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00390D7F
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
              • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
              • API String ID: 55579361-631824599
              • Opcode ID: f031eaa54f7f438b3c07aa524f049fedeea34c8459adf5b2e189fee13f1a35d6
              • Instruction ID: fd134f6c5296c28ea25f1b07d0765d9a78a7c5b6464fcf247dff7a5fb8d9a8ee
              • Opcode Fuzzy Hash: f031eaa54f7f438b3c07aa524f049fedeea34c8459adf5b2e189fee13f1a35d6
              • Instruction Fuzzy Hash: 5CE09274200301CFE735AFB8D5483427BE4BF00740F008A7DE896D6AA1DBB4E4488BD1
              APIs
              • __Init_thread_footer.LIBCMT ref: 0038E3D5
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: Init_thread_footer
              • String ID: 0%D$8%D
              • API String ID: 1385522511-1400359183
              • Opcode ID: 7fbd4e4030adf490951f390725bfb4141a491d6a1dc175e15d1562fd2e3d76d5
              • Instruction ID: de898c257d9d28ba45ed541b4b0b8f8e227050e6163880294de797639826d858
              • Opcode Fuzzy Hash: 7fbd4e4030adf490951f390725bfb4141a491d6a1dc175e15d1562fd2e3d76d5
              • Instruction Fuzzy Hash: 77E0863D514B10EFDA0AB718BA55A8A3355EB46320BD151F6F1128B1D19FF42C41875D
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: LocalTime
              • String ID: %.3d$X64
              • API String ID: 481472006-1077770165
              • Opcode ID: 0c837d60bac277c81f5b1457e3770ccbdecd71264a05c44bd4f2e91df80e5348
              • Instruction ID: 058939a7f77b9ae3e6d4ed50c16213c83579028ef10b7c4ee0a2dcf322ae4308
              • Opcode Fuzzy Hash: 0c837d60bac277c81f5b1457e3770ccbdecd71264a05c44bd4f2e91df80e5348
              • Instruction Fuzzy Hash: 10D01DA1C04104E9CB51B7D0CC45EB9B37CFB09301F504876F806D1840D634C9445751
              APIs
              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0040236C
              • PostMessageW.USER32(00000000), ref: 00402373
                • Part of subcall function 003DE97B: Sleep.KERNEL32 ref: 003DE9F3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: FindMessagePostSleepWindow
              • String ID: Shell_TrayWnd
              • API String ID: 529655941-2988720461
              • Opcode ID: a11d0083485e2de598a9c6f45a172ed70f3a0d41adc166abbff91502f4bccc92
              • Instruction ID: 2dccd735ae6b0dc89b2a30e8e2965ab8ddb1b52ee538357693edb7262d6a49b0
              • Opcode Fuzzy Hash: a11d0083485e2de598a9c6f45a172ed70f3a0d41adc166abbff91502f4bccc92
              • Instruction Fuzzy Hash: 0BD0C976381310BAE668B770AD4FFCA6A189B04B14F514A267645AA1D0CAB4A8018A58
              APIs
              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0040232C
              • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 0040233F
                • Part of subcall function 003DE97B: Sleep.KERNEL32 ref: 003DE9F3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1640679216.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
              • Associated: 00000000.00000002.1640615793.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640807433.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640888495.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1640939946.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_370000_whiteee.jbxd
              Similarity
              • API ID: FindMessagePostSleepWindow
              • String ID: Shell_TrayWnd
              • API String ID: 529655941-2988720461
              • Opcode ID: b72c550128358227a7902a958c34b042a2dc12e79a189413421ee965e9f4b7e2
              • Instruction ID: 84b216ca7d1902745604143ef9473b3e0135fdd2ed7f4bdcbc61397ec8c922f7
              • Opcode Fuzzy Hash: b72c550128358227a7902a958c34b042a2dc12e79a189413421ee965e9f4b7e2
              • Instruction Fuzzy Hash: E9D0C976395310F6E668B770AD5FFCA6A189B04B14F114A267645AA1D0CAB4A8018A58