Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ss.exe

Overview

General Information

Sample name:ss.exe
Analysis ID:1466692
MD5:51db2f697d46b38417dc0ae45abaef28
SHA1:c1df22fd6c29d26e2a6765f51554e333d200df4c
SHA256:8e537ef5b6125fef6449de923808b92122edc8e2d6cc887d49c8ed5510760848
Tags:AgentTeslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Installs a global keyboard hook
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • ss.exe (PID: 6188 cmdline: "C:\Users\user\Desktop\ss.exe" MD5: 51DB2F697D46B38417DC0AE45ABAEF28)
    • RegSvcs.exe (PID: 2920 cmdline: "C:\Users\user\Desktop\ss.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.pgsu.co.id", "Username": "joko.wahyono@pgsu.co.id", "Password": "Vecls16@Vezs           "}
SourceRuleDescriptionAuthorStrings
00000002.00000002.4453899182.00000000030EE000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000000.00000002.2003264166.0000000003770000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.2003264166.0000000003770000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.2003264166.0000000003770000.00000004.00001000.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
        • 0x334d7:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
        • 0x33549:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
        • 0x335d3:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
        • 0x33665:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
        • 0x336cf:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
        • 0x33741:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
        • 0x337d7:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
        • 0x33867:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
        00000002.00000002.4453899182.0000000003119000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Click to see the 8 entries
          SourceRuleDescriptionAuthorStrings
          2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              2.2.RegSvcs.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
              • 0x334d7:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
              • 0x33549:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
              • 0x335d3:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
              • 0x33665:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
              • 0x336cf:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
              • 0x33741:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
              • 0x337d7:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
              • 0x33867:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
              0.2.ss.exe.3770000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                0.2.ss.exe.3770000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  Click to see the 4 entries

                  System Summary

                  barindex
                  Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 107.178.108.39, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 2920, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49704
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 0.2.ss.exe.3770000.1.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.pgsu.co.id", "Username": "joko.wahyono@pgsu.co.id", "Password": "Vecls16@Vezs "}
                  Source: ss.exeReversingLabs: Detection: 42%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: ss.exeJoe Sandbox ML: detected
                  Source: ss.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: Binary string: wntdll.pdbUGP source: ss.exe, 00000000.00000003.2000877442.0000000003CB0000.00000004.00001000.00020000.00000000.sdmp, ss.exe, 00000000.00000003.2001112982.0000000003B10000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: ss.exe, 00000000.00000003.2000877442.0000000003CB0000.00000004.00001000.00020000.00000000.sdmp, ss.exe, 00000000.00000003.2001112982.0000000003B10000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_00684696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00684696
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0068C93C FindFirstFileW,FindClose,0_2_0068C93C
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0068C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0068C9C7
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0068F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0068F200
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0068F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0068F35D
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0068F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0068F65E
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_00683A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00683A2B
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_00683D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00683D4E
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0068BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0068BF27
                  Source: global trafficTCP traffic: 192.168.2.5:49704 -> 107.178.108.39:587
                  Source: Joe Sandbox ViewIP Address: 107.178.108.39 107.178.108.39
                  Source: Joe Sandbox ViewASN Name: IOFLOODUS IOFLOODUS
                  Source: global trafficTCP traffic: 192.168.2.5:49704 -> 107.178.108.39:587
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_006925E2 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_006925E2
                  Source: global trafficDNS traffic detected: DNS query: mail.pgsu.co.id
                  Source: RegSvcs.exe, 00000002.00000002.4453899182.00000000030EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.pgsu.co.id
                  Source: RegSvcs.exe, 00000002.00000002.4453899182.00000000030EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pgsu.co.id
                  Source: RegSvcs.exe, 00000002.00000002.4453899182.00000000030EE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4455656305.00000000065D7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4455656305.00000000065EC000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4453242211.00000000012C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/0
                  Source: RegSvcs.exe, 00000002.00000002.4453899182.00000000030EE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4455656305.00000000065D7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4455656305.00000000065EC000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4453242211.00000000012C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r3.o.lencr.org0
                  Source: RegSvcs.exe, 00000002.00000002.4453899182.00000000030EE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4453242211.00000000012BA000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4455656305.00000000065D7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4455656305.00000000065EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                  Source: RegSvcs.exe, 00000002.00000002.4453899182.00000000030EE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4453242211.00000000012BA000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4455656305.00000000065D7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4455656305.00000000065EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                  Source: ss.exe, 00000000.00000002.2003264166.0000000003770000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4452947585.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: 0.2.ss.exe.3770000.1.raw.unpack, cPKWk.cs.Net Code: gdCwU6rsZ
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0069425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0069425A
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_00694458 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00694458
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0069425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0069425A
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_00680219 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00680219
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_006ACDAC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_006ACDAC

                  System Summary

                  barindex
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.ss.exe.3770000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.ss.exe.3770000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 00000000.00000002.2003264166.0000000003770000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: C:\Users\user\Desktop\ss.exeCode function: This is a third-party compiled AutoIt script.0_2_00623B4C
                  Source: ss.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                  Source: ss.exe, 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_00094a86-2
                  Source: ss.exe, 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_9a7ec6df-4
                  Source: ss.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_2ca09c99-7
                  Source: ss.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_5121ae6e-2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess Stats: CPU usage > 49%
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_00684021: CreateFileW,DeviceIoControl,CloseHandle,0_2_00684021
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_00678858 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00678858
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0068545F ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_0068545F
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0062E8000_2_0062E800
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0064DBB50_2_0064DBB5
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0062E0600_2_0062E060
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_006A804A0_2_006A804A
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_006341400_2_00634140
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_006424050_2_00642405
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_006565220_2_00656522
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_006A06650_2_006A0665
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0065267E0_2_0065267E
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_006368430_2_00636843
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0064283A0_2_0064283A
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_006589DF0_2_006589DF
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_00638A0E0_2_00638A0E
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_006A0AE20_2_006A0AE2
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_00656A940_2_00656A94
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0067EB070_2_0067EB07
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_00688B130_2_00688B13
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0064CD610_2_0064CD61
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_006570060_2_00657006
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0063710E0_2_0063710E
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_006331900_2_00633190
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_006212870_2_00621287
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_006433C70_2_006433C7
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0064F4190_2_0064F419
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_006416C40_2_006416C4
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_006356800_2_00635680
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_006358C00_2_006358C0
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_006478D30_2_006478D3
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_00641BB80_2_00641BB8
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_00659D050_2_00659D05
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0062FE400_2_0062FE40
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0064BFE60_2_0064BFE6
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_00641FD00_2_00641FD0
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_01EC35F00_2_01EC35F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_015F93802_2_015F9380
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_015F9B482_2_015F9B48
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_015F4AA02_2_015F4AA0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_015FCDC82_2_015FCDC8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_015F3E882_2_015F3E88
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_015F41D02_2_015F41D0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_015FF4C02_2_015FF4C0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_064856C82_2_064856C8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06483F402_2_06483F40
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0648BCF82_2_0648BCF8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0648DCAD2_2_0648DCAD
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06482AF02_2_06482AF0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06488B722_2_06488B72
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_064800402_2_06480040
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06484FE82_2_06484FE8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_064832382_2_06483238
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_065714C02_2_065714C0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_065715282_2_06571528
                  Source: C:\Users\user\Desktop\ss.exeCode function: String function: 00627F41 appears 35 times
                  Source: C:\Users\user\Desktop\ss.exeCode function: String function: 00648B40 appears 42 times
                  Source: C:\Users\user\Desktop\ss.exeCode function: String function: 00640D27 appears 70 times
                  Source: ss.exe, 00000000.00000002.2003264166.0000000003770000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamef1a08a05-b195-4d04-8a01-a86b7545550f.exe4 vs ss.exe
                  Source: ss.exe, 00000000.00000003.2001112982.0000000003C33000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs ss.exe
                  Source: ss.exe, 00000000.00000003.2002383444.0000000003E1D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs ss.exe
                  Source: ss.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.ss.exe.3770000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.ss.exe.3770000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 00000000.00000002.2003264166.0000000003770000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.ss.exe.3770000.1.raw.unpack, cPs8D.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.ss.exe.3770000.1.raw.unpack, 72CF8egH.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.ss.exe.3770000.1.raw.unpack, G5CXsdn.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.ss.exe.3770000.1.raw.unpack, 3uPsILA6U.csCryptographic APIs: 'CreateDecryptor'
                  Source: 0.2.ss.exe.3770000.1.raw.unpack, 6oQOw74dfIt.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.ss.exe.3770000.1.raw.unpack, aMIWm.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                  Source: 0.2.ss.exe.3770000.1.raw.unpack, 3QjbQ514BDx.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.ss.exe.3770000.1.raw.unpack, 3QjbQ514BDx.csCryptographic APIs: 'TransformFinalBlock'
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@2/1
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0068A2D5 GetLastError,FormatMessageW,0_2_0068A2D5
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_00678713 AdjustTokenPrivileges,CloseHandle,0_2_00678713
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_00678CC3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00678CC3
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0068B59E SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0068B59E
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0069F121 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0069F121
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0068C602 CoInitialize,CoCreateInstance,CoUninitialize,0_2_0068C602
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_00624FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00624FE9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\ss.exeFile created: C:\Users\user\AppData\Local\Temp\autC4B.tmpJump to behavior
                  Source: ss.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\ss.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: ss.exeReversingLabs: Detection: 42%
                  Source: unknownProcess created: C:\Users\user\Desktop\ss.exe "C:\Users\user\Desktop\ss.exe"
                  Source: C:\Users\user\Desktop\ss.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\ss.exe"
                  Source: C:\Users\user\Desktop\ss.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\ss.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\ss.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\ss.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\ss.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\ss.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\ss.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\ss.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\ss.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\ss.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\ss.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\ss.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\ss.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                  Source: ss.exeStatic file information: File size 1103872 > 1048576
                  Source: ss.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: ss.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: ss.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: ss.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: ss.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: ss.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: ss.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: wntdll.pdbUGP source: ss.exe, 00000000.00000003.2000877442.0000000003CB0000.00000004.00001000.00020000.00000000.sdmp, ss.exe, 00000000.00000003.2001112982.0000000003B10000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: ss.exe, 00000000.00000003.2000877442.0000000003CB0000.00000004.00001000.00020000.00000000.sdmp, ss.exe, 00000000.00000003.2001112982.0000000003B10000.00000004.00001000.00020000.00000000.sdmp
                  Source: ss.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: ss.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: ss.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: ss.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: ss.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0069C304 LoadLibraryA,GetProcAddress,0_2_0069C304
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0062C590 push eax; retn 0062h0_2_0062C599
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_00648B85 push ecx; ret 0_2_00648B98
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06483AD7 push ebx; retf 2_2_06483ADA
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0657845A push es; ret 2_2_06578474
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_00624A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00624A35
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_006A55FD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_006A55FD
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_006433C7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_006433C7
                  Source: C:\Users\user\Desktop\ss.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ss.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\Desktop\ss.exeAPI/Special instruction interceptor: Address: 1EC3214
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199937Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199828Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199718Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199609Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199500Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199390Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199281Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199172Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199062Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198953Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198843Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198733Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198625Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198515Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198406Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1088Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 8773Jump to behavior
                  Source: C:\Users\user\Desktop\ss.exeAPI coverage: 4.5 %
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_00684696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00684696
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0068C93C FindFirstFileW,FindClose,0_2_0068C93C
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0068C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0068C9C7
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0068F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0068F200
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0068F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0068F35D
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0068F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0068F65E
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_00683A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00683A2B
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_00683D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00683D4E
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0068BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0068BF27
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_00624AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00624AFE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99890Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99781Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99671Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99562Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99453Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99343Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99234Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99124Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99015Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98906Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98796Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98687Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98578Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98468Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98359Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98248Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98140Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98019Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97890Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97752Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97625Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97515Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97406Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97296Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97187Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97078Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96968Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96859Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96749Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96640Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96531Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96421Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96312Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96202Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199937Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199828Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199718Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199609Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199500Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199390Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199281Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199172Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199062Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198953Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198843Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198733Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198625Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198515Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198406Jump to behavior
                  Source: RegSvcs.exe, 00000002.00000002.4455656305.00000000065D7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\ss.exeAPI call chain: ExitProcess graph end nodegraph_0-98121
                  Source: C:\Users\user\Desktop\ss.exeAPI call chain: ExitProcess graph end nodegraph_0-98926
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_006941FD BlockInput,0_2_006941FD
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_00623B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00623B4C
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_00655CCC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00655CCC
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0069C304 LoadLibraryA,GetProcAddress,0_2_0069C304
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_01EC34E0 mov eax, dword ptr fs:[00000030h]0_2_01EC34E0
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_01EC3480 mov eax, dword ptr fs:[00000030h]0_2_01EC3480
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_01EC1E70 mov eax, dword ptr fs:[00000030h]0_2_01EC1E70
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_006781F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_006781F7
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0064A364 SetUnhandledExceptionFilter,0_2_0064A364
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0064A395 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0064A395
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\ss.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\ss.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: FD9008Jump to behavior
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_00678C93 LogonUserW,0_2_00678C93
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_00623B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00623B4C
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_00624A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00624A35
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_00684EF5 mouse_event,0_2_00684EF5
                  Source: C:\Users\user\Desktop\ss.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\ss.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_006781F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_006781F7
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_00684C03 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00684C03
                  Source: ss.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                  Source: ss.exeBinary or memory string: Shell_TrayWnd
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0064886B cpuid 0_2_0064886B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_006550D7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_006550D7
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_00662230 GetUserNameW,0_2_00662230
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_0065418A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_0065418A
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_00624AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00624AFE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ss.exe.3770000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ss.exe.3770000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.4453899182.00000000030EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2003264166.0000000003770000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4453899182.0000000003119000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4452947585.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4453899182.00000000030A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ss.exe PID: 6188, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2920, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: ss.exeBinary or memory string: WIN_81
                  Source: ss.exeBinary or memory string: WIN_XP
                  Source: ss.exeBinary or memory string: WIN_XPe
                  Source: ss.exeBinary or memory string: WIN_VISTA
                  Source: ss.exeBinary or memory string: WIN_7
                  Source: ss.exeBinary or memory string: WIN_8
                  Source: ss.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 5USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ss.exe.3770000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ss.exe.3770000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.2003264166.0000000003770000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4452947585.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4453899182.00000000030A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ss.exe PID: 6188, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2920, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ss.exe.3770000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ss.exe.3770000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.4453899182.00000000030EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2003264166.0000000003770000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4453899182.0000000003119000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4452947585.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4453899182.00000000030A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ss.exe PID: 6188, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2920, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_00696596 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00696596
                  Source: C:\Users\user\Desktop\ss.exeCode function: 0_2_00696A5A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00696A5A
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure2
                  Valid Accounts
                  121
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  2
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts1
                  Native API
                  2
                  Valid Accounts
                  1
                  DLL Side-Loading
                  11
                  Deobfuscate/Decode Files or Information
                  221
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol2
                  Data from Local System
                  1
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                  Valid Accounts
                  2
                  Obfuscated Files or Information
                  1
                  Credentials in Registry
                  2
                  File and Directory Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                  Access Token Manipulation
                  1
                  DLL Side-Loading
                  NTDS138
                  System Information Discovery
                  Distributed Component Object Model221
                  Input Capture
                  1
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                  Process Injection
                  2
                  Valid Accounts
                  LSA Secrets241
                  Security Software Discovery
                  SSH4
                  Clipboard Data
                  11
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts121
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials121
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                  Access Token Manipulation
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                  Process Injection
                  Proc Filesystem11
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  ss.exe42%ReversingLabsWin32.Trojan.Strab
                  ss.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://r3.o.lencr.org00%URL Reputationsafe
                  https://account.dyn.com/0%URL Reputationsafe
                  http://x1.c.lencr.org/00%URL Reputationsafe
                  http://x1.i.lencr.org/00%URL Reputationsafe
                  http://r3.i.lencr.org/00%URL Reputationsafe
                  http://mail.pgsu.co.id0%Avira URL Cloudsafe
                  http://pgsu.co.id0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  pgsu.co.id
                  107.178.108.39
                  truetrue
                    unknown
                    mail.pgsu.co.id
                    unknown
                    unknowntrue
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://r3.o.lencr.org0RegSvcs.exe, 00000002.00000002.4453899182.00000000030EE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4455656305.00000000065D7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4455656305.00000000065EC000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4453242211.00000000012C9000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://pgsu.co.idRegSvcs.exe, 00000002.00000002.4453899182.00000000030EE000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://account.dyn.com/ss.exe, 00000000.00000002.2003264166.0000000003770000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4452947585.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://mail.pgsu.co.idRegSvcs.exe, 00000002.00000002.4453899182.00000000030EE000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://x1.c.lencr.org/0RegSvcs.exe, 00000002.00000002.4453899182.00000000030EE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4453242211.00000000012BA000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4455656305.00000000065D7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4455656305.00000000065EC000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://x1.i.lencr.org/0RegSvcs.exe, 00000002.00000002.4453899182.00000000030EE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4453242211.00000000012BA000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4455656305.00000000065D7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4455656305.00000000065EC000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://r3.i.lencr.org/0RegSvcs.exe, 00000002.00000002.4453899182.00000000030EE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4455656305.00000000065D7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4455656305.00000000065EC000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4453242211.00000000012C9000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      107.178.108.39
                      pgsu.co.idUnited States
                      53755IOFLOODUStrue
                      Joe Sandbox version:40.0.0 Tourmaline
                      Analysis ID:1466692
                      Start date and time:2024-07-03 09:38:06 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 7m 41s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:6
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:ss.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@3/4@2/1
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 57
                      • Number of non-executed functions: 271
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Report size exceeded maximum capacity and may have missing disassembly code.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                      • VT rate limit hit for: ss.exe
                      TimeTypeDescription
                      03:38:53API Interceptor12548749x Sleep call for process: RegSvcs.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      107.178.108.39ss.exeGet hashmaliciousAgentTeslaBrowse
                        ss.exeGet hashmaliciousAgentTeslaBrowse
                          ss.exeGet hashmaliciousAgentTeslaBrowse
                            ss.exeGet hashmaliciousAgentTeslaBrowse
                              DvDvqLgf5sEuVVU.exeGet hashmaliciousAgentTeslaBrowse
                                sUNUVzTAxa5v2XX.exeGet hashmaliciousAgentTeslaBrowse
                                  x5gsmVkSF7JmGXd.exeGet hashmaliciousAgentTeslaBrowse
                                    001564355.exeGet hashmaliciousAgentTeslaBrowse
                                      Dr8MTWXE8WAgsB2.exeGet hashmaliciousAgentTeslaBrowse
                                        018062024.exeGet hashmaliciousAgentTeslaBrowse
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          IOFLOODUSss.exeGet hashmaliciousAgentTeslaBrowse
                                          • 107.178.108.39
                                          ss.exeGet hashmaliciousAgentTeslaBrowse
                                          • 107.178.108.39
                                          ss.exeGet hashmaliciousAgentTeslaBrowse
                                          • 107.178.108.39
                                          ss.exeGet hashmaliciousAgentTeslaBrowse
                                          • 107.178.108.39
                                          DvDvqLgf5sEuVVU.exeGet hashmaliciousAgentTeslaBrowse
                                          • 107.178.108.39
                                          sUNUVzTAxa5v2XX.exeGet hashmaliciousAgentTeslaBrowse
                                          • 107.178.108.39
                                          x5gsmVkSF7JmGXd.exeGet hashmaliciousAgentTeslaBrowse
                                          • 107.178.108.39
                                          001564355.exeGet hashmaliciousAgentTeslaBrowse
                                          • 107.178.108.39
                                          Dr8MTWXE8WAgsB2.exeGet hashmaliciousAgentTeslaBrowse
                                          • 107.178.108.39
                                          018062024.exeGet hashmaliciousAgentTeslaBrowse
                                          • 107.178.108.39
                                          No context
                                          No context
                                          Process:C:\Users\user\Desktop\ss.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):240128
                                          Entropy (8bit):6.694322518663737
                                          Encrypted:false
                                          SSDEEP:6144:jimNz7e/FjwrL71+rSeMYA+aTwekjOIJhYmrewVHHlEcI6eb0He74JYB:jimJSMYWwekjnpnlkAYB
                                          MD5:04F7642E9583381C2064BBEDA40C5CDB
                                          SHA1:48E543333933DA5B4892F515F015AD4202B15039
                                          SHA-256:738E04F3F473D8D3AC3234C2F70C69D3ADDA53CFB01CB673274EBACFBE4EAB24
                                          SHA-512:4ED2CFFAB983F7C5F1F6C99576F28A74CD4C12B04DADA1B972F9598739FFFCCCB5170EA832636C7F6F76FB7ED5C1EA2885B5E1A529C9FF06809E5E0F3B5FF7AE
                                          Malicious:false
                                          Reputation:low
                                          Preview:u..ZA9KR2453..DE.8VJZB9K.6453XVDEO8VJZB9KR6453XVDEO8VJZB9KR6.53XX[.A8.C.c.J...a[1%d5=W18;/.(3XZZGx4!e=M8j3,...e.X\<3jHB2rJZB9KR6dp3X.EFO..k<B9KR6453.VFDD9]JZ.:KR>453XVD[.;VJzB9K.5453.VDeO8VHZB=KR6453XRDEO8VJZB9OR6653XVDEM8..ZB)KR&453XFDE_8VJZB9[R6453XVDEO8..YBvKR64.0X.AEO8VJZB9KR6453XVDEO.UJVB9KR6453XVDEO8VJZB9KR6453XVDEO8VJZB9KR6453XVDEO8VJZB.KR>453XVDEO8VJRb9K.6453XVDEO8Vd.'A?R64..[VDeO8V.YB9IR6453XVDEO8VJZb9K2.FFA;VDE.=VJZ.:KR0453.UDEO8VJZB9KR64u3X.j7*T9)ZB5KR64.0XVFEO8.IZB9KR6453XVDE.8V.ZB9KR6453XVDEO8VJ.A9KR64}3XVFEJ8..XB.{S6753XWDEI8VJZB9KR6453XVDEO8VJZB9KR6453XVDEO8VJZB9KR6453XVY......|q6l<V2.~.#.L..Y..@..9u .#B..~[...uC2.zX.Ku.C...'.<0JY...n*Q37#.A.:R.K....kk..r.TX.O...:w.VPn.k........K1.`.....(=[.TC(:!k.Y0+(+.I.7453X........+A...7:-lD<...nPA.....MXVD!O8V8ZB9*R64r3XV+EO88JZBGKR6J53X.DEOxVJZu9KR.4535VDEk8VJ$B9K.K;:..-6..VJZB9~....^........tH.,mV.. ....O..6#.Awyt..J.S..M.RMqxl22^RAGH<UFgLr....77\SFBK;ZwT........o..I...C..6453XV.EO.VJZ.K.645.X.D..8VJ.9.R.4...V
                                          Process:C:\Users\user\Desktop\ss.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):148644
                                          Entropy (8bit):7.942052975506253
                                          Encrypted:false
                                          SSDEEP:3072:B88SGv4X1hZ3JSK6daTjTHypzNq/FAYHnzGxRLVz/4efhw:aH/16dWTyqtAYwup
                                          MD5:02122E1F0EC5305DF708E22CF5915196
                                          SHA1:2B2D51EE5F5D585C4B87D1F13907E20F5389CC81
                                          SHA-256:0D40251ED1E39E98EAE0719B6E3109D781647C60CDEFF91CB776C5332F227EB3
                                          SHA-512:9D6592462CEBB849060BA9185020285A90D4E51D084FF1D8123D523FFFF8EF6D6D7AA5038FB1DF04BEE2979578375F4E0712073CE042A0F7857C5F90EA253E32
                                          Malicious:false
                                          Reputation:low
                                          Preview:EA06......;U...R.M&.=>..E..*...sK.M..J.Z.E.....#....J.o.A.x.y{......l5....5...3..3(..+U.=.i!..i..T.Y...l.J.ry3.R(S+..&l...b5E.S...\...[....D..iU...R..;...W..#%5..#.j%.. .V.S....&wO.M...X.."....SK.I...5.._.".l.3...f.v.D~...B....v*.......#..@...#T.S.\h...It..?.3":...f=U.........(...A...........&..G....]fu...o*.Ne5....E..+.j0.....L....Z..U.y@......"Q....+.X.rou9......(......Gu.O....D.....yV.{........V..*..;9..;.:.#A..V.}M.Yu....*.u..t>.......Ugi...7..UFg7..h1..K]K.r.x.].].......?.......B...}.._....s...[.ku...n5T..'R.\r.0..%x.N.n.2...l.w...J.0.Dno:..(...Q.......M..S@3...a8..%@....0..n......R.....qx......L.T.......H..tis.......p......7..O.....y.....[j..6.. ..=p.|'.6..(7{..C..q.u8....Sn7.d.e^.Ph..V.g.\....Vo7.T..*\.w.Bx.,4_...g-.,.v...."4>......-?p..p.4.h....u..^x.....yu.L.k..U.2.uju/.M...N.Z..vHln...J..i...*.j5.}^....rM3.W-.y...J.o%.f..i.U.....N.P.4....5../.j<..V.T'..D.m..V*..=7.P.V.S..m4...j%..&.Ld r..)6.S.`.-....P.v...k5.S..Z..s|.\..]b-4.........R
                                          Process:C:\Users\user\Desktop\ss.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):9826
                                          Entropy (8bit):7.603023350880296
                                          Encrypted:false
                                          SSDEEP:192:65jwEiqEH1WgUJuzJkecGgJo7xocBkJ+HA1wyY/U+kxiSA+2k5Cg:I6qEHYV0eecGGo7xocBxHoEGiW8g
                                          MD5:71CE211E0ABADA7A14F061A941AC0723
                                          SHA1:74EDA156A8F72E3F14F01A53BF128229D59EA3F9
                                          SHA-256:8BBCE996E66A50C347D4E142E5D9E2274520552620AF91D2C31347676872509B
                                          SHA-512:B2579055F5255C86E4F29D1EEE1E0174F46DDE513D49F6B0879D1A8F60FFC04D0F816A5176D598981C9FEA7496405C7A166410ED36FCFBB98389EC82D946A003
                                          Malicious:false
                                          Reputation:low
                                          Preview:EA06..pT.Q&...8.M.z,.D.Lf....y9......o3.N&T...5...j..m1..f.Y..cD.L'.....3.N(s...m9...s.5..8.L/.Y...e..&6[...0.L..I..k7.N&. ..a0.M.....q4.Nf.P.....K..d.%...p.lY@.......c.Xf.0.o..b.L.`...,@. ...3+..d....s4.l&..........|....sa...`.........Y&.K0.....-vs5.M..2...N&.I...@.>..........$.0...fx. ..$l...I...#..$6...... ..... .Z...a.5..&.).....L.j.;$....M.j.;$....X@j.;%....Y@j.;,.....j.e.|f #^...j......l.....l.5....>0..Xf....M.^....$zn.....G..I....C...M.|........}S{....7...| l..P..........0...`>;..c7.6..{......=..7..............6,......b...,S ...i5.M.4.b..i|v)....b.h.,@..%........9....c...|3Y..h......._......@.>K...,v[..q5.M,.@..i7.X......9....2.......,.`....3.,.i8........}.k(.f..@..M&V....7.,.x....&.......0.......Fh...Fb.....3.."a9...`....,vb.....cd.X..P.Fl.Y.$..c. ....I...d..f.!...,vd......8..P.......0.....2...y...D.......c.0.......b.<NA...NM..;4.X.q1..&@Q..B.Y.ah......Yl.i..."..Bvj.........ic..'3Y..'f.....,j.1........C.`....7b.., .p..T.......Y,Vi......@
                                          Process:C:\Users\user\Desktop\ss.exe
                                          File Type:ASCII text, with very long lines (28756), with no line terminators
                                          Category:dropped
                                          Size (bytes):28756
                                          Entropy (8bit):3.58736219945205
                                          Encrypted:false
                                          SSDEEP:768:miTZ+2QoioGRk6ZklputwjpjBkCiw2RuJ3nXKUrvzjsNbd+IH6B34vfF3if6gyCf:miTZ+2QoioGRk6ZklputwjpjBkCiw2R8
                                          MD5:D4469FCD7DA460174E4CA97F5F281CA7
                                          SHA1:1D3253DC36C414C405B5462C7CC08668463D6551
                                          SHA-256:68177E8210193803025C6F9B24BF461F471F083E336F5FC42278D9BB00593DB3
                                          SHA-512:C81B8B8D93E0EF24D8249FD89A7318476439060D27D84A437EC9BDCC424A1D3080AE1A9D8C7CCFA8BCA818E0B090237D6C680205E77D3491F44F0C22EE17FEF8
                                          Malicious:false
                                          Reputation:low
                                          Preview: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
                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Entropy (8bit):6.864476410113246
                                          TrID:
                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                          • DOS Executable Generic (2002/1) 0.02%
                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                          File name:ss.exe
                                          File size:1'103'872 bytes
                                          MD5:51db2f697d46b38417dc0ae45abaef28
                                          SHA1:c1df22fd6c29d26e2a6765f51554e333d200df4c
                                          SHA256:8e537ef5b6125fef6449de923808b92122edc8e2d6cc887d49c8ed5510760848
                                          SHA512:45ec4bea2af43ba3d17029621a6c018af294d0b9135c19321a617a2dc65b1975ac3340e7fea0b5a4035f209cd9adcfd2866855b5d8eac386485039c3f6412a9d
                                          SSDEEP:24576:7AHnh+eWsN3skA4RV1Hom2KXMmHa+9hu1DbLtHhj5:Wh+ZkldoPK8Ya+j6Df97
                                          TLSH:61358C02B39180E5FFAA91735B55B20156FD693431338D2F12982D78BDFF1A12E2DE62
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P.....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r.............#.S..._@'.S...R.k.S.....".S...RichR..
                                          Icon Hash:01449a1a796c95a9
                                          Entrypoint:0x42800a
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                          DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x66849719 [Wed Jul 3 00:11:05 2024 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:5
                                          OS Version Minor:1
                                          File Version Major:5
                                          File Version Minor:1
                                          Subsystem Version Major:5
                                          Subsystem Version Minor:1
                                          Import Hash:afcdf79be1557326c854b6e20cb900a7
                                          Instruction
                                          call 00007F44508DB65Dh
                                          jmp 00007F44508CE414h
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          push edi
                                          push esi
                                          mov esi, dword ptr [esp+10h]
                                          mov ecx, dword ptr [esp+14h]
                                          mov edi, dword ptr [esp+0Ch]
                                          mov eax, ecx
                                          mov edx, ecx
                                          add eax, esi
                                          cmp edi, esi
                                          jbe 00007F44508CE59Ah
                                          cmp edi, eax
                                          jc 00007F44508CE8FEh
                                          bt dword ptr [004C41FCh], 01h
                                          jnc 00007F44508CE599h
                                          rep movsb
                                          jmp 00007F44508CE8ACh
                                          cmp ecx, 00000080h
                                          jc 00007F44508CE764h
                                          mov eax, edi
                                          xor eax, esi
                                          test eax, 0000000Fh
                                          jne 00007F44508CE5A0h
                                          bt dword ptr [004BF324h], 01h
                                          jc 00007F44508CEA70h
                                          bt dword ptr [004C41FCh], 00000000h
                                          jnc 00007F44508CE73Dh
                                          test edi, 00000003h
                                          jne 00007F44508CE74Eh
                                          test esi, 00000003h
                                          jne 00007F44508CE72Dh
                                          bt edi, 02h
                                          jnc 00007F44508CE59Fh
                                          mov eax, dword ptr [esi]
                                          sub ecx, 04h
                                          lea esi, dword ptr [esi+04h]
                                          mov dword ptr [edi], eax
                                          lea edi, dword ptr [edi+04h]
                                          bt edi, 03h
                                          jnc 00007F44508CE5A3h
                                          movq xmm1, qword ptr [esi]
                                          sub ecx, 08h
                                          lea esi, dword ptr [esi+08h]
                                          movq qword ptr [edi], xmm1
                                          lea edi, dword ptr [edi+08h]
                                          test esi, 00000007h
                                          je 00007F44508CE5F5h
                                          bt esi, 03h
                                          Programming Language:
                                          • [ASM] VS2013 build 21005
                                          • [ C ] VS2013 build 21005
                                          • [C++] VS2013 build 21005
                                          • [ C ] VS2008 SP1 build 30729
                                          • [IMP] VS2008 SP1 build 30729
                                          • [ASM] VS2013 UPD5 build 40629
                                          • [RES] VS2013 build 21005
                                          • [LNK] VS2013 UPD5 build 40629
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xbc0cc0x17c.rdata
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x43080.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x10c0000x7134.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa4b500x40.rdata
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x10000x8dfdd0x8e000310e36668512d53489c005622bb1b4a9False0.5735602580325704data6.675248351711057IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rdata0x8f0000x2fd8e0x2fe00748cf1ab2605ce1fd72d53d912abb68fFalse0.32828818537859006data5.763244005758284IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .data0xbf0000x8f740x5200aae9601d920f07080bdfadf43dfeff12False0.1017530487804878data1.1963819235530628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .rsrc0xc80000x430800x43200ba0738fefd41cd7190ead946496ec5faFalse0.7396160672718808data7.228883139089099IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0x10c0000x71340x7200f04128ad0f87f42830e4a6cdbc38c719False0.7617530153508771data6.783955557128661IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_ICON0xc84580x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                          RT_ICON0xc85800x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                          RT_ICON0xc86a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                          RT_ICON0xc87d00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 30236 x 30236 px/mEnglishGreat Britain0.06435584999408495
                                          RT_MENU0xd8ff80x50dataEnglishGreat Britain0.9
                                          RT_STRING0xd90480x594dataEnglishGreat Britain0.3333333333333333
                                          RT_STRING0xd95dc0x68adataEnglishGreat Britain0.2747909199522103
                                          RT_STRING0xd9c680x490dataEnglishGreat Britain0.3715753424657534
                                          RT_STRING0xda0f80x5fcdataEnglishGreat Britain0.3087467362924282
                                          RT_STRING0xda6f40x65cdataEnglishGreat Britain0.34336609336609336
                                          RT_STRING0xdad500x466dataEnglishGreat Britain0.3605683836589698
                                          RT_STRING0xdb1b80x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                          RT_RCDATA0xdb3100x2f852data1.0003390840620217
                                          RT_GROUP_ICON0x10ab640x14dataEnglishGreat Britain1.25
                                          RT_GROUP_ICON0x10ab780x14dataEnglishGreat Britain1.25
                                          RT_GROUP_ICON0x10ab8c0x14dataEnglishGreat Britain1.15
                                          RT_GROUP_ICON0x10aba00x14dataEnglishGreat Britain1.25
                                          RT_VERSION0x10abb40xdcdataEnglishGreat Britain0.6181818181818182
                                          RT_MANIFEST0x10ac900x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                          DLLImport
                                          WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                          VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                          WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                          COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                          MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                          WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                          PSAPI.DLLGetProcessMemoryInfo
                                          IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                          USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                          UxTheme.dllIsThemeActive
                                          KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                          USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                          GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                          COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                          ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                          SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                          ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                          OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                          Language of compilation systemCountry where language is spokenMap
                                          EnglishGreat Britain
                                          TimestampSource PortDest PortSource IPDest IP
                                          Jul 3, 2024 09:38:55.565256119 CEST49704587192.168.2.5107.178.108.39
                                          Jul 3, 2024 09:38:55.570075989 CEST58749704107.178.108.39192.168.2.5
                                          Jul 3, 2024 09:38:55.570171118 CEST49704587192.168.2.5107.178.108.39
                                          Jul 3, 2024 09:38:56.163805962 CEST58749704107.178.108.39192.168.2.5
                                          Jul 3, 2024 09:38:56.164694071 CEST49704587192.168.2.5107.178.108.39
                                          Jul 3, 2024 09:38:56.169663906 CEST58749704107.178.108.39192.168.2.5
                                          Jul 3, 2024 09:38:56.316797972 CEST58749704107.178.108.39192.168.2.5
                                          Jul 3, 2024 09:38:56.317003965 CEST49704587192.168.2.5107.178.108.39
                                          Jul 3, 2024 09:38:56.321883917 CEST58749704107.178.108.39192.168.2.5
                                          Jul 3, 2024 09:38:56.471527100 CEST58749704107.178.108.39192.168.2.5
                                          Jul 3, 2024 09:38:56.481626987 CEST49704587192.168.2.5107.178.108.39
                                          Jul 3, 2024 09:38:56.486459017 CEST58749704107.178.108.39192.168.2.5
                                          Jul 3, 2024 09:38:56.642673969 CEST58749704107.178.108.39192.168.2.5
                                          Jul 3, 2024 09:38:56.642707109 CEST58749704107.178.108.39192.168.2.5
                                          Jul 3, 2024 09:38:56.642718077 CEST58749704107.178.108.39192.168.2.5
                                          Jul 3, 2024 09:38:56.642797947 CEST49704587192.168.2.5107.178.108.39
                                          Jul 3, 2024 09:38:56.775814056 CEST49704587192.168.2.5107.178.108.39
                                          Jul 3, 2024 09:38:56.780596018 CEST58749704107.178.108.39192.168.2.5
                                          Jul 3, 2024 09:38:56.928258896 CEST58749704107.178.108.39192.168.2.5
                                          Jul 3, 2024 09:38:56.942024946 CEST49704587192.168.2.5107.178.108.39
                                          Jul 3, 2024 09:38:56.946805000 CEST58749704107.178.108.39192.168.2.5
                                          Jul 3, 2024 09:38:57.103068113 CEST58749704107.178.108.39192.168.2.5
                                          Jul 3, 2024 09:38:57.104075909 CEST49704587192.168.2.5107.178.108.39
                                          Jul 3, 2024 09:38:57.108855963 CEST58749704107.178.108.39192.168.2.5
                                          Jul 3, 2024 09:38:57.262403011 CEST58749704107.178.108.39192.168.2.5
                                          Jul 3, 2024 09:38:57.263571024 CEST49704587192.168.2.5107.178.108.39
                                          Jul 3, 2024 09:38:57.268405914 CEST58749704107.178.108.39192.168.2.5
                                          Jul 3, 2024 09:38:57.428920031 CEST58749704107.178.108.39192.168.2.5
                                          Jul 3, 2024 09:38:57.429203987 CEST49704587192.168.2.5107.178.108.39
                                          Jul 3, 2024 09:38:57.434189081 CEST58749704107.178.108.39192.168.2.5
                                          Jul 3, 2024 09:38:57.582240105 CEST58749704107.178.108.39192.168.2.5
                                          Jul 3, 2024 09:38:57.585104942 CEST49704587192.168.2.5107.178.108.39
                                          Jul 3, 2024 09:38:57.589925051 CEST58749704107.178.108.39192.168.2.5
                                          Jul 3, 2024 09:38:57.953248978 CEST58749704107.178.108.39192.168.2.5
                                          Jul 3, 2024 09:38:57.953423977 CEST49704587192.168.2.5107.178.108.39
                                          Jul 3, 2024 09:38:57.958328009 CEST58749704107.178.108.39192.168.2.5
                                          Jul 3, 2024 09:38:58.105669975 CEST58749704107.178.108.39192.168.2.5
                                          Jul 3, 2024 09:38:58.106256008 CEST49704587192.168.2.5107.178.108.39
                                          Jul 3, 2024 09:38:58.106307030 CEST49704587192.168.2.5107.178.108.39
                                          Jul 3, 2024 09:38:58.106338024 CEST49704587192.168.2.5107.178.108.39
                                          Jul 3, 2024 09:38:58.108386993 CEST49704587192.168.2.5107.178.108.39
                                          Jul 3, 2024 09:38:58.111196041 CEST58749704107.178.108.39192.168.2.5
                                          Jul 3, 2024 09:38:58.111206055 CEST58749704107.178.108.39192.168.2.5
                                          Jul 3, 2024 09:38:58.111216068 CEST58749704107.178.108.39192.168.2.5
                                          Jul 3, 2024 09:38:58.113133907 CEST58749704107.178.108.39192.168.2.5
                                          Jul 3, 2024 09:38:58.270136118 CEST58749704107.178.108.39192.168.2.5
                                          Jul 3, 2024 09:38:58.321481943 CEST49704587192.168.2.5107.178.108.39
                                          Jul 3, 2024 09:40:34.509236097 CEST49704587192.168.2.5107.178.108.39
                                          Jul 3, 2024 09:40:34.514426947 CEST58749704107.178.108.39192.168.2.5
                                          Jul 3, 2024 09:40:34.665724993 CEST58749704107.178.108.39192.168.2.5
                                          Jul 3, 2024 09:40:34.671854973 CEST49704587192.168.2.5107.178.108.39
                                          TimestampSource PortDest PortSource IPDest IP
                                          Jul 3, 2024 09:38:54.484894991 CEST6422153192.168.2.51.1.1.1
                                          Jul 3, 2024 09:38:55.477924109 CEST6422153192.168.2.51.1.1.1
                                          Jul 3, 2024 09:38:55.557874918 CEST53642211.1.1.1192.168.2.5
                                          Jul 3, 2024 09:38:55.557934046 CEST53642211.1.1.1192.168.2.5
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Jul 3, 2024 09:38:54.484894991 CEST192.168.2.51.1.1.10xd72bStandard query (0)mail.pgsu.co.idA (IP address)IN (0x0001)false
                                          Jul 3, 2024 09:38:55.477924109 CEST192.168.2.51.1.1.10xd72bStandard query (0)mail.pgsu.co.idA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Jul 3, 2024 09:38:55.557874918 CEST1.1.1.1192.168.2.50xd72bNo error (0)mail.pgsu.co.idpgsu.co.idCNAME (Canonical name)IN (0x0001)false
                                          Jul 3, 2024 09:38:55.557874918 CEST1.1.1.1192.168.2.50xd72bNo error (0)pgsu.co.id107.178.108.39A (IP address)IN (0x0001)false
                                          Jul 3, 2024 09:38:55.557934046 CEST1.1.1.1192.168.2.50xd72bNo error (0)mail.pgsu.co.idpgsu.co.idCNAME (Canonical name)IN (0x0001)false
                                          Jul 3, 2024 09:38:55.557934046 CEST1.1.1.1192.168.2.50xd72bNo error (0)pgsu.co.id107.178.108.39A (IP address)IN (0x0001)false
                                          TimestampSource PortDest PortSource IPDest IPCommands
                                          Jul 3, 2024 09:38:56.163805962 CEST58749704107.178.108.39192.168.2.5220-grogolsarana.padinet.com ESMTP Exim 4.96.2 #2 Wed, 03 Jul 2024 14:38:54 +0700
                                          220-We do not authorize the use of this system to transport unsolicited,
                                          220 and/or bulk e-mail.
                                          Jul 3, 2024 09:38:56.164694071 CEST49704587192.168.2.5107.178.108.39EHLO 899552
                                          Jul 3, 2024 09:38:56.316797972 CEST58749704107.178.108.39192.168.2.5250-grogolsarana.padinet.com Hello 899552 [8.46.123.33]
                                          250-SIZE 52428800
                                          250-8BITMIME
                                          250-PIPELINING
                                          250-PIPECONNECT
                                          250-AUTH PLAIN LOGIN
                                          250-STARTTLS
                                          250 HELP
                                          Jul 3, 2024 09:38:56.317003965 CEST49704587192.168.2.5107.178.108.39STARTTLS
                                          Jul 3, 2024 09:38:56.471527100 CEST58749704107.178.108.39192.168.2.5220 TLS go ahead

                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:03:38:51
                                          Start date:03/07/2024
                                          Path:C:\Users\user\Desktop\ss.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\ss.exe"
                                          Imagebase:0x620000
                                          File size:1'103'872 bytes
                                          MD5 hash:51DB2F697D46B38417DC0AE45ABAEF28
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2003264166.0000000003770000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2003264166.0000000003770000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.2003264166.0000000003770000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                          Reputation:low
                                          Has exited:true

                                          Target ID:2
                                          Start time:03:38:51
                                          Start date:03/07/2024
                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\ss.exe"
                                          Imagebase:0xd80000
                                          File size:45'984 bytes
                                          MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4453899182.00000000030EE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4453899182.0000000003119000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4452947585.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4452947585.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4453899182.00000000030A1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4453899182.00000000030A1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:high
                                          Has exited:false

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:4.1%
                                            Dynamic/Decrypted Code Coverage:1.3%
                                            Signature Coverage:4.6%
                                            Total number of Nodes:2000
                                            Total number of Limit Nodes:40
                                            execution_graph 97773 660226 97782 62ade2 Mailbox 97773->97782 97775 660c86 97932 6766f4 97775->97932 97777 660c8f 97779 6600e0 VariantClear 97779->97782 97780 62b6c1 97931 68a0b5 89 API calls 4 library calls 97780->97931 97782->97775 97782->97777 97782->97779 97782->97780 97788 632123 97782->97788 97828 69474d 97782->97828 97837 68d2e6 97782->97837 97884 69e237 97782->97884 97887 6a23c9 97782->97887 97925 629df0 97782->97925 97930 677405 59 API calls 97782->97930 97935 629bf8 97788->97935 97793 632154 97794 632164 97793->97794 97983 625906 60 API calls Mailbox 97793->97983 97984 629997 97794->97984 97795 632189 97803 632196 97795->97803 98023 629c9c 59 API calls 97795->98023 97796 6669af 97796->97795 98022 68f7df 59 API calls 97796->98022 97801 6669f7 97801->97803 97804 6669ff 97801->97804 97948 625e3f 97803->97948 98024 629c9c 59 API calls 97804->98024 97809 63219d 97810 6321b7 97809->97810 97811 666a11 97809->97811 97953 6277c7 97810->97953 97813 640ff6 Mailbox 59 API calls 97811->97813 97815 666a17 97813->97815 97817 666a2b 97815->97817 98025 6259b0 ReadFile SetFilePointerEx 97815->98025 97822 666a2f _memmove 97817->97822 98026 68794e 59 API calls 2 library calls 97817->98026 97819 6321ce 97819->97822 98015 629b9c 59 API calls Mailbox 97819->98015 97823 6321e2 Mailbox 97824 63221c 97823->97824 98016 625dcf 97823->98016 97824->97782 97829 629997 84 API calls 97828->97829 97830 694787 97829->97830 98159 6263a0 97830->98159 97832 694797 97833 6947bc 97832->97833 98185 62a000 97832->98185 97835 629bf8 59 API calls 97833->97835 97836 6947c0 97833->97836 97835->97836 97836->97782 97838 68d305 97837->97838 97839 68d310 97837->97839 98241 629c9c 59 API calls 97838->98241 97841 68d3ea Mailbox 97839->97841 97844 6277c7 59 API calls 97839->97844 97842 640ff6 Mailbox 59 API calls 97841->97842 97880 68d3f3 Mailbox 97841->97880 97843 68d433 97842->97843 97845 68d43f 97843->97845 98307 625906 60 API calls Mailbox 97843->98307 97846 68d334 97844->97846 97849 629997 84 API calls 97845->97849 97848 6277c7 59 API calls 97846->97848 97850 68d33d 97848->97850 97852 68d457 97849->97852 97851 629997 84 API calls 97850->97851 97853 68d349 97851->97853 97854 625956 67 API calls 97852->97854 98242 6246f9 97853->98242 97855 68d466 97854->97855 97857 68d46a GetLastError 97855->97857 97858 68d49e 97855->97858 97860 68d483 97857->97860 97863 68d4c9 97858->97863 97864 68d500 97858->97864 97859 68d35e 98293 627c8e 97859->98293 97860->97880 98308 625a1a CloseHandle 97860->98308 97867 640ff6 Mailbox 59 API calls 97863->97867 97866 640ff6 Mailbox 59 API calls 97864->97866 97865 68d3e3 98306 629c9c 59 API calls 97865->98306 97872 68d505 97866->97872 97868 68d4ce 97867->97868 97873 68d4df 97868->97873 97875 6277c7 59 API calls 97868->97875 97877 6277c7 59 API calls 97872->97877 97872->97880 98309 68f835 59 API calls 2 library calls 97873->98309 97875->97873 97876 68d3a5 97879 627f41 59 API calls 97876->97879 97877->97880 97881 68d3b2 97879->97881 97880->97782 98305 683c66 63 API calls Mailbox 97881->98305 97883 68d3bb Mailbox 97883->97865 98338 69cdf1 97884->98338 97886 69e247 97886->97782 97888 6277c7 59 API calls 97887->97888 97889 6a23e0 97888->97889 97890 629997 84 API calls 97889->97890 97891 6a23ef 97890->97891 97892 627b76 59 API calls 97891->97892 97893 6a2402 97892->97893 97894 629997 84 API calls 97893->97894 97895 6a240f 97894->97895 97896 6a2429 97895->97896 97897 6a249d 97895->97897 98467 629c9c 59 API calls 97896->98467 97899 629997 84 API calls 97897->97899 97901 6a24a2 97899->97901 97900 6a242e 97902 6a248c 97900->97902 97907 6a2445 97900->97907 97903 6a24ce 97901->97903 97904 6a24b0 97901->97904 97906 629bf8 59 API calls 97902->97906 97905 6a24e3 97903->97905 98468 629c9c 59 API calls 97903->98468 97908 629bf8 59 API calls 97904->97908 97911 6a24f8 97905->97911 98469 629c9c 59 API calls 97905->98469 97922 6a2499 Mailbox 97906->97922 97909 6279ab 59 API calls 97907->97909 97908->97922 97912 6a2452 97909->97912 97914 6280d7 59 API calls 97911->97914 97916 627c8e 59 API calls 97912->97916 97915 6a2512 97914->97915 98448 67f8f2 97915->98448 97918 6a2460 97916->97918 97919 6279ab 59 API calls 97918->97919 97920 6a2479 97919->97920 97921 627c8e 59 API calls 97920->97921 97924 6a2487 97921->97924 97922->97782 98470 629b9c 59 API calls Mailbox 97924->98470 97926 629dfb 97925->97926 97927 629e32 97926->97927 98471 628e34 59 API calls Mailbox 97926->98471 97927->97782 97929 629e5d 97929->97782 97930->97782 97931->97775 98472 676636 97932->98472 97934 676702 97934->97777 97936 65fbff 97935->97936 97937 629c08 97935->97937 97938 65fc10 97936->97938 98031 627d2c 97936->98031 97942 640ff6 Mailbox 59 API calls 97937->97942 98040 627eec 97938->98040 97941 65fc1a 97945 629c34 97941->97945 97947 6277c7 59 API calls 97941->97947 97943 629c1b 97942->97943 97943->97941 97944 629c26 97943->97944 97944->97945 98027 627f41 97944->98027 97945->97796 97973 640ff6 97945->97973 97947->97945 98059 625c4e 97948->98059 97951 625c4e 2 API calls 97952 625e74 97951->97952 97952->97809 97954 640ff6 Mailbox 59 API calls 97953->97954 97955 6277e8 97954->97955 97956 640ff6 Mailbox 59 API calls 97955->97956 97957 6277f6 97956->97957 97958 6256d2 97957->97958 97959 625702 97958->97959 97960 6256dd 97958->97960 97961 627eec 59 API calls 97959->97961 97960->97959 97962 6256ec 97960->97962 97968 68349a 97961->97968 98071 625c18 97962->98071 97964 6834c9 97964->97819 97968->97964 98069 683436 ReadFile SetFilePointerEx 97968->98069 98070 627a84 59 API calls 2 library calls 97968->98070 97972 6835d8 Mailbox 97972->97819 97975 640ffe 97973->97975 97976 641018 97975->97976 97978 64101c std::exception::exception 97975->97978 98099 64594c 97975->98099 98116 6435e1 DecodePointer 97975->98116 97976->97793 98117 6487db RaiseException 97978->98117 97980 641046 98118 648711 58 API calls _free 97980->98118 97982 641058 97982->97793 97983->97794 97985 6299b1 97984->97985 97986 6299ab 97984->97986 97987 65f9fc __i64tow 97985->97987 97988 6299f9 97985->97988 97990 6299b7 __itow 97985->97990 97993 65f903 97985->97993 98002 625956 97986->98002 98127 6438d8 83 API calls 4 library calls 97988->98127 97992 640ff6 Mailbox 59 API calls 97990->97992 97994 6299d1 97992->97994 97995 640ff6 Mailbox 59 API calls 97993->97995 97997 65f97b Mailbox _wcscpy 97993->97997 97994->97986 97996 627f41 59 API calls 97994->97996 97998 65f948 97995->97998 97996->97986 98128 6438d8 83 API calls 4 library calls 97997->98128 97999 640ff6 Mailbox 59 API calls 97998->97999 98000 65f96e 97999->98000 98000->97997 98001 627f41 59 API calls 98000->98001 98001->97997 98003 625dcf CloseHandle 98002->98003 98004 625962 98003->98004 98129 625df9 98004->98129 98006 625981 98010 6259a4 98006->98010 98137 625770 98006->98137 98008 625993 98154 6253db SetFilePointerEx SetFilePointerEx 98008->98154 98010->97795 98010->97796 98021 625a1a CloseHandle 98010->98021 98011 65e030 98155 683696 SetFilePointerEx SetFilePointerEx WriteFile 98011->98155 98012 62599a 98012->98010 98012->98011 98014 65e060 98014->98010 98015->97823 98017 625de8 98016->98017 98018 625dd9 98016->98018 98017->98018 98019 625ded CloseHandle 98017->98019 98018->97824 98020 625a1a CloseHandle 98018->98020 98019->98018 98020->97824 98021->97796 98022->97796 98023->97801 98024->97809 98025->97817 98026->97822 98028 627f50 __NMSG_WRITE _memmove 98027->98028 98029 640ff6 Mailbox 59 API calls 98028->98029 98030 627f8e 98029->98030 98030->97945 98032 627da5 98031->98032 98033 627d38 __NMSG_WRITE 98031->98033 98051 627e8c 98032->98051 98035 627d73 98033->98035 98036 627d4e 98033->98036 98048 628189 98035->98048 98044 628087 98036->98044 98039 627d56 _memmove 98039->97938 98041 627f06 98040->98041 98043 627ef9 98040->98043 98042 640ff6 Mailbox 59 API calls 98041->98042 98042->98043 98043->97941 98045 62809f 98044->98045 98047 628099 98044->98047 98046 640ff6 Mailbox 59 API calls 98045->98046 98046->98047 98047->98039 98049 640ff6 Mailbox 59 API calls 98048->98049 98050 628193 98049->98050 98050->98039 98052 627e9a 98051->98052 98054 627ea3 _memmove 98051->98054 98052->98054 98055 627faf 98052->98055 98054->98039 98056 627fc2 98055->98056 98058 627fbf _memmove 98055->98058 98057 640ff6 Mailbox 59 API calls 98056->98057 98057->98058 98058->98054 98064 625c68 98059->98064 98060 65e151 98068 625dae SetFilePointerEx 98060->98068 98061 625cef SetFilePointerEx 98067 625dae SetFilePointerEx 98061->98067 98064->98060 98064->98061 98066 625cc3 98064->98066 98065 65e16b 98066->97951 98067->98066 98068->98065 98069->97968 98070->97968 98072 640ff6 Mailbox 59 API calls 98071->98072 98073 625c2b 98072->98073 98074 640ff6 Mailbox 59 API calls 98073->98074 98075 625c37 98074->98075 98076 625632 98075->98076 98083 625a2f 98076->98083 98078 625643 98080 625674 98078->98080 98090 625d20 98078->98090 98096 625bda 59 API calls 2 library calls 98078->98096 98080->97972 98082 62793a 61 API calls Mailbox 98080->98082 98082->97972 98084 65e065 98083->98084 98085 625a40 98083->98085 98097 676443 59 API calls Mailbox 98084->98097 98085->98078 98087 65e06f 98088 640ff6 Mailbox 59 API calls 98087->98088 98089 65e07b 98088->98089 98091 625d93 98090->98091 98092 625d2e 98090->98092 98098 625dae SetFilePointerEx 98091->98098 98093 625d56 98092->98093 98095 625d66 ReadFile 98092->98095 98093->98078 98095->98092 98095->98093 98096->98078 98097->98087 98098->98092 98100 6459c7 98099->98100 98106 645958 98099->98106 98125 6435e1 DecodePointer 98100->98125 98102 6459cd 98126 648d68 58 API calls __getptd_noexit 98102->98126 98103 645963 98103->98106 98119 64a3ab 58 API calls 2 library calls 98103->98119 98120 64a408 58 API calls 6 library calls 98103->98120 98121 6432df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 98103->98121 98106->98103 98107 64598b RtlAllocateHeap 98106->98107 98110 6459b3 98106->98110 98114 6459b1 98106->98114 98122 6435e1 DecodePointer 98106->98122 98107->98106 98108 6459bf 98107->98108 98108->97975 98123 648d68 58 API calls __getptd_noexit 98110->98123 98124 648d68 58 API calls __getptd_noexit 98114->98124 98116->97975 98117->97980 98118->97982 98119->98103 98120->98103 98122->98106 98123->98114 98124->98108 98125->98102 98126->98108 98127->97990 98128->97987 98130 625e12 CreateFileW 98129->98130 98131 65e181 98129->98131 98134 625e34 98130->98134 98132 65e187 CreateFileW 98131->98132 98131->98134 98133 65e1ad 98132->98133 98132->98134 98135 625c4e 2 API calls 98133->98135 98134->98006 98136 65e1b8 98135->98136 98136->98134 98138 62578b 98137->98138 98139 65dfce 98137->98139 98140 625c4e 2 API calls 98138->98140 98153 62581a 98138->98153 98143 625e3f 2 API calls 98139->98143 98139->98153 98141 6257ad 98140->98141 98156 62538e 98141->98156 98143->98153 98145 6257c4 98146 640ff6 Mailbox 59 API calls 98145->98146 98147 6257cf 98146->98147 98148 62538e 59 API calls 98147->98148 98149 6257da 98148->98149 98150 625d20 2 API calls 98149->98150 98151 625807 98150->98151 98152 625c4e 2 API calls 98151->98152 98152->98153 98153->98008 98154->98012 98155->98014 98157 640ff6 Mailbox 59 API calls 98156->98157 98158 6253a0 98157->98158 98158->98139 98158->98145 98208 627b76 98159->98208 98161 6263c5 98162 6265ca 98161->98162 98167 62766f 59 API calls 98161->98167 98168 65e41f 98161->98168 98169 627eec 59 API calls 98161->98169 98170 6268f9 98161->98170 98177 65e3bb 98161->98177 98181 627faf 59 API calls 98161->98181 98184 65e3eb _memmove 98161->98184 98213 6260cc 60 API calls 98161->98213 98214 625ea1 59 API calls Mailbox 98161->98214 98223 625fd2 60 API calls 98161->98223 98224 627a84 59 API calls 2 library calls 98161->98224 98215 62766f 98162->98215 98164 6265e4 Mailbox 98164->97832 98167->98161 98225 67fdba 91 API calls 4 library calls 98168->98225 98169->98161 98170->98164 98226 67fdba 91 API calls 4 library calls 98170->98226 98174 65e42d 98175 62766f 59 API calls 98174->98175 98176 65e443 98175->98176 98176->98164 98178 628189 59 API calls 98177->98178 98179 65e3c6 98178->98179 98183 640ff6 Mailbox 59 API calls 98179->98183 98182 62659b CharUpperBuffW 98181->98182 98182->98161 98183->98184 98184->98168 98184->98170 98186 62a01f 98185->98186 98206 62a04d Mailbox 98185->98206 98187 640ff6 Mailbox 59 API calls 98186->98187 98187->98206 98188 62b5d5 98230 6281a7 98188->98230 98190 62a1b7 98190->97833 98191 640ff6 59 API calls Mailbox 98191->98206 98192 62b5da 98236 68a0b5 89 API calls 4 library calls 98192->98236 98193 6277c7 59 API calls 98193->98206 98196 6281a7 59 API calls 98196->98206 98198 66047f 98229 68a0b5 89 API calls 4 library calls 98198->98229 98201 66048e 98201->97833 98202 642f80 67 API calls __cinit 98202->98206 98203 677405 59 API calls 98203->98206 98204 660e00 98235 68a0b5 89 API calls 4 library calls 98204->98235 98206->98188 98206->98190 98206->98191 98206->98192 98206->98193 98206->98196 98206->98198 98206->98202 98206->98203 98206->98204 98207 62a6ba 98206->98207 98227 62ca20 341 API calls 2 library calls 98206->98227 98228 62ba60 60 API calls Mailbox 98206->98228 98234 68a0b5 89 API calls 4 library calls 98207->98234 98209 640ff6 Mailbox 59 API calls 98208->98209 98210 627b9b 98209->98210 98211 628189 59 API calls 98210->98211 98212 627baa 98211->98212 98212->98161 98213->98161 98214->98161 98216 627682 _memmove 98215->98216 98217 62770f 98215->98217 98218 640ff6 Mailbox 59 API calls 98216->98218 98219 640ff6 Mailbox 59 API calls 98217->98219 98221 627689 98218->98221 98219->98216 98220 6276b2 98220->98164 98221->98220 98222 640ff6 Mailbox 59 API calls 98221->98222 98222->98220 98223->98161 98224->98161 98225->98174 98226->98164 98227->98206 98228->98206 98229->98201 98231 6281b2 98230->98231 98232 6281ba 98230->98232 98237 6280d7 98231->98237 98232->98190 98234->98190 98235->98192 98236->98190 98238 6280fa _memmove 98237->98238 98239 6280e7 98237->98239 98238->98232 98239->98238 98240 640ff6 Mailbox 59 API calls 98239->98240 98240->98238 98241->97839 98243 6277c7 59 API calls 98242->98243 98244 62470f 98243->98244 98245 6277c7 59 API calls 98244->98245 98246 624717 98245->98246 98247 6277c7 59 API calls 98246->98247 98248 62471f 98247->98248 98249 6277c7 59 API calls 98248->98249 98250 624727 98249->98250 98251 62475b 98250->98251 98252 65d8fb 98250->98252 98253 6279ab 59 API calls 98251->98253 98254 6281a7 59 API calls 98252->98254 98255 624769 98253->98255 98256 65d904 98254->98256 98257 627e8c 59 API calls 98255->98257 98258 627eec 59 API calls 98256->98258 98259 624773 98257->98259 98261 62479e 98258->98261 98260 6279ab 59 API calls 98259->98260 98259->98261 98263 624794 98260->98263 98262 6247de 98261->98262 98264 6247bd 98261->98264 98275 65d924 98261->98275 98310 6279ab 98262->98310 98267 627e8c 59 API calls 98263->98267 98323 627b52 98264->98323 98266 6247ef 98270 624801 98266->98270 98273 6281a7 59 API calls 98266->98273 98267->98261 98268 65d9f4 98271 627d2c 59 API calls 98268->98271 98274 624811 98270->98274 98276 6281a7 59 API calls 98270->98276 98288 65d9b1 98271->98288 98273->98270 98278 624818 98274->98278 98280 6281a7 59 API calls 98274->98280 98275->98268 98277 65d9dd 98275->98277 98287 65d95b 98275->98287 98276->98274 98277->98268 98283 65d9c8 98277->98283 98281 6281a7 59 API calls 98278->98281 98290 62481f Mailbox 98278->98290 98279 6279ab 59 API calls 98279->98262 98280->98278 98281->98290 98282 627b52 59 API calls 98282->98288 98286 627d2c 59 API calls 98283->98286 98284 65d9b9 98285 627d2c 59 API calls 98284->98285 98285->98288 98286->98288 98287->98284 98291 65d9a4 98287->98291 98288->98262 98288->98282 98326 627a84 59 API calls 2 library calls 98288->98326 98290->97859 98292 627d2c 59 API calls 98291->98292 98292->98288 98294 65f094 98293->98294 98295 627ca0 98293->98295 98333 678123 59 API calls _memmove 98294->98333 98327 627bb1 98295->98327 98298 627cac 98298->97865 98302 683e73 98298->98302 98299 65f09e 98300 6281a7 59 API calls 98299->98300 98301 65f0a6 Mailbox 98300->98301 98334 684696 GetFileAttributesW 98302->98334 98305->97883 98306->97841 98307->97845 98308->97880 98309->97880 98311 627a17 98310->98311 98312 6279ba 98310->98312 98313 627e8c 59 API calls 98311->98313 98312->98311 98314 6279c5 98312->98314 98315 6279e8 _memmove 98313->98315 98316 6279e0 98314->98316 98317 65ef32 98314->98317 98315->98266 98319 628087 59 API calls 98316->98319 98318 628189 59 API calls 98317->98318 98320 65ef3c 98318->98320 98319->98315 98321 640ff6 Mailbox 59 API calls 98320->98321 98322 65ef5c 98321->98322 98324 627faf 59 API calls 98323->98324 98325 6247c7 98324->98325 98325->98262 98325->98279 98326->98288 98328 627be5 _memmove 98327->98328 98329 627bbf 98327->98329 98328->98298 98328->98328 98329->98328 98330 640ff6 Mailbox 59 API calls 98329->98330 98331 627c34 98330->98331 98332 640ff6 Mailbox 59 API calls 98331->98332 98332->98328 98333->98299 98335 6846b1 FindFirstFileW 98334->98335 98336 683e7a 98334->98336 98335->98336 98337 6846c6 FindClose 98335->98337 98336->97865 98336->97876 98337->98336 98339 629997 84 API calls 98338->98339 98340 69ce2e 98339->98340 98341 69ce75 Mailbox 98340->98341 98376 69dab9 98340->98376 98341->97886 98343 69d242 98426 69dbdc 92 API calls Mailbox 98343->98426 98344 69d0db 98389 69cc82 98344->98389 98347 69d251 98347->98344 98348 69d25d 98347->98348 98348->98341 98349 629997 84 API calls 98367 69cec6 Mailbox 98349->98367 98354 69d114 98404 640e48 98354->98404 98357 69d12e 98410 68a0b5 89 API calls 4 library calls 98357->98410 98358 69d147 98411 62942e 98358->98411 98361 69d139 GetCurrentProcess TerminateProcess 98361->98358 98362 69d0cd 98362->98343 98362->98344 98367->98341 98367->98349 98367->98362 98408 68f835 59 API calls 2 library calls 98367->98408 98409 69d2f3 61 API calls 2 library calls 98367->98409 98368 69d2b8 98368->98341 98372 69d2cc FreeLibrary 98368->98372 98369 69d17f 98423 69d95d 107 API calls _free 98369->98423 98372->98341 98375 69d190 98375->98368 98424 628ea0 59 API calls Mailbox 98375->98424 98425 629e9c 60 API calls Mailbox 98375->98425 98427 69d95d 107 API calls _free 98375->98427 98377 627faf 59 API calls 98376->98377 98378 69dad4 CharLowerBuffW 98377->98378 98428 67f658 98378->98428 98382 6277c7 59 API calls 98383 69db0d 98382->98383 98384 6279ab 59 API calls 98383->98384 98385 69db24 98384->98385 98386 627e8c 59 API calls 98385->98386 98387 69db30 Mailbox 98386->98387 98388 69db6c Mailbox 98387->98388 98435 69d2f3 61 API calls 2 library calls 98387->98435 98388->98367 98390 69ccf2 98389->98390 98391 69cc9d 98389->98391 98395 69dd64 98390->98395 98392 640ff6 Mailbox 59 API calls 98391->98392 98394 69ccbf 98392->98394 98393 640ff6 Mailbox 59 API calls 98393->98394 98394->98390 98394->98393 98396 69df8d Mailbox 98395->98396 98403 69dd87 _strcat _wcscpy __NMSG_WRITE 98395->98403 98396->98354 98397 629d46 59 API calls 98397->98403 98398 629c9c 59 API calls 98398->98403 98399 629cf8 59 API calls 98399->98403 98400 64594c 58 API calls __crtCompareStringA_stat 98400->98403 98401 629997 84 API calls 98401->98403 98403->98396 98403->98397 98403->98398 98403->98399 98403->98400 98403->98401 98438 685b29 61 API calls 2 library calls 98403->98438 98406 640e5d 98404->98406 98405 640ef5 VirtualAlloc 98407 640ec3 98405->98407 98406->98405 98406->98407 98407->98357 98407->98358 98408->98367 98409->98367 98410->98361 98412 629436 98411->98412 98413 640ff6 Mailbox 59 API calls 98412->98413 98414 629444 98413->98414 98415 629450 98414->98415 98439 62935c 59 API calls Mailbox 98414->98439 98417 6291b0 98415->98417 98440 6292c0 98417->98440 98419 6291bf 98420 640ff6 Mailbox 59 API calls 98419->98420 98421 62925b 98419->98421 98420->98421 98421->98375 98422 628ea0 59 API calls Mailbox 98421->98422 98422->98369 98423->98375 98424->98375 98425->98375 98426->98347 98427->98375 98430 67f683 __NMSG_WRITE 98428->98430 98429 67f6c2 98429->98382 98429->98387 98430->98429 98431 67f769 98430->98431 98432 67f6b8 98430->98432 98431->98429 98437 627a24 61 API calls 98431->98437 98432->98429 98436 627a24 61 API calls 98432->98436 98435->98388 98436->98432 98437->98431 98438->98403 98439->98415 98441 6292c9 Mailbox 98440->98441 98442 65f5c8 98441->98442 98447 6292d3 98441->98447 98443 640ff6 Mailbox 59 API calls 98442->98443 98445 65f5d4 98443->98445 98444 6292da 98444->98419 98446 629df0 Mailbox 59 API calls 98446->98447 98447->98444 98447->98446 98449 6277c7 59 API calls 98448->98449 98450 67f905 98449->98450 98451 627b76 59 API calls 98450->98451 98452 67f919 98451->98452 98453 67f658 61 API calls 98452->98453 98464 67f93b 98452->98464 98455 67f935 98453->98455 98454 67f658 61 API calls 98454->98464 98456 6279ab 59 API calls 98455->98456 98455->98464 98456->98464 98457 67f9b5 98459 6279ab 59 API calls 98457->98459 98458 6279ab 59 API calls 98458->98464 98460 67f9ce 98459->98460 98461 627c8e 59 API calls 98460->98461 98463 67f9da 98461->98463 98462 627c8e 59 API calls 98462->98464 98465 6280d7 59 API calls 98463->98465 98466 67f9e9 Mailbox 98463->98466 98464->98454 98464->98457 98464->98458 98464->98462 98465->98466 98466->97924 98467->97900 98468->97905 98469->97911 98470->97922 98471->97929 98473 67665e 98472->98473 98474 676641 98472->98474 98473->97934 98474->98473 98476 676621 59 API calls Mailbox 98474->98476 98476->98474 98477 623633 98478 62366a 98477->98478 98479 6236e5 98478->98479 98480 6236e7 98478->98480 98481 623688 98478->98481 98482 6236ca DefWindowProcW 98479->98482 98483 65d31c 98480->98483 98484 6236ed 98480->98484 98485 623695 98481->98485 98486 62375d PostQuitMessage 98481->98486 98487 6236d8 98482->98487 98527 6311d0 10 API calls Mailbox 98483->98527 98488 6236f2 98484->98488 98489 623715 SetTimer RegisterWindowMessageW 98484->98489 98490 6236a0 98485->98490 98491 65d38f 98485->98491 98486->98487 98494 65d2bf 98488->98494 98495 6236f9 KillTimer 98488->98495 98489->98487 98496 62373e CreatePopupMenu 98489->98496 98497 623767 98490->98497 98498 6236a8 98490->98498 98542 682a16 71 API calls _memset 98491->98542 98493 65d343 98528 6311f3 341 API calls Mailbox 98493->98528 98503 65d2c4 98494->98503 98504 65d2f8 MoveWindow 98494->98504 98522 6244cb Shell_NotifyIconW _memset 98495->98522 98496->98487 98525 624531 64 API calls _memset 98497->98525 98506 65d374 98498->98506 98507 6236b3 98498->98507 98500 65d3a1 98500->98482 98500->98487 98511 65d2e7 SetFocus 98503->98511 98512 65d2c8 98503->98512 98504->98487 98506->98482 98541 67817e 59 API calls Mailbox 98506->98541 98508 62374b 98507->98508 98509 6236be 98507->98509 98524 6245df 81 API calls _memset 98508->98524 98509->98482 98529 6244cb Shell_NotifyIconW _memset 98509->98529 98510 62375b 98510->98487 98511->98487 98512->98509 98515 65d2d1 98512->98515 98513 62370c 98523 623114 DeleteObject DestroyWindow Mailbox 98513->98523 98526 6311d0 10 API calls Mailbox 98515->98526 98520 65d368 98530 6243db 98520->98530 98522->98513 98523->98487 98524->98510 98525->98510 98526->98487 98527->98493 98528->98509 98529->98520 98531 624406 _memset 98530->98531 98543 624213 98531->98543 98534 62448b 98536 6244c1 Shell_NotifyIconW 98534->98536 98537 6244a5 Shell_NotifyIconW 98534->98537 98538 6244b3 98536->98538 98537->98538 98547 62410d 98538->98547 98540 6244ba 98540->98479 98541->98479 98542->98500 98544 624227 98543->98544 98545 65d638 98543->98545 98544->98534 98569 683226 62 API calls _W_store_winword 98544->98569 98545->98544 98546 65d641 DestroyIcon 98545->98546 98546->98544 98548 624200 Mailbox 98547->98548 98549 624129 98547->98549 98548->98540 98550 627b76 59 API calls 98549->98550 98551 624137 98550->98551 98552 624144 98551->98552 98553 65d5dd LoadStringW 98551->98553 98554 627d2c 59 API calls 98552->98554 98556 65d5f7 98553->98556 98555 624159 98554->98555 98555->98556 98558 62416a 98555->98558 98557 627c8e 59 API calls 98556->98557 98563 65d601 98557->98563 98559 624174 98558->98559 98560 624205 98558->98560 98561 627c8e 59 API calls 98559->98561 98562 6281a7 59 API calls 98560->98562 98565 62417e _memset _wcscpy 98561->98565 98562->98565 98563->98565 98570 627e0b 98563->98570 98567 6241e6 Shell_NotifyIconW 98565->98567 98566 65d623 98568 627e0b 59 API calls 98566->98568 98567->98548 98568->98565 98569->98534 98571 65f173 98570->98571 98572 627e1f 98570->98572 98574 628189 59 API calls 98571->98574 98577 627db0 98572->98577 98576 65f17e __NMSG_WRITE _memmove 98574->98576 98575 627e2a 98575->98566 98578 627dbf __NMSG_WRITE 98577->98578 98579 628189 59 API calls 98578->98579 98580 627dd0 _memmove 98578->98580 98581 65f130 _memmove 98579->98581 98580->98575 98582 65ff06 98583 65ff10 98582->98583 98619 62ac90 Mailbox _memmove 98582->98619 98721 628e34 59 API calls Mailbox 98583->98721 98587 62b685 98726 68a0b5 89 API calls 4 library calls 98587->98726 98588 640ff6 59 API calls Mailbox 98610 62a097 Mailbox 98588->98610 98590 62b5d5 98596 6281a7 59 API calls 98590->98596 98593 62b5da 98730 68a0b5 89 API calls 4 library calls 98593->98730 98594 6281a7 59 API calls 98594->98610 98604 62a1b7 98596->98604 98597 66047f 98725 68a0b5 89 API calls 4 library calls 98597->98725 98599 6277c7 59 API calls 98599->98610 98600 627f41 59 API calls 98600->98619 98602 66048e 98603 677405 59 API calls 98603->98610 98606 642f80 67 API calls __cinit 98606->98610 98607 6766f4 Mailbox 59 API calls 98607->98604 98608 660e00 98729 68a0b5 89 API calls 4 library calls 98608->98729 98610->98588 98610->98590 98610->98593 98610->98594 98610->98597 98610->98599 98610->98603 98610->98604 98610->98606 98610->98608 98612 62a6ba 98610->98612 98716 62ca20 341 API calls 2 library calls 98610->98716 98717 62ba60 60 API calls Mailbox 98610->98717 98728 68a0b5 89 API calls 4 library calls 98612->98728 98613 6766f4 Mailbox 59 API calls 98613->98619 98615 62a000 341 API calls 98615->98619 98616 660c94 98617 629df0 Mailbox 59 API calls 98616->98617 98621 660c86 98617->98621 98618 660ca2 98727 68a0b5 89 API calls 4 library calls 98618->98727 98619->98587 98619->98600 98619->98604 98619->98610 98619->98613 98619->98615 98619->98616 98619->98618 98622 62b37c 98619->98622 98624 640ff6 59 API calls Mailbox 98619->98624 98628 62b416 98619->98628 98631 62ade2 Mailbox 98619->98631 98638 69c5f4 98619->98638 98670 687be0 98619->98670 98676 69bf80 98619->98676 98722 677405 59 API calls 98619->98722 98723 69c4a7 85 API calls 2 library calls 98619->98723 98621->98604 98621->98607 98718 629e9c 60 API calls Mailbox 98622->98718 98624->98619 98625 62b38d 98719 629e9c 60 API calls Mailbox 98625->98719 98720 62f803 341 API calls 98628->98720 98630 629df0 Mailbox 59 API calls 98630->98631 98631->98587 98631->98604 98631->98621 98631->98630 98632 6600e0 VariantClear 98631->98632 98633 632123 95 API calls 98631->98633 98634 6a23c9 87 API calls 98631->98634 98635 69474d 341 API calls 98631->98635 98636 68d2e6 101 API calls 98631->98636 98637 69e237 130 API calls 98631->98637 98724 677405 59 API calls 98631->98724 98632->98631 98633->98631 98634->98631 98635->98631 98636->98631 98637->98631 98639 6277c7 59 API calls 98638->98639 98640 69c608 98639->98640 98641 6277c7 59 API calls 98640->98641 98642 69c610 98641->98642 98643 6277c7 59 API calls 98642->98643 98644 69c618 98643->98644 98645 629997 84 API calls 98644->98645 98660 69c626 98645->98660 98646 627d2c 59 API calls 98646->98660 98647 69c80f 98648 69c83c Mailbox 98647->98648 98733 629b9c 59 API calls Mailbox 98647->98733 98648->98619 98650 69c7f6 98651 627e0b 59 API calls 98650->98651 98653 69c803 98651->98653 98652 69c811 98655 627e0b 59 API calls 98652->98655 98658 627c8e 59 API calls 98653->98658 98654 627a84 59 API calls 98654->98660 98659 69c820 98655->98659 98656 6281a7 59 API calls 98656->98660 98657 627faf 59 API calls 98661 69c6bd CharUpperBuffW 98657->98661 98658->98647 98662 627c8e 59 API calls 98659->98662 98660->98646 98660->98647 98660->98648 98660->98650 98660->98652 98660->98654 98660->98656 98660->98657 98663 627faf 59 API calls 98660->98663 98667 629997 84 API calls 98660->98667 98668 627e0b 59 API calls 98660->98668 98669 627c8e 59 API calls 98660->98669 98731 62859a 68 API calls 98661->98731 98662->98647 98664 69c77d CharUpperBuffW 98663->98664 98732 62c707 69 API calls 2 library calls 98664->98732 98667->98660 98668->98660 98669->98660 98671 687bec 98670->98671 98672 640ff6 Mailbox 59 API calls 98671->98672 98673 687bfa 98672->98673 98674 687c08 98673->98674 98675 6277c7 59 API calls 98673->98675 98674->98619 98675->98674 98677 69bfab 98676->98677 98678 69bfc5 98676->98678 98734 68a0b5 89 API calls 4 library calls 98677->98734 98735 69a528 59 API calls Mailbox 98678->98735 98681 69bfd0 98682 62a000 340 API calls 98681->98682 98683 69c031 98682->98683 98684 69bfbd Mailbox 98683->98684 98685 69c0c3 98683->98685 98688 69c072 98683->98688 98684->98619 98686 69c119 98685->98686 98687 69c0c9 98685->98687 98686->98684 98689 629997 84 API calls 98686->98689 98756 687ba4 59 API calls 98687->98756 98736 687581 59 API calls Mailbox 98688->98736 98690 69c12b 98689->98690 98692 627faf 59 API calls 98690->98692 98695 69c14f CharUpperBuffW 98692->98695 98693 69c0ec 98757 625ea1 59 API calls Mailbox 98693->98757 98700 69c169 98695->98700 98697 69c0a2 98737 62f5c0 98697->98737 98698 69c0f4 Mailbox 98758 62fe40 341 API calls 2 library calls 98698->98758 98701 69c1bc 98700->98701 98702 69c170 98700->98702 98704 629997 84 API calls 98701->98704 98759 687581 59 API calls Mailbox 98702->98759 98705 69c1c4 98704->98705 98760 629fbd 60 API calls 98705->98760 98708 69c19e 98709 62f5c0 340 API calls 98708->98709 98709->98684 98710 69c1ce 98710->98684 98711 629997 84 API calls 98710->98711 98712 69c1e9 98711->98712 98761 625ea1 59 API calls Mailbox 98712->98761 98714 69c1f9 98762 62fe40 341 API calls 2 library calls 98714->98762 98716->98610 98717->98610 98718->98625 98719->98628 98720->98587 98721->98619 98722->98619 98723->98619 98724->98631 98725->98602 98726->98621 98727->98621 98728->98604 98729->98593 98730->98604 98731->98660 98732->98660 98733->98648 98734->98684 98735->98681 98736->98697 98738 62f7b0 98737->98738 98739 62f61a 98737->98739 98740 627f41 59 API calls 98738->98740 98741 62f626 98739->98741 98742 664848 98739->98742 98748 62f6ec Mailbox 98740->98748 98852 62f3f0 341 API calls 2 library calls 98741->98852 98743 69bf80 341 API calls 98742->98743 98745 664856 98743->98745 98749 62f790 98745->98749 98853 68a0b5 89 API calls 4 library calls 98745->98853 98747 62f65d 98747->98745 98747->98748 98747->98749 98751 62f743 98748->98751 98754 683e73 3 API calls 98748->98754 98763 624faa 98748->98763 98769 69e24b 98748->98769 98772 68cde5 98748->98772 98749->98684 98750 629df0 Mailbox 59 API calls 98750->98751 98751->98749 98751->98750 98754->98751 98756->98693 98757->98698 98758->98684 98759->98708 98760->98710 98761->98714 98762->98684 98764 624fb4 98763->98764 98768 624fbb 98763->98768 98854 6455d6 98764->98854 98766 624fca 98766->98751 98767 624fdb FreeLibrary 98767->98766 98768->98766 98768->98767 98770 69cdf1 130 API calls 98769->98770 98771 69e25b 98770->98771 98771->98751 98773 6277c7 59 API calls 98772->98773 98774 68ce1a 98773->98774 98775 6277c7 59 API calls 98774->98775 98776 68ce23 98775->98776 98777 68ce37 98776->98777 99307 629c9c 59 API calls 98776->99307 98779 629997 84 API calls 98777->98779 98780 68ce54 98779->98780 98781 68cf55 98780->98781 98782 68ce76 98780->98782 98787 68cf85 Mailbox 98780->98787 99174 624f3d 98781->99174 98783 629997 84 API calls 98782->98783 98785 68ce82 98783->98785 98788 6281a7 59 API calls 98785->98788 98787->98751 98790 68ce8e 98788->98790 98789 68cf81 98789->98787 98792 6277c7 59 API calls 98789->98792 98796 68cea2 98790->98796 98797 68ced4 98790->98797 98791 624f3d 136 API calls 98791->98789 98793 68cfb6 98792->98793 98794 6277c7 59 API calls 98793->98794 98795 68cfbf 98794->98795 98799 6277c7 59 API calls 98795->98799 98800 6281a7 59 API calls 98796->98800 98798 629997 84 API calls 98797->98798 98801 68cee1 98798->98801 98802 68cfc8 98799->98802 98803 68ceb2 98800->98803 98804 6281a7 59 API calls 98801->98804 98805 6277c7 59 API calls 98802->98805 98806 627e0b 59 API calls 98803->98806 98807 68ceed 98804->98807 98808 68cfd1 98805->98808 98809 68cebc 98806->98809 99308 684cd3 GetFileAttributesW 98807->99308 98811 629997 84 API calls 98808->98811 98812 629997 84 API calls 98809->98812 98814 68cfde 98811->98814 98815 68cec8 98812->98815 98813 68cef6 98816 68cf09 98813->98816 98819 627b52 59 API calls 98813->98819 98817 6246f9 59 API calls 98814->98817 98818 627c8e 59 API calls 98815->98818 98821 629997 84 API calls 98816->98821 98826 68cf0f 98816->98826 98820 68cff9 98817->98820 98818->98797 98819->98816 98822 627b52 59 API calls 98820->98822 98823 68cf36 98821->98823 98824 68d008 98822->98824 99309 683a2b 75 API calls Mailbox 98823->99309 98827 68d03c 98824->98827 98829 627b52 59 API calls 98824->98829 98826->98787 98828 6281a7 59 API calls 98827->98828 98830 68d04a 98828->98830 98831 68d019 98829->98831 98832 627c8e 59 API calls 98830->98832 98831->98827 98833 627d2c 59 API calls 98831->98833 98834 68d058 98832->98834 98835 68d02e 98833->98835 98836 627c8e 59 API calls 98834->98836 98837 627d2c 59 API calls 98835->98837 98838 68d066 98836->98838 98837->98827 98839 627c8e 59 API calls 98838->98839 98840 68d074 98839->98840 98841 629997 84 API calls 98840->98841 98842 68d080 98841->98842 99198 6842ad 98842->99198 98844 68d091 98845 683e73 3 API calls 98844->98845 98846 68d09b 98845->98846 98847 629997 84 API calls 98846->98847 98851 68d0cc 98846->98851 98848 68d0b9 98847->98848 99252 6893df 98848->99252 98850 624faa 84 API calls 98850->98787 98851->98850 98852->98747 98853->98749 98855 6455e2 __write 98854->98855 98856 6455f6 98855->98856 98857 64560e 98855->98857 98889 648d68 58 API calls __getptd_noexit 98856->98889 98866 645606 __write 98857->98866 98867 646e4e 98857->98867 98860 6455fb 98890 648ff6 9 API calls __fclose_nolock 98860->98890 98866->98768 98868 646e80 EnterCriticalSection 98867->98868 98869 646e5e 98867->98869 98871 645620 98868->98871 98869->98868 98870 646e66 98869->98870 98892 649e4b 98870->98892 98873 64556a 98871->98873 98874 64558d 98873->98874 98875 645579 98873->98875 98877 645589 98874->98877 98938 644c6d 98874->98938 98981 648d68 58 API calls __getptd_noexit 98875->98981 98891 645645 LeaveCriticalSection LeaveCriticalSection _fprintf 98877->98891 98879 64557e 98982 648ff6 9 API calls __fclose_nolock 98879->98982 98885 6455a7 98955 650c52 98885->98955 98887 6455ad 98887->98877 98888 642f95 _free 58 API calls 98887->98888 98888->98877 98889->98860 98890->98866 98891->98866 98893 649e5c 98892->98893 98894 649e6f EnterCriticalSection 98892->98894 98899 649ed3 98893->98899 98894->98871 98896 649e62 98896->98894 98923 6432f5 58 API calls 3 library calls 98896->98923 98900 649edf __write 98899->98900 98901 649f00 98900->98901 98902 649ee8 98900->98902 98908 649f21 __write 98901->98908 98927 648a5d 58 API calls 2 library calls 98901->98927 98924 64a3ab 58 API calls 2 library calls 98902->98924 98904 649eed 98925 64a408 58 API calls 6 library calls 98904->98925 98907 649f15 98910 649f1c 98907->98910 98911 649f2b 98907->98911 98908->98896 98909 649ef4 98926 6432df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 98909->98926 98928 648d68 58 API calls __getptd_noexit 98910->98928 98912 649e4b __lock 58 API calls 98911->98912 98915 649f32 98912->98915 98917 649f57 98915->98917 98918 649f3f 98915->98918 98930 642f95 98917->98930 98929 64a06b InitializeCriticalSectionAndSpinCount 98918->98929 98921 649f4b 98936 649f73 LeaveCriticalSection _doexit 98921->98936 98924->98904 98925->98909 98927->98907 98928->98908 98929->98921 98931 642f9e RtlFreeHeap 98930->98931 98935 642fc7 __dosmaperr 98930->98935 98932 642fb3 98931->98932 98931->98935 98937 648d68 58 API calls __getptd_noexit 98932->98937 98934 642fb9 GetLastError 98934->98935 98935->98921 98936->98908 98937->98934 98939 644c80 98938->98939 98943 644ca4 98938->98943 98940 644916 __flush 58 API calls 98939->98940 98939->98943 98941 644c9d 98940->98941 98983 64dac6 98941->98983 98944 650dc7 98943->98944 98945 650dd4 98944->98945 98947 6455a1 98944->98947 98946 642f95 _free 58 API calls 98945->98946 98945->98947 98946->98947 98948 644916 98947->98948 98949 644935 98948->98949 98950 644920 98948->98950 98949->98885 99129 648d68 58 API calls __getptd_noexit 98950->99129 98952 644925 99130 648ff6 9 API calls __fclose_nolock 98952->99130 98954 644930 98954->98885 98956 650c5e __write 98955->98956 98957 650c82 98956->98957 98958 650c6b 98956->98958 98960 650d0d 98957->98960 98962 650c92 98957->98962 99146 648d34 58 API calls __getptd_noexit 98958->99146 99151 648d34 58 API calls __getptd_noexit 98960->99151 98961 650c70 99147 648d68 58 API calls __getptd_noexit 98961->99147 98965 650cb0 98962->98965 98966 650cba 98962->98966 99148 648d34 58 API calls __getptd_noexit 98965->99148 98968 64d446 ___lock_fhandle 59 API calls 98966->98968 98967 650cb5 99152 648d68 58 API calls __getptd_noexit 98967->99152 98971 650cc0 98968->98971 98973 650cd3 98971->98973 98974 650cde 98971->98974 98972 650d19 99153 648ff6 9 API calls __fclose_nolock 98972->99153 99131 650d2d 98973->99131 99149 648d68 58 API calls __getptd_noexit 98974->99149 98977 650c77 __write 98977->98887 98979 650cd9 99150 650d05 LeaveCriticalSection __unlock_fhandle 98979->99150 98981->98879 98982->98877 98984 64dad2 __write 98983->98984 98985 64daf6 98984->98985 98986 64dadf 98984->98986 98988 64db95 98985->98988 98990 64db0a 98985->98990 99084 648d34 58 API calls __getptd_noexit 98986->99084 99090 648d34 58 API calls __getptd_noexit 98988->99090 98989 64dae4 99085 648d68 58 API calls __getptd_noexit 98989->99085 98993 64db32 98990->98993 98994 64db28 98990->98994 99011 64d446 98993->99011 99086 648d34 58 API calls __getptd_noexit 98994->99086 98995 64db2d 99091 648d68 58 API calls __getptd_noexit 98995->99091 98998 64db38 99000 64db5e 98998->99000 99001 64db4b 98998->99001 99087 648d68 58 API calls __getptd_noexit 99000->99087 99020 64dbb5 99001->99020 99002 64dba1 99092 648ff6 9 API calls __fclose_nolock 99002->99092 99003 64daeb __write 99003->98943 99007 64db63 99088 648d34 58 API calls __getptd_noexit 99007->99088 99008 64db57 99089 64db8d LeaveCriticalSection __unlock_fhandle 99008->99089 99012 64d452 __write 99011->99012 99013 64d4a1 EnterCriticalSection 99012->99013 99015 649e4b __lock 58 API calls 99012->99015 99014 64d4c7 __write 99013->99014 99014->98998 99016 64d477 99015->99016 99019 64d48f 99016->99019 99093 64a06b InitializeCriticalSectionAndSpinCount 99016->99093 99094 64d4cb LeaveCriticalSection _doexit 99019->99094 99021 64dbc2 __write_nolock 99020->99021 99022 64dc20 99021->99022 99023 64dc01 99021->99023 99051 64dbf6 99021->99051 99026 64dc78 99022->99026 99027 64dc5c 99022->99027 99104 648d34 58 API calls __getptd_noexit 99023->99104 99031 64dc91 99026->99031 99110 651b11 60 API calls 2 library calls 99026->99110 99107 648d34 58 API calls __getptd_noexit 99027->99107 99028 64e416 99028->99008 99029 64dc06 99105 648d68 58 API calls __getptd_noexit 99029->99105 99095 655ebb 99031->99095 99033 64dc61 99108 648d68 58 API calls __getptd_noexit 99033->99108 99035 64dc0d 99106 648ff6 9 API calls __fclose_nolock 99035->99106 99039 64dff8 99042 64e016 99039->99042 99043 64e38b WriteFile 99039->99043 99040 64dc9f 99040->99039 99111 649bec 58 API calls 2 library calls 99040->99111 99041 64dc68 99109 648ff6 9 API calls __fclose_nolock 99041->99109 99046 64e13a 99042->99046 99054 64e02c 99042->99054 99047 64dfeb GetLastError 99043->99047 99052 64dfb8 99043->99052 99058 64e22f 99046->99058 99060 64e145 99046->99060 99047->99052 99048 64dccb GetConsoleMode 99048->99039 99050 64dd0a 99048->99050 99049 64e3c4 99049->99051 99116 648d68 58 API calls __getptd_noexit 99049->99116 99050->99039 99053 64dd1a GetConsoleCP 99050->99053 99118 64c836 99051->99118 99052->99049 99052->99051 99057 64e118 99052->99057 99053->99049 99080 64dd49 99053->99080 99054->99049 99055 64e09b WriteFile 99054->99055 99055->99047 99059 64e0d8 99055->99059 99063 64e123 99057->99063 99064 64e3bb 99057->99064 99058->99049 99065 64e2a4 WideCharToMultiByte 99058->99065 99059->99054 99066 64e0fc 99059->99066 99060->99049 99067 64e1aa WriteFile 99060->99067 99061 64e3f2 99117 648d34 58 API calls __getptd_noexit 99061->99117 99113 648d68 58 API calls __getptd_noexit 99063->99113 99115 648d47 58 API calls __dosmaperr 99064->99115 99065->99047 99076 64e2eb 99065->99076 99066->99052 99067->99047 99068 64e1f9 99067->99068 99068->99052 99068->99060 99068->99066 99071 64e128 99114 648d34 58 API calls __getptd_noexit 99071->99114 99072 64e2f3 WriteFile 99075 64e346 GetLastError 99072->99075 99072->99076 99075->99076 99076->99052 99076->99058 99076->99066 99076->99072 99077 65650a 60 API calls __write_nolock 99077->99080 99078 64de32 WideCharToMultiByte 99078->99052 99079 64de6d WriteFile 99078->99079 99079->99047 99082 64de9f 99079->99082 99080->99052 99080->99077 99080->99078 99080->99082 99112 643835 58 API calls __isleadbyte_l 99080->99112 99081 657cae WriteConsoleW CreateFileW __putwch_nolock 99081->99082 99082->99047 99082->99052 99082->99080 99082->99081 99083 64dec7 WriteFile 99082->99083 99083->99047 99083->99082 99084->98989 99085->99003 99086->98995 99087->99007 99088->99008 99089->99003 99090->98995 99091->99002 99092->99003 99093->99019 99094->99013 99096 655ec6 99095->99096 99097 655ed3 99095->99097 99125 648d68 58 API calls __getptd_noexit 99096->99125 99100 655edf 99097->99100 99126 648d68 58 API calls __getptd_noexit 99097->99126 99099 655ecb 99099->99040 99100->99040 99102 655f00 99127 648ff6 9 API calls __fclose_nolock 99102->99127 99104->99029 99105->99035 99106->99051 99107->99033 99108->99041 99109->99051 99110->99031 99111->99048 99112->99080 99113->99071 99114->99051 99115->99051 99116->99061 99117->99051 99119 64c840 IsProcessorFeaturePresent 99118->99119 99120 64c83e 99118->99120 99122 655b5a 99119->99122 99120->99028 99128 655b09 5 API calls ___raise_securityfailure 99122->99128 99124 655c3d 99124->99028 99125->99099 99126->99102 99127->99099 99128->99124 99129->98952 99130->98954 99154 64d703 99131->99154 99133 650d91 99167 64d67d 59 API calls __dosmaperr 99133->99167 99134 650d3b 99134->99133 99136 64d703 __lseek_nolock 58 API calls 99134->99136 99145 650d6f 99134->99145 99140 650d66 99136->99140 99137 64d703 __lseek_nolock 58 API calls 99141 650d7b FindCloseChangeNotification 99137->99141 99138 650d99 99139 650dbb 99138->99139 99168 648d47 58 API calls __dosmaperr 99138->99168 99139->98979 99143 64d703 __lseek_nolock 58 API calls 99140->99143 99141->99133 99144 650d87 GetLastError 99141->99144 99143->99145 99144->99133 99145->99133 99145->99137 99146->98961 99147->98977 99148->98967 99149->98979 99150->98977 99151->98967 99152->98972 99153->98977 99155 64d723 99154->99155 99156 64d70e 99154->99156 99162 64d748 99155->99162 99171 648d34 58 API calls __getptd_noexit 99155->99171 99169 648d34 58 API calls __getptd_noexit 99156->99169 99159 64d713 99170 648d68 58 API calls __getptd_noexit 99159->99170 99160 64d752 99172 648d68 58 API calls __getptd_noexit 99160->99172 99162->99134 99164 64d71b 99164->99134 99165 64d75a 99173 648ff6 9 API calls __fclose_nolock 99165->99173 99167->99138 99168->99139 99169->99159 99170->99164 99171->99160 99172->99165 99173->99164 99310 624d13 99174->99310 99179 65dd0f 99182 624faa 84 API calls 99179->99182 99180 624f68 LoadLibraryExW 99320 624cc8 99180->99320 99184 65dd16 99182->99184 99186 624cc8 3 API calls 99184->99186 99188 65dd1e 99186->99188 99187 624f8f 99187->99188 99189 624f9b 99187->99189 99346 62506b 99188->99346 99191 624faa 84 API calls 99189->99191 99193 624fa0 99191->99193 99193->98789 99193->98791 99195 65dd45 99354 625027 99195->99354 99199 6842c9 99198->99199 99200 6842dc 99199->99200 99201 6842ce 99199->99201 99203 6277c7 59 API calls 99200->99203 99202 6281a7 59 API calls 99201->99202 99204 6842d7 Mailbox 99202->99204 99205 6842e4 99203->99205 99204->98844 99206 6277c7 59 API calls 99205->99206 99207 6842ec 99206->99207 99208 6277c7 59 API calls 99207->99208 99209 6842f7 99208->99209 99210 6277c7 59 API calls 99209->99210 99211 6842ff 99210->99211 99212 6277c7 59 API calls 99211->99212 99253 6893ec __write_nolock 99252->99253 99307->98777 99308->98813 99309->98826 99359 624d61 99310->99359 99313 624d3a 99314 624d53 99313->99314 99315 624d4a FreeLibrary 99313->99315 99317 64548b 99314->99317 99315->99314 99316 624d61 2 API calls 99316->99313 99363 6454a0 99317->99363 99319 624f5c 99319->99179 99319->99180 99521 624d94 99320->99521 99323 624d94 2 API calls 99326 624ced 99323->99326 99324 624d08 99327 624dd0 99324->99327 99325 624cff FreeLibrary 99325->99324 99326->99324 99326->99325 99328 640ff6 Mailbox 59 API calls 99327->99328 99329 624de5 99328->99329 99330 62538e 59 API calls 99329->99330 99331 624df1 _memmove 99330->99331 99332 624e2c 99331->99332 99333 624f21 99331->99333 99334 624ee9 99331->99334 99335 625027 69 API calls 99332->99335 99536 689ba5 95 API calls 99333->99536 99525 624fe9 CreateStreamOnHGlobal 99334->99525 99343 624e35 99335->99343 99338 62506b 74 API calls 99338->99343 99339 624ec9 99339->99187 99341 65dcd0 99342 625045 85 API calls 99341->99342 99344 65dce4 99342->99344 99343->99338 99343->99339 99343->99341 99531 625045 99343->99531 99345 62506b 74 API calls 99344->99345 99345->99339 99347 62507d 99346->99347 99349 65ddf6 99346->99349 99554 645812 99347->99554 99351 689393 99734 6891e9 99351->99734 99353 6893a9 99353->99195 99355 625036 99354->99355 99358 65ddb9 99354->99358 99739 645e90 99355->99739 99357 62503e 99360 624d2e 99359->99360 99361 624d6a LoadLibraryA 99359->99361 99360->99313 99360->99316 99361->99360 99362 624d7b GetProcAddress 99361->99362 99362->99360 99366 6454ac __write 99363->99366 99364 6454bf 99412 648d68 58 API calls __getptd_noexit 99364->99412 99366->99364 99368 6454f0 99366->99368 99367 6454c4 99413 648ff6 9 API calls __fclose_nolock 99367->99413 99382 650738 99368->99382 99371 6454f5 99372 6454fe 99371->99372 99373 64550b 99371->99373 99414 648d68 58 API calls __getptd_noexit 99372->99414 99375 645535 99373->99375 99376 645515 99373->99376 99397 650857 99375->99397 99415 648d68 58 API calls __getptd_noexit 99376->99415 99377 6454cf __write @_EH4_CallFilterFunc@8 99377->99319 99383 650744 __write 99382->99383 99384 649e4b __lock 58 API calls 99383->99384 99395 650752 99384->99395 99385 6507c6 99417 65084e 99385->99417 99386 6507cd 99422 648a5d 58 API calls 2 library calls 99386->99422 99389 650843 __write 99389->99371 99390 6507d4 99390->99385 99423 64a06b InitializeCriticalSectionAndSpinCount 99390->99423 99391 649ed3 __mtinitlocknum 58 API calls 99391->99395 99394 6507fa EnterCriticalSection 99394->99385 99395->99385 99395->99386 99395->99391 99420 646e8d 59 API calls __lock 99395->99420 99421 646ef7 LeaveCriticalSection LeaveCriticalSection _doexit 99395->99421 99406 650877 __wopenfile 99397->99406 99398 650891 99428 648d68 58 API calls __getptd_noexit 99398->99428 99399 650a4c 99399->99398 99404 650aaf 99399->99404 99401 650896 99429 648ff6 9 API calls __fclose_nolock 99401->99429 99403 645540 99416 645562 LeaveCriticalSection LeaveCriticalSection _fprintf 99403->99416 99425 6587f1 99404->99425 99406->99398 99406->99399 99430 643a0b 60 API calls 3 library calls 99406->99430 99408 650a45 99408->99399 99431 643a0b 60 API calls 3 library calls 99408->99431 99410 650a64 99410->99399 99432 643a0b 60 API calls 3 library calls 99410->99432 99412->99367 99413->99377 99414->99377 99415->99377 99416->99377 99424 649fb5 LeaveCriticalSection 99417->99424 99419 650855 99419->99389 99420->99395 99421->99395 99422->99390 99423->99394 99424->99419 99433 657fd5 99425->99433 99427 65880a 99427->99403 99428->99401 99429->99403 99430->99408 99431->99410 99432->99399 99434 657fe1 __write 99433->99434 99435 657ff7 99434->99435 99437 65802d 99434->99437 99518 648d68 58 API calls __getptd_noexit 99435->99518 99444 65809e 99437->99444 99438 657ffc 99519 648ff6 9 API calls __fclose_nolock 99438->99519 99441 658049 99520 658072 LeaveCriticalSection __unlock_fhandle 99441->99520 99443 658006 __write 99443->99427 99445 6580be 99444->99445 99446 64471a __wsopen_nolock 58 API calls 99445->99446 99450 6580da 99446->99450 99447 658211 99448 649006 __invoke_watson 8 API calls 99447->99448 99449 6587f0 99448->99449 99452 657fd5 __wsopen_helper 103 API calls 99449->99452 99450->99447 99451 658114 99450->99451 99458 658137 99450->99458 99453 648d34 __dosmaperr 58 API calls 99451->99453 99454 65880a 99452->99454 99455 658119 99453->99455 99454->99441 99456 648d68 __dosmaperr 58 API calls 99455->99456 99457 658126 99456->99457 99460 648ff6 __fclose_nolock 9 API calls 99457->99460 99459 6581f5 99458->99459 99467 6581d3 99458->99467 99461 648d34 __dosmaperr 58 API calls 99459->99461 99462 658130 99460->99462 99463 6581fa 99461->99463 99462->99441 99464 648d68 __dosmaperr 58 API calls 99463->99464 99465 658207 99464->99465 99466 648ff6 __fclose_nolock 9 API calls 99465->99466 99466->99447 99468 64d4d4 __alloc_osfhnd 61 API calls 99467->99468 99469 6582a1 99468->99469 99470 6582ce 99469->99470 99471 6582ab 99469->99471 99473 657f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 99470->99473 99472 648d34 __dosmaperr 58 API calls 99471->99472 99474 6582b0 99472->99474 99481 6582f0 99473->99481 99475 648d68 __dosmaperr 58 API calls 99474->99475 99478 6582ba 99475->99478 99476 65836e GetFileType 99479 658379 GetLastError 99476->99479 99480 6583bb 99476->99480 99477 65833c GetLastError 99482 648d47 __dosmaperr 58 API calls 99477->99482 99483 648d68 __dosmaperr 58 API calls 99478->99483 99484 648d47 __dosmaperr 58 API calls 99479->99484 99489 64d76a __set_osfhnd 59 API calls 99480->99489 99481->99476 99481->99477 99485 657f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 99481->99485 99486 658361 99482->99486 99483->99462 99487 6583a0 CloseHandle 99484->99487 99488 658331 99485->99488 99491 648d68 __dosmaperr 58 API calls 99486->99491 99487->99486 99490 6583ae 99487->99490 99488->99476 99488->99477 99495 6583d9 99489->99495 99492 648d68 __dosmaperr 58 API calls 99490->99492 99491->99447 99493 6583b3 99492->99493 99493->99486 99494 658594 99494->99447 99497 658767 CloseHandle 99494->99497 99495->99494 99496 651b11 __lseeki64_nolock 60 API calls 99495->99496 99512 65845a 99495->99512 99498 658443 99496->99498 99499 657f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 99497->99499 99501 648d34 __dosmaperr 58 API calls 99498->99501 99498->99512 99500 65878e 99499->99500 99502 658796 GetLastError 99500->99502 99503 6587c2 99500->99503 99501->99512 99504 648d47 __dosmaperr 58 API calls 99502->99504 99503->99447 99508 6587a2 99504->99508 99505 650d2d __close_nolock 61 API calls 99505->99512 99506 6510ab 70 API calls __read_nolock 99506->99512 99507 65848c 99510 6599f2 __chsize_nolock 82 API calls 99507->99510 99507->99512 99509 64d67d __free_osfhnd 59 API calls 99508->99509 99509->99503 99510->99507 99511 64dac6 __write 78 API calls 99511->99512 99512->99494 99512->99505 99512->99506 99512->99507 99512->99511 99513 658611 99512->99513 99516 651b11 60 API calls __lseeki64_nolock 99512->99516 99514 650d2d __close_nolock 61 API calls 99513->99514 99515 658618 99514->99515 99517 648d68 __dosmaperr 58 API calls 99515->99517 99516->99512 99517->99447 99518->99438 99519->99443 99520->99443 99522 624ce1 99521->99522 99523 624d9d LoadLibraryA 99521->99523 99522->99323 99522->99326 99523->99522 99524 624dae GetProcAddress 99523->99524 99524->99522 99526 625003 FindResourceExW 99525->99526 99527 625020 99525->99527 99526->99527 99528 65dd5c LoadResource 99526->99528 99527->99332 99528->99527 99529 65dd71 SizeofResource 99528->99529 99529->99527 99530 65dd85 LockResource 99529->99530 99530->99527 99532 65ddd4 99531->99532 99533 625054 99531->99533 99537 645a7d 99533->99537 99535 625062 99535->99343 99536->99332 99538 645a89 __write 99537->99538 99539 645a9b 99538->99539 99541 645ac1 99538->99541 99550 648d68 58 API calls __getptd_noexit 99539->99550 99543 646e4e __lock_file 59 API calls 99541->99543 99542 645aa0 99551 648ff6 9 API calls __fclose_nolock 99542->99551 99545 645ac7 99543->99545 99552 6459ee 83 API calls 4 library calls 99545->99552 99547 645ad6 99553 645af8 LeaveCriticalSection LeaveCriticalSection _fprintf 99547->99553 99549 645aab __write 99549->99535 99550->99542 99551->99549 99552->99547 99553->99549 99557 64582d 99554->99557 99556 62508e 99556->99351 99558 645839 __write 99557->99558 99559 64587c 99558->99559 99560 64584f _memset 99558->99560 99561 645874 __write 99558->99561 99562 646e4e __lock_file 59 API calls 99559->99562 99584 648d68 58 API calls __getptd_noexit 99560->99584 99561->99556 99563 645882 99562->99563 99570 64564d 99563->99570 99566 645869 99585 648ff6 9 API calls __fclose_nolock 99566->99585 99571 645683 99570->99571 99574 645668 _memset 99570->99574 99586 6458b6 LeaveCriticalSection LeaveCriticalSection _fprintf 99571->99586 99572 645673 99675 648d68 58 API calls __getptd_noexit 99572->99675 99574->99571 99574->99572 99577 6456c3 99574->99577 99577->99571 99578 6457d4 _memset 99577->99578 99579 644916 __flush 58 API calls 99577->99579 99587 6510ab 99577->99587 99655 650df7 99577->99655 99677 650f18 58 API calls 4 library calls 99577->99677 99678 648d68 58 API calls __getptd_noexit 99578->99678 99579->99577 99583 645678 99676 648ff6 9 API calls __fclose_nolock 99583->99676 99584->99566 99585->99561 99586->99561 99588 6510e3 99587->99588 99589 6510cc 99587->99589 99591 65181b 99588->99591 99596 65111d 99588->99596 99679 648d34 58 API calls __getptd_noexit 99589->99679 99695 648d34 58 API calls __getptd_noexit 99591->99695 99593 6510d1 99680 648d68 58 API calls __getptd_noexit 99593->99680 99594 651820 99696 648d68 58 API calls __getptd_noexit 99594->99696 99597 651125 99596->99597 99604 65113c 99596->99604 99681 648d34 58 API calls __getptd_noexit 99597->99681 99600 651131 99697 648ff6 9 API calls __fclose_nolock 99600->99697 99601 65112a 99682 648d68 58 API calls __getptd_noexit 99601->99682 99603 651151 99683 648d34 58 API calls __getptd_noexit 99603->99683 99604->99603 99607 65116b 99604->99607 99608 651189 99604->99608 99635 6510d8 99604->99635 99607->99603 99610 651176 99607->99610 99684 648a5d 58 API calls 2 library calls 99608->99684 99612 655ebb __stbuf 58 API calls 99610->99612 99611 651199 99613 6511a1 99611->99613 99614 6511bc 99611->99614 99615 65128a 99612->99615 99685 648d68 58 API calls __getptd_noexit 99613->99685 99687 651b11 60 API calls 2 library calls 99614->99687 99617 651303 ReadFile 99615->99617 99622 6512a0 GetConsoleMode 99615->99622 99620 651325 99617->99620 99621 6517e3 GetLastError 99617->99621 99619 6511a6 99686 648d34 58 API calls __getptd_noexit 99619->99686 99620->99621 99628 6512f5 99620->99628 99624 6512e3 99621->99624 99625 6517f0 99621->99625 99626 6512b4 99622->99626 99627 651300 99622->99627 99642 6512e9 99624->99642 99688 648d47 58 API calls __dosmaperr 99624->99688 99693 648d68 58 API calls __getptd_noexit 99625->99693 99626->99627 99630 6512ba ReadConsoleW 99626->99630 99627->99617 99637 65135a 99628->99637 99638 6515c7 99628->99638 99628->99642 99630->99628 99631 6512dd GetLastError 99630->99631 99631->99624 99633 6517f5 99694 648d34 58 API calls __getptd_noexit 99633->99694 99635->99577 99636 642f95 _free 58 API calls 99636->99635 99639 651447 99637->99639 99641 6513c6 ReadFile 99637->99641 99638->99642 99645 6516cd ReadFile 99638->99645 99639->99642 99644 6514f4 99639->99644 99648 651504 99639->99648 99653 6514b4 MultiByteToWideChar 99639->99653 99643 6513e7 GetLastError 99641->99643 99649 6513f1 99641->99649 99642->99635 99642->99636 99643->99649 99690 648d68 58 API calls __getptd_noexit 99644->99690 99646 6516f0 GetLastError 99645->99646 99651 6516fe 99645->99651 99646->99651 99648->99653 99691 651b11 60 API calls 2 library calls 99648->99691 99649->99637 99689 651b11 60 API calls 2 library calls 99649->99689 99651->99638 99692 651b11 60 API calls 2 library calls 99651->99692 99653->99631 99653->99642 99656 650e02 99655->99656 99660 650e17 99655->99660 99731 648d68 58 API calls __getptd_noexit 99656->99731 99658 650e07 99732 648ff6 9 API calls __fclose_nolock 99658->99732 99661 650e4c 99660->99661 99669 650e12 99660->99669 99733 656234 58 API calls __malloc_crt 99660->99733 99663 644916 __flush 58 API calls 99661->99663 99664 650e60 99663->99664 99698 650f97 99664->99698 99666 650e67 99667 644916 __flush 58 API calls 99666->99667 99666->99669 99668 650e8a 99667->99668 99668->99669 99670 644916 __flush 58 API calls 99668->99670 99669->99577 99671 650e96 99670->99671 99671->99669 99672 644916 __flush 58 API calls 99671->99672 99673 650ea3 99672->99673 99674 644916 __flush 58 API calls 99673->99674 99674->99669 99675->99583 99676->99571 99677->99577 99678->99583 99679->99593 99680->99635 99681->99601 99682->99600 99683->99601 99684->99611 99685->99619 99686->99635 99687->99610 99688->99642 99689->99649 99690->99642 99691->99653 99692->99651 99693->99633 99694->99642 99695->99594 99696->99600 99697->99635 99699 650fa3 __write 99698->99699 99700 650fc7 99699->99700 99701 650fb0 99699->99701 99703 65108b 99700->99703 99706 650fdb 99700->99706 99702 648d34 __dosmaperr 58 API calls 99701->99702 99705 650fb5 99702->99705 99704 648d34 __dosmaperr 58 API calls 99703->99704 99709 650ffe 99704->99709 99710 648d68 __dosmaperr 58 API calls 99705->99710 99707 651006 99706->99707 99708 650ff9 99706->99708 99712 651013 99707->99712 99713 651028 99707->99713 99711 648d34 __dosmaperr 58 API calls 99708->99711 99717 648d68 __dosmaperr 58 API calls 99709->99717 99714 650fbc __write 99710->99714 99711->99709 99715 648d34 __dosmaperr 58 API calls 99712->99715 99716 64d446 ___lock_fhandle 59 API calls 99713->99716 99714->99666 99718 651018 99715->99718 99719 65102e 99716->99719 99720 651020 99717->99720 99721 648d68 __dosmaperr 58 API calls 99718->99721 99722 651054 99719->99722 99723 651041 99719->99723 99726 648ff6 __fclose_nolock 9 API calls 99720->99726 99721->99720 99724 648d68 __dosmaperr 58 API calls 99722->99724 99725 6510ab __read_nolock 70 API calls 99723->99725 99727 651059 99724->99727 99728 65104d 99725->99728 99726->99714 99729 648d34 __dosmaperr 58 API calls 99727->99729 99730 651083 __read LeaveCriticalSection 99728->99730 99729->99728 99730->99714 99731->99658 99732->99669 99733->99661 99737 64543a GetSystemTimeAsFileTime 99734->99737 99736 6891f8 99736->99353 99738 645468 __aulldiv 99737->99738 99738->99736 99740 645e9c __write 99739->99740 99741 645ec3 99740->99741 99742 645eae 99740->99742 99744 646e4e __lock_file 59 API calls 99741->99744 99753 648d68 58 API calls __getptd_noexit 99742->99753 99746 645ec9 99744->99746 99745 645eb3 99754 648ff6 9 API calls __fclose_nolock 99745->99754 99755 645b00 67 API calls 6 library calls 99746->99755 99749 645ed4 99756 645ef4 LeaveCriticalSection LeaveCriticalSection _fprintf 99749->99756 99751 645ee6 99752 645ebe __write 99751->99752 99752->99357 99753->99745 99754->99752 99755->99749 99756->99751 99875 621066 99880 62f8cf 99875->99880 99877 62106c 99913 642f80 99877->99913 99881 62f8f0 99880->99881 99916 640143 99881->99916 99885 62f937 99886 6277c7 59 API calls 99885->99886 99887 62f941 99886->99887 99888 6277c7 59 API calls 99887->99888 99889 62f94b 99888->99889 99890 6277c7 59 API calls 99889->99890 99891 62f955 99890->99891 99892 6277c7 59 API calls 99891->99892 99893 62f993 99892->99893 99894 6277c7 59 API calls 99893->99894 99895 62fa5e 99894->99895 99926 6360e7 99895->99926 99899 62fa90 99900 6277c7 59 API calls 99899->99900 99901 62fa9a 99900->99901 99954 63ffde 99901->99954 99903 62fae1 99904 62faf1 GetStdHandle 99903->99904 99905 6649d5 99904->99905 99906 62fb3d 99904->99906 99905->99906 99908 6649de 99905->99908 99907 62fb45 OleInitialize 99906->99907 99907->99877 99961 686dda 64 API calls Mailbox 99908->99961 99910 6649e5 99962 6874a9 CreateThread 99910->99962 99912 6649f1 CloseHandle 99912->99907 99975 642e84 99913->99975 99915 621076 99963 64021c 99916->99963 99919 64021c 59 API calls 99920 640185 99919->99920 99921 6277c7 59 API calls 99920->99921 99922 640191 99921->99922 99923 627d2c 59 API calls 99922->99923 99924 62f8f6 99923->99924 99925 6403a2 6 API calls 99924->99925 99925->99885 99927 6277c7 59 API calls 99926->99927 99928 6360f7 99927->99928 99929 6277c7 59 API calls 99928->99929 99930 6360ff 99929->99930 99970 635bfd 99930->99970 99933 635bfd 59 API calls 99934 63610f 99933->99934 99935 6277c7 59 API calls 99934->99935 99936 63611a 99935->99936 99937 640ff6 Mailbox 59 API calls 99936->99937 99938 62fa68 99937->99938 99939 636259 99938->99939 99940 636267 99939->99940 99941 6277c7 59 API calls 99940->99941 99942 636272 99941->99942 99943 6277c7 59 API calls 99942->99943 99944 63627d 99943->99944 99945 6277c7 59 API calls 99944->99945 99946 636288 99945->99946 99947 6277c7 59 API calls 99946->99947 99948 636293 99947->99948 99949 635bfd 59 API calls 99948->99949 99950 63629e 99949->99950 99951 640ff6 Mailbox 59 API calls 99950->99951 99952 6362a5 RegisterWindowMessageW 99951->99952 99952->99899 99955 675cc3 99954->99955 99956 63ffee 99954->99956 99973 689d71 60 API calls 99955->99973 99957 640ff6 Mailbox 59 API calls 99956->99957 99959 63fff6 99957->99959 99959->99903 99960 675cce 99961->99910 99962->99912 99974 68748f 65 API calls 99962->99974 99964 6277c7 59 API calls 99963->99964 99965 640227 99964->99965 99966 6277c7 59 API calls 99965->99966 99967 64022f 99966->99967 99968 6277c7 59 API calls 99967->99968 99969 64017b 99968->99969 99969->99919 99971 6277c7 59 API calls 99970->99971 99972 635c05 99971->99972 99972->99933 99973->99960 99976 642e90 __write 99975->99976 99983 643457 99976->99983 99982 642eb7 __write 99982->99915 99984 649e4b __lock 58 API calls 99983->99984 99985 642e99 99984->99985 99986 642ec8 DecodePointer DecodePointer 99985->99986 99987 642ef5 99986->99987 99988 642ea5 99986->99988 99987->99988 100000 6489e4 59 API calls 2 library calls 99987->100000 99997 642ec2 99988->99997 99990 642f58 EncodePointer EncodePointer 99990->99988 99991 642f07 99991->99990 99992 642f2c 99991->99992 100001 648aa4 61 API calls 2 library calls 99991->100001 99992->99988 99996 642f46 EncodePointer 99992->99996 100002 648aa4 61 API calls 2 library calls 99992->100002 99995 642f40 99995->99988 99995->99996 99996->99990 100003 643460 99997->100003 100000->99991 100001->99992 100002->99995 100006 649fb5 LeaveCriticalSection 100003->100006 100005 642ec7 100005->99982 100006->100005 100007 621016 100012 624ad2 100007->100012 100010 642f80 __cinit 67 API calls 100011 621025 100010->100011 100013 640ff6 Mailbox 59 API calls 100012->100013 100014 624ada 100013->100014 100016 62101b 100014->100016 100019 624a94 100014->100019 100016->100010 100020 624a9d 100019->100020 100022 624aaf 100019->100022 100021 642f80 __cinit 67 API calls 100020->100021 100021->100022 100023 624afe 100022->100023 100024 6277c7 59 API calls 100023->100024 100025 624b16 GetVersionExW 100024->100025 100026 627d2c 59 API calls 100025->100026 100027 624b59 100026->100027 100028 627e8c 59 API calls 100027->100028 100032 624b86 100027->100032 100029 624b7a 100028->100029 100051 627886 100029->100051 100031 624bf1 GetCurrentProcess IsWow64Process 100034 624c0a 100031->100034 100032->100031 100033 65dc8d 100032->100033 100035 624c20 100034->100035 100036 624c89 GetSystemInfo 100034->100036 100047 624c95 100035->100047 100037 624c56 100036->100037 100037->100016 100040 624c32 100043 624c95 2 API calls 100040->100043 100041 624c7d GetSystemInfo 100042 624c47 100041->100042 100042->100037 100045 624c4d FreeLibrary 100042->100045 100044 624c3a GetNativeSystemInfo 100043->100044 100044->100042 100045->100037 100048 624c2e 100047->100048 100049 624c9e LoadLibraryA 100047->100049 100048->100040 100048->100041 100049->100048 100050 624caf GetProcAddress 100049->100050 100050->100048 100052 627894 100051->100052 100053 627e8c 59 API calls 100052->100053 100054 6278a4 100053->100054 100054->100032 100055 621055 100060 622649 100055->100060 100058 642f80 __cinit 67 API calls 100059 621064 100058->100059 100061 6277c7 59 API calls 100060->100061 100062 6226b7 100061->100062 100067 623582 100062->100067 100065 622754 100066 62105a 100065->100066 100070 623416 59 API calls 2 library calls 100065->100070 100066->100058 100071 6235b0 100067->100071 100070->100065 100072 6235bd 100071->100072 100073 6235a1 100071->100073 100072->100073 100074 6235c4 RegOpenKeyExW 100072->100074 100073->100065 100074->100073 100075 6235de RegQueryValueExW 100074->100075 100076 623614 RegCloseKey 100075->100076 100077 6235ff 100075->100077 100076->100073 100077->100076 100078 1ec295b 100081 1ec25d0 100078->100081 100080 1ec29a7 100094 1ec0000 100081->100094 100084 1ec26a0 CreateFileW 100087 1ec26ad 100084->100087 100091 1ec266f 100084->100091 100085 1ec26c9 VirtualAlloc 100086 1ec26ea ReadFile 100085->100086 100085->100087 100086->100087 100088 1ec2708 VirtualAlloc 100086->100088 100089 1ec28bc VirtualFree 100087->100089 100090 1ec28ca 100087->100090 100088->100087 100088->100091 100089->100090 100090->100080 100091->100085 100091->100087 100092 1ec27d0 FindCloseChangeNotification 100091->100092 100093 1ec27e0 VirtualFree 100091->100093 100097 1ec34e0 GetPEB 100091->100097 100092->100091 100093->100091 100099 1ec3480 GetPEB 100094->100099 100096 1ec068b 100096->100091 100098 1ec350a 100097->100098 100098->100084 100100 1ec34aa 100099->100100 100100->100096 100101 647e93 100102 647e9f __write 100101->100102 100138 64a048 GetStartupInfoW 100102->100138 100105 647ea4 100140 648dbc GetProcessHeap 100105->100140 100106 647efc 100107 647f07 100106->100107 100223 647fe3 58 API calls 3 library calls 100106->100223 100141 649d26 100107->100141 100110 647f0d 100111 647f18 __RTC_Initialize 100110->100111 100224 647fe3 58 API calls 3 library calls 100110->100224 100162 64d812 100111->100162 100114 647f27 100115 647f33 GetCommandLineW 100114->100115 100225 647fe3 58 API calls 3 library calls 100114->100225 100181 655173 GetEnvironmentStringsW 100115->100181 100118 647f32 100118->100115 100121 647f4d 100122 647f58 100121->100122 100226 6432f5 58 API calls 3 library calls 100121->100226 100191 654fa8 100122->100191 100125 647f5e 100126 647f69 100125->100126 100227 6432f5 58 API calls 3 library calls 100125->100227 100205 64332f 100126->100205 100129 647f71 100130 647f7c __wwincmdln 100129->100130 100228 6432f5 58 API calls 3 library calls 100129->100228 100211 62492e 100130->100211 100133 647f90 100134 647f9f 100133->100134 100229 643598 58 API calls _doexit 100133->100229 100230 643320 58 API calls _doexit 100134->100230 100137 647fa4 __write 100139 64a05e 100138->100139 100139->100105 100140->100106 100231 6433c7 36 API calls 2 library calls 100141->100231 100143 649d2b 100232 649f7c InitializeCriticalSectionAndSpinCount __getstream 100143->100232 100145 649d30 100146 649d34 100145->100146 100234 649fca TlsAlloc 100145->100234 100233 649d9c 61 API calls 2 library calls 100146->100233 100149 649d39 100149->100110 100150 649d46 100150->100146 100151 649d51 100150->100151 100235 648a15 100151->100235 100154 649d93 100243 649d9c 61 API calls 2 library calls 100154->100243 100157 649d72 100157->100154 100159 649d78 100157->100159 100158 649d98 100158->100110 100242 649c73 58 API calls 4 library calls 100159->100242 100161 649d80 GetCurrentThreadId 100161->100110 100163 64d81e __write 100162->100163 100164 649e4b __lock 58 API calls 100163->100164 100165 64d825 100164->100165 100166 648a15 __calloc_crt 58 API calls 100165->100166 100167 64d836 100166->100167 100168 64d8a1 GetStartupInfoW 100167->100168 100169 64d841 __write @_EH4_CallFilterFunc@8 100167->100169 100175 64d8b6 100168->100175 100178 64d9e5 100168->100178 100169->100114 100170 64daad 100257 64dabd LeaveCriticalSection _doexit 100170->100257 100172 648a15 __calloc_crt 58 API calls 100172->100175 100173 64da32 GetStdHandle 100173->100178 100174 64da45 GetFileType 100174->100178 100175->100172 100176 64d904 100175->100176 100175->100178 100177 64d938 GetFileType 100176->100177 100176->100178 100255 64a06b InitializeCriticalSectionAndSpinCount 100176->100255 100177->100176 100178->100170 100178->100173 100178->100174 100256 64a06b InitializeCriticalSectionAndSpinCount 100178->100256 100182 655184 100181->100182 100183 647f43 100181->100183 100258 648a5d 58 API calls 2 library calls 100182->100258 100187 654d6b GetModuleFileNameW 100183->100187 100185 6551aa _memmove 100186 6551c0 FreeEnvironmentStringsW 100185->100186 100186->100183 100188 654d9f _wparse_cmdline 100187->100188 100190 654ddf _wparse_cmdline 100188->100190 100259 648a5d 58 API calls 2 library calls 100188->100259 100190->100121 100192 654fc1 __NMSG_WRITE 100191->100192 100193 654fb9 100191->100193 100194 648a15 __calloc_crt 58 API calls 100192->100194 100193->100125 100198 654fea __NMSG_WRITE 100194->100198 100195 655041 100196 642f95 _free 58 API calls 100195->100196 100196->100193 100197 648a15 __calloc_crt 58 API calls 100197->100198 100198->100193 100198->100195 100198->100197 100199 655066 100198->100199 100202 65507d 100198->100202 100260 654857 58 API calls 2 library calls 100198->100260 100200 642f95 _free 58 API calls 100199->100200 100200->100193 100261 649006 IsProcessorFeaturePresent 100202->100261 100204 655089 100204->100125 100206 64333b __IsNonwritableInCurrentImage 100205->100206 100276 64a711 100206->100276 100208 643359 __initterm_e 100209 642f80 __cinit 67 API calls 100208->100209 100210 643378 _doexit __IsNonwritableInCurrentImage 100208->100210 100209->100210 100210->100129 100212 624948 100211->100212 100222 6249e7 100211->100222 100213 624982 IsThemeActive 100212->100213 100279 6435ac 100213->100279 100217 6249ae 100291 624a5b SystemParametersInfoW SystemParametersInfoW 100217->100291 100219 6249ba 100292 623b4c 100219->100292 100222->100133 100223->100107 100224->100111 100225->100118 100229->100134 100230->100137 100231->100143 100232->100145 100233->100149 100234->100150 100237 648a1c 100235->100237 100238 648a57 100237->100238 100240 648a3a 100237->100240 100244 655446 100237->100244 100238->100154 100241 64a026 TlsSetValue 100238->100241 100240->100237 100240->100238 100252 64a372 Sleep 100240->100252 100241->100157 100242->100161 100243->100158 100245 655451 100244->100245 100250 65546c 100244->100250 100246 65545d 100245->100246 100245->100250 100253 648d68 58 API calls __getptd_noexit 100246->100253 100248 65547c HeapAlloc 100249 655462 100248->100249 100248->100250 100249->100237 100250->100248 100250->100249 100254 6435e1 DecodePointer 100250->100254 100252->100240 100253->100249 100254->100250 100255->100176 100256->100178 100257->100169 100258->100185 100259->100190 100260->100198 100262 649011 100261->100262 100267 648e99 100262->100267 100266 64902c 100266->100204 100268 648eb3 _memset ___raise_securityfailure 100267->100268 100269 648ed3 IsDebuggerPresent 100268->100269 100275 64a395 SetUnhandledExceptionFilter UnhandledExceptionFilter 100269->100275 100271 648f97 ___raise_securityfailure 100272 64c836 __write_nolock 6 API calls 100271->100272 100273 648fba 100272->100273 100274 64a380 GetCurrentProcess TerminateProcess 100273->100274 100274->100266 100275->100271 100277 64a714 EncodePointer 100276->100277 100277->100277 100278 64a72e 100277->100278 100278->100208 100280 649e4b __lock 58 API calls 100279->100280 100281 6435b7 DecodePointer EncodePointer 100280->100281 100344 649fb5 LeaveCriticalSection 100281->100344 100283 6249a7 100284 643614 100283->100284 100285 64361e 100284->100285 100286 643638 100284->100286 100285->100286 100345 648d68 58 API calls __getptd_noexit 100285->100345 100286->100217 100288 643628 100346 648ff6 9 API calls __fclose_nolock 100288->100346 100290 643633 100290->100217 100291->100219 100293 623b59 __write_nolock 100292->100293 100294 6277c7 59 API calls 100293->100294 100295 623b63 GetCurrentDirectoryW 100294->100295 100347 623778 100295->100347 100344->100283 100345->100288 100346->100290 100348 6277c7 59 API calls 100347->100348 100349 62378e 100348->100349 100555 623d43 100349->100555 100351 6237ac 100352 624864 61 API calls 100351->100352 100353 6237c0 100352->100353 100354 627f41 59 API calls 100353->100354 100355 6237cd 100354->100355 100356 624f3d 136 API calls 100355->100356 100357 6237e6 100356->100357 100358 65d3ae 100357->100358 100359 6237ee Mailbox 100357->100359 100601 6897e5 100358->100601 100363 6281a7 59 API calls 100359->100363 100362 65d3cd 100365 642f95 _free 58 API calls 100362->100365 100366 623801 100363->100366 100364 624faa 84 API calls 100364->100362 100367 65d3da 100365->100367 100569 6293ea 100366->100569 100369 624faa 84 API calls 100367->100369 100371 65d3e3 100369->100371 100375 623ee2 59 API calls 100371->100375 100372 627f41 59 API calls 100373 62381a 100372->100373 100572 628620 100373->100572 100377 65d3fe 100375->100377 100376 62382c Mailbox 100378 627f41 59 API calls 100376->100378 100380 623ee2 59 API calls 100377->100380 100379 623852 100378->100379 100382 628620 69 API calls 100379->100382 100381 65d41a 100380->100381 100383 624864 61 API calls 100381->100383 100385 623861 Mailbox 100382->100385 100384 65d43f 100383->100384 100386 623ee2 59 API calls 100384->100386 100388 6277c7 59 API calls 100385->100388 100390 62387f 100388->100390 100576 623ee2 100390->100576 100556 623d50 __write_nolock 100555->100556 100557 627d2c 59 API calls 100556->100557 100562 623eb6 Mailbox 100556->100562 100559 623d82 100557->100559 100558 627b52 59 API calls 100558->100559 100559->100558 100567 623db8 Mailbox 100559->100567 100560 627b52 59 API calls 100560->100567 100561 623e89 100561->100562 100563 627f41 59 API calls 100561->100563 100562->100351 100565 623eaa 100563->100565 100564 627f41 59 API calls 100564->100567 100566 623f84 59 API calls 100565->100566 100566->100562 100567->100560 100567->100561 100567->100562 100567->100564 100636 623f84 100567->100636 100570 640ff6 Mailbox 59 API calls 100569->100570 100571 62380d 100570->100571 100571->100372 100573 62862b 100572->100573 100574 628652 100573->100574 100642 628b13 69 API calls Mailbox 100573->100642 100574->100376 100577 623f05 100576->100577 100578 623eec 100576->100578 100602 625045 85 API calls 100601->100602 100603 689854 100602->100603 100604 6899be 96 API calls 100603->100604 100605 689866 100604->100605 100606 62506b 74 API calls 100605->100606 100635 65d3c1 100605->100635 100607 689881 100606->100607 100608 62506b 74 API calls 100607->100608 100609 689891 100608->100609 100610 62506b 74 API calls 100609->100610 100611 6898ac 100610->100611 100612 62506b 74 API calls 100611->100612 100613 6898c7 100612->100613 100614 625045 85 API calls 100613->100614 100615 6898de 100614->100615 100616 64594c __crtCompareStringA_stat 58 API calls 100615->100616 100617 6898e5 100616->100617 100618 64594c __crtCompareStringA_stat 58 API calls 100617->100618 100635->100362 100635->100364 100637 623f92 100636->100637 100641 623fb4 _memmove 100636->100641 100639 640ff6 Mailbox 59 API calls 100637->100639 100638 640ff6 Mailbox 59 API calls 100640 623fc8 100638->100640 100639->100641 100640->100567 100641->100638 100642->100574 100934 62568a 100935 625c18 59 API calls 100934->100935 100936 62569c 100935->100936 100937 625632 61 API calls 100936->100937 100938 6256aa 100937->100938 100940 6256ba Mailbox 100938->100940 100941 6281c1 61 API calls Mailbox 100938->100941 100941->100940 100942 62e70b 100945 62d260 100942->100945 100944 62e719 100946 62d27d 100945->100946 100974 62d4dd 100945->100974 100947 662b0a 100946->100947 100948 662abb 100946->100948 100977 62d2a4 100946->100977 100989 69a6fb 341 API calls __cinit 100947->100989 100950 662abe 100948->100950 100959 662ad9 100948->100959 100952 662aca 100950->100952 100950->100977 100987 69ad0f 341 API calls 100952->100987 100953 642f80 __cinit 67 API calls 100953->100977 100956 62d594 100981 628bb2 68 API calls 100956->100981 100957 662cdf 100957->100957 100958 62d6ab 100958->100944 100959->100974 100988 69b1b7 341 API calls 3 library calls 100959->100988 100963 662c26 100993 69aa66 89 API calls 100963->100993 100964 62d5a3 100964->100944 100967 628620 69 API calls 100967->100977 100974->100958 100994 68a0b5 89 API calls 4 library calls 100974->100994 100975 62a000 341 API calls 100975->100977 100976 6281a7 59 API calls 100976->100977 100977->100953 100977->100956 100977->100958 100977->100963 100977->100967 100977->100974 100977->100975 100977->100976 100979 6288a0 68 API calls __cinit 100977->100979 100980 6286a2 68 API calls 100977->100980 100982 62859a 68 API calls 100977->100982 100983 62d0dc 341 API calls 100977->100983 100984 629f3a 59 API calls Mailbox 100977->100984 100985 62d060 89 API calls 100977->100985 100986 62cedd 341 API calls 100977->100986 100990 628bb2 68 API calls 100977->100990 100991 629e9c 60 API calls Mailbox 100977->100991 100992 676d03 60 API calls 100977->100992 100979->100977 100980->100977 100981->100964 100982->100977 100983->100977 100984->100977 100985->100977 100986->100977 100987->100958 100988->100974 100989->100977 100990->100977 100991->100977 100992->100977 100993->100974 100994->100957 100995 1ec23b0 100996 1ec0000 GetPEB 100995->100996 100997 1ec2457 100996->100997 101009 1ec22a0 100997->101009 101010 1ec22a9 Sleep 101009->101010 101011 1ec22b7 101010->101011 101012 62107d 101017 6271eb 101012->101017 101014 62108c 101015 642f80 __cinit 67 API calls 101014->101015 101016 621096 101015->101016 101018 6271fb __write_nolock 101017->101018 101019 6277c7 59 API calls 101018->101019 101020 6272b1 101019->101020 101021 624864 61 API calls 101020->101021 101022 6272ba 101021->101022 101048 64074f 101022->101048 101025 627e0b 59 API calls 101026 6272d3 101025->101026 101027 623f84 59 API calls 101026->101027 101028 6272e2 101027->101028 101029 6277c7 59 API calls 101028->101029 101030 6272eb 101029->101030 101031 627eec 59 API calls 101030->101031 101032 6272f4 RegOpenKeyExW 101031->101032 101033 65ecda RegQueryValueExW 101032->101033 101037 627316 Mailbox 101032->101037 101034 65ecf7 101033->101034 101035 65ed6c RegCloseKey 101033->101035 101036 640ff6 Mailbox 59 API calls 101034->101036 101035->101037 101046 65ed7e _wcscat Mailbox __NMSG_WRITE 101035->101046 101038 65ed10 101036->101038 101037->101014 101039 62538e 59 API calls 101038->101039 101040 65ed1b RegQueryValueExW 101039->101040 101041 65ed38 101040->101041 101043 65ed52 101040->101043 101042 627d2c 59 API calls 101041->101042 101042->101043 101043->101035 101044 627f41 59 API calls 101044->101046 101045 623f84 59 API calls 101045->101046 101046->101037 101046->101044 101046->101045 101047 627b52 59 API calls 101046->101047 101047->101046 101049 651b90 __write_nolock 101048->101049 101050 64075c GetFullPathNameW 101049->101050 101051 64077e 101050->101051 101052 627d2c 59 API calls 101051->101052 101053 6272c5 101052->101053 101053->101025

                                            Control-flow Graph

                                            APIs
                                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00623B7A
                                            • IsDebuggerPresent.KERNEL32 ref: 00623B8C
                                            • GetFullPathNameW.KERNEL32(00007FFF,?,?,006E62F8,006E62E0,?,?), ref: 00623BFD
                                              • Part of subcall function 00627D2C: _memmove.LIBCMT ref: 00627D66
                                              • Part of subcall function 00630A8D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00623C26,006E62F8,?,?,?), ref: 00630ACE
                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00623C81
                                            • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,006D93F0,00000010), ref: 0065D4BC
                                            • SetCurrentDirectoryW.KERNEL32(?,006E62F8,?,?,?), ref: 0065D4F4
                                            • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,006D5D40,006E62F8,?,?,?), ref: 0065D57A
                                            • ShellExecuteW.SHELL32(00000000,?,?), ref: 0065D581
                                              • Part of subcall function 00623A58: GetSysColorBrush.USER32(0000000F), ref: 00623A62
                                              • Part of subcall function 00623A58: LoadCursorW.USER32(00000000,00007F00), ref: 00623A71
                                              • Part of subcall function 00623A58: LoadIconW.USER32(00000063), ref: 00623A88
                                              • Part of subcall function 00623A58: LoadIconW.USER32(000000A4), ref: 00623A9A
                                              • Part of subcall function 00623A58: LoadIconW.USER32(000000A2), ref: 00623AAC
                                              • Part of subcall function 00623A58: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00623AD2
                                              • Part of subcall function 00623A58: RegisterClassExW.USER32(?), ref: 00623B28
                                              • Part of subcall function 006239E7: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00623A15
                                              • Part of subcall function 006239E7: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00623A36
                                              • Part of subcall function 006239E7: ShowWindow.USER32(00000000,?,?), ref: 00623A4A
                                              • Part of subcall function 006239E7: ShowWindow.USER32(00000000,?,?), ref: 00623A53
                                              • Part of subcall function 006243DB: _memset.LIBCMT ref: 00624401
                                              • Part of subcall function 006243DB: Shell_NotifyIconW.SHELL32(00000000,?), ref: 006244A6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                            • String ID: This is a third-party compiled AutoIt script.$runas$%k
                                            • API String ID: 529118366-1914796069
                                            • Opcode ID: 1272567ae39ffedfdc1833c9fb47935fab78942844c00f387c08107f30a2a139
                                            • Instruction ID: b68db007986ceca37184697c6e6ed0f113986d525b6cef67b9281caa7c270131
                                            • Opcode Fuzzy Hash: 1272567ae39ffedfdc1833c9fb47935fab78942844c00f387c08107f30a2a139
                                            • Instruction Fuzzy Hash: 9A511530E047A8AECF11ABB4EC45EED7B7BAB15340F004169F551AA2A1DB345706CF25

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 983 624fe9-625001 CreateStreamOnHGlobal 984 625003-62501a FindResourceExW 983->984 985 625021-625026 983->985 986 625020 984->986 987 65dd5c-65dd6b LoadResource 984->987 986->985 987->986 988 65dd71-65dd7f SizeofResource 987->988 988->986 989 65dd85-65dd90 LockResource 988->989 989->986 990 65dd96-65ddb4 989->990 990->986
                                            APIs
                                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00624EEE,?,?,00000000,00000000), ref: 00624FF9
                                            • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00624EEE,?,?,00000000,00000000), ref: 00625010
                                            • LoadResource.KERNEL32(?,00000000,?,?,00624EEE,?,?,00000000,00000000,?,?,?,?,?,?,00624F8F), ref: 0065DD60
                                            • SizeofResource.KERNEL32(?,00000000,?,?,00624EEE,?,?,00000000,00000000,?,?,?,?,?,?,00624F8F), ref: 0065DD75
                                            • LockResource.KERNEL32(Nb,?,?,00624EEE,?,?,00000000,00000000,?,?,?,?,?,?,00624F8F,00000000), ref: 0065DD88
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                            • String ID: SCRIPT$Nb
                                            • API String ID: 3051347437-1100917352
                                            • Opcode ID: 550bb2abbf84832286b1ef024f3be3d6b3062e772c37ec8ccc7d3cb302f3fc4f
                                            • Instruction ID: dd3115b2b64bf8cdf0e5313344a0894b2e8f516a523734da64d3b58fd54baca7
                                            • Opcode Fuzzy Hash: 550bb2abbf84832286b1ef024f3be3d6b3062e772c37ec8ccc7d3cb302f3fc4f
                                            • Instruction Fuzzy Hash: B5115E75240B00AFD7319BA5EC58FA77BBAEBCAB11F104168F406C6660DB71EC008A61

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1047 624afe-624b5e call 6277c7 GetVersionExW call 627d2c 1052 624b64 1047->1052 1053 624c69-624c6b 1047->1053 1055 624b67-624b6c 1052->1055 1054 65db90-65db9c 1053->1054 1056 65db9d-65dba1 1054->1056 1057 624b72 1055->1057 1058 624c70-624c71 1055->1058 1060 65dba4-65dbb0 1056->1060 1061 65dba3 1056->1061 1059 624b73-624baa call 627e8c call 627886 1057->1059 1058->1059 1069 624bb0-624bb1 1059->1069 1070 65dc8d-65dc90 1059->1070 1060->1056 1063 65dbb2-65dbb7 1060->1063 1061->1060 1063->1055 1065 65dbbd-65dbc4 1063->1065 1065->1054 1067 65dbc6 1065->1067 1071 65dbcb-65dbce 1067->1071 1069->1071 1072 624bb7-624bc2 1069->1072 1073 65dc92 1070->1073 1074 65dca9-65dcad 1070->1074 1075 65dbd4-65dbf2 1071->1075 1076 624bf1-624c08 GetCurrentProcess IsWow64Process 1071->1076 1077 65dc13-65dc19 1072->1077 1078 624bc8-624bca 1072->1078 1079 65dc95 1073->1079 1081 65dcaf-65dcb8 1074->1081 1082 65dc98-65dca1 1074->1082 1075->1076 1080 65dbf8-65dbfe 1075->1080 1083 624c0a 1076->1083 1084 624c0d-624c1e 1076->1084 1089 65dc23-65dc29 1077->1089 1090 65dc1b-65dc1e 1077->1090 1085 624bd0-624bd3 1078->1085 1086 65dc2e-65dc3a 1078->1086 1079->1082 1087 65dc00-65dc03 1080->1087 1088 65dc08-65dc0e 1080->1088 1081->1079 1091 65dcba-65dcbd 1081->1091 1082->1074 1083->1084 1092 624c20-624c30 call 624c95 1084->1092 1093 624c89-624c93 GetSystemInfo 1084->1093 1094 624bd9-624be8 1085->1094 1095 65dc5a-65dc5d 1085->1095 1097 65dc44-65dc4a 1086->1097 1098 65dc3c-65dc3f 1086->1098 1087->1076 1088->1076 1089->1076 1090->1076 1091->1082 1106 624c32-624c3f call 624c95 1092->1106 1107 624c7d-624c87 GetSystemInfo 1092->1107 1096 624c56-624c66 1093->1096 1100 65dc4f-65dc55 1094->1100 1101 624bee 1094->1101 1095->1076 1103 65dc63-65dc78 1095->1103 1097->1076 1098->1076 1100->1076 1101->1076 1104 65dc82-65dc88 1103->1104 1105 65dc7a-65dc7d 1103->1105 1104->1076 1105->1076 1112 624c41-624c45 GetNativeSystemInfo 1106->1112 1113 624c76-624c7b 1106->1113 1108 624c47-624c4b 1107->1108 1108->1096 1111 624c4d-624c50 FreeLibrary 1108->1111 1111->1096 1112->1108 1113->1112
                                            APIs
                                            • GetVersionExW.KERNEL32(?), ref: 00624B2B
                                              • Part of subcall function 00627D2C: _memmove.LIBCMT ref: 00627D66
                                            • GetCurrentProcess.KERNEL32(?,006AFAEC,00000000,00000000,?), ref: 00624BF8
                                            • IsWow64Process.KERNEL32(00000000), ref: 00624BFF
                                            • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00624C45
                                            • FreeLibrary.KERNEL32(00000000), ref: 00624C50
                                            • GetSystemInfo.KERNEL32(00000000), ref: 00624C81
                                            • GetSystemInfo.KERNEL32(00000000), ref: 00624C8D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                            • String ID:
                                            • API String ID: 1986165174-0
                                            • Opcode ID: 09d7f70fa35ec6513d2ae153e50661cf9532761e9130d27f12a75a79f777972c
                                            • Instruction ID: e5049e17281d8778882b1e6d22f6ed2b6c057879d1bbba80602b085e1213955c
                                            • Opcode Fuzzy Hash: 09d7f70fa35ec6513d2ae153e50661cf9532761e9130d27f12a75a79f777972c
                                            • Instruction Fuzzy Hash: 7191F43154ABD0DEC732DB6894511EABFE6AF2A301F444D9DE4CB93B41D620F908CB1A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Dtn$Dtn$Dtn$Dtn$Variable must be of type 'Object'.
                                            • API String ID: 0-3728122387
                                            • Opcode ID: 85ca9a3231751b2275d20b2a0a0ec05caadad9efeee7912db141bc2ab269005f
                                            • Instruction ID: 79f7924cc3ed7fc6fd1ba28dfddb6d43f0cb0784a01b0f6db9b5a5acf622c091
                                            • Opcode Fuzzy Hash: 85ca9a3231751b2275d20b2a0a0ec05caadad9efeee7912db141bc2ab269005f
                                            • Instruction Fuzzy Hash: 2CA28F74A04A25CFCB14CF98E580AA9B7B3FF58300F648169E916AB351D736ED42CF91
                                            APIs
                                            • GetFileAttributesW.KERNELBASE(?,0065E7C1), ref: 006846A6
                                            • FindFirstFileW.KERNELBASE(?,?), ref: 006846B7
                                            • FindClose.KERNEL32(00000000), ref: 006846C7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: FileFind$AttributesCloseFirst
                                            • String ID:
                                            • API String ID: 48322524-0
                                            • Opcode ID: a0cfda598c16333944a6fc1b9fb10070f9918db2a6fdaf88a124be736d6f11d4
                                            • Instruction ID: 814e33d68dd44e054eb52020e84d5bb4b8648a742abe7b09ce91ada108990838
                                            • Opcode Fuzzy Hash: a0cfda598c16333944a6fc1b9fb10070f9918db2a6fdaf88a124be736d6f11d4
                                            • Instruction Fuzzy Hash: 2CE0D8314104015B471077B8EC4D4EA779E9F07335F100715F835C11E0FBB06D908AD6
                                            APIs
                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00630BBB
                                            • timeGetTime.WINMM ref: 00630E76
                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00630FB3
                                            • TranslateMessage.USER32(?), ref: 00630FC7
                                            • DispatchMessageW.USER32(?), ref: 00630FD5
                                            • Sleep.KERNEL32(0000000A), ref: 00630FDF
                                            • LockWindowUpdate.USER32(00000000,?,?), ref: 0063105A
                                            • DestroyWindow.USER32 ref: 00631066
                                            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00631080
                                            • Sleep.KERNEL32(0000000A,?,?), ref: 006652AD
                                            • TranslateMessage.USER32(?), ref: 0066608A
                                            • DispatchMessageW.USER32(?), ref: 00666098
                                            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 006660AC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Message$DispatchPeekSleepTranslateWindow$DestroyLockTimeUpdatetime
                                            • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$prn$prn$prn$prn
                                            • API String ID: 4003667617-1506231113
                                            • Opcode ID: 9648d23c55d3b5aa0cadc4c23e001c28c5ae199eb9b4404a37f4f5048a5af209
                                            • Instruction ID: 004021c08a25bd527ace40fde2ad04792c66cf87f8a6ac4716573893a5913a43
                                            • Opcode Fuzzy Hash: 9648d23c55d3b5aa0cadc4c23e001c28c5ae199eb9b4404a37f4f5048a5af209
                                            • Instruction Fuzzy Hash: F6B2AF70608741DFD724DF24C895BAAB7E7BF85304F14491DF48A8B2A1DB71E889CB86

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 006891E9: __time64.LIBCMT ref: 006891F3
                                              • Part of subcall function 00625045: _fseek.LIBCMT ref: 0062505D
                                            • __wsplitpath.LIBCMT ref: 006894BE
                                              • Part of subcall function 0064432E: __wsplitpath_helper.LIBCMT ref: 0064436E
                                            • _wcscpy.LIBCMT ref: 006894D1
                                            • _wcscat.LIBCMT ref: 006894E4
                                            • __wsplitpath.LIBCMT ref: 00689509
                                            • _wcscat.LIBCMT ref: 0068951F
                                            • _wcscat.LIBCMT ref: 00689532
                                              • Part of subcall function 0068922F: _memmove.LIBCMT ref: 00689268
                                              • Part of subcall function 0068922F: _memmove.LIBCMT ref: 00689277
                                            • _wcscmp.LIBCMT ref: 00689479
                                              • Part of subcall function 006899BE: _wcscmp.LIBCMT ref: 00689AAE
                                              • Part of subcall function 006899BE: _wcscmp.LIBCMT ref: 00689AC1
                                            • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 006896DC
                                            • _wcsncpy.LIBCMT ref: 0068974F
                                            • DeleteFileW.KERNEL32(?,?), ref: 00689785
                                            • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 0068979B
                                            • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 006897AC
                                            • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 006897BE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                            • String ID:
                                            • API String ID: 1500180987-0
                                            • Opcode ID: 09267ad5f789189ebe159552521b54a84d42b5eb977da99761c18b8c8f06d217
                                            • Instruction ID: 53c90532a11b6d24742a36a6a3f85f7324d7cbf47e8535353ba215f6096f003e
                                            • Opcode Fuzzy Hash: 09267ad5f789189ebe159552521b54a84d42b5eb977da99761c18b8c8f06d217
                                            • Instruction Fuzzy Hash: BFC131B1D00229AEDF61EF95CC85AEEB7BEEF45300F0441AAF509E7151DB309A848F65

                                            Control-flow Graph

                                            APIs
                                            • GetSysColorBrush.USER32(0000000F), ref: 00623074
                                            • RegisterClassExW.USER32(00000030), ref: 0062309E
                                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 006230AF
                                            • InitCommonControlsEx.COMCTL32(?), ref: 006230CC
                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 006230DC
                                            • LoadIconW.USER32(000000A9), ref: 006230F2
                                            • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00623101
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                            • API String ID: 2914291525-1005189915
                                            • Opcode ID: fde4c662ebad99fdb413ee843d8191cd53277fb8c0e8adca846a38aae10abe19
                                            • Instruction ID: 1884f0fc51d965ca7a8a3c86e50f7f385a713eca82baf24f82d80944093c2fe7
                                            • Opcode Fuzzy Hash: fde4c662ebad99fdb413ee843d8191cd53277fb8c0e8adca846a38aae10abe19
                                            • Instruction Fuzzy Hash: A4314BB1941349EFDB409FE4EC84ACEBBF5FB1A310F10552AF540AA2A0D3B65541CF91

                                            Control-flow Graph

                                            APIs
                                            • GetSysColorBrush.USER32(0000000F), ref: 00623074
                                            • RegisterClassExW.USER32(00000030), ref: 0062309E
                                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 006230AF
                                            • InitCommonControlsEx.COMCTL32(?), ref: 006230CC
                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 006230DC
                                            • LoadIconW.USER32(000000A9), ref: 006230F2
                                            • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00623101
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                            • API String ID: 2914291525-1005189915
                                            • Opcode ID: 27aaa417d191d00a83de9183a3baff59e44b01bffcf209e7502378201e5db50e
                                            • Instruction ID: 7402043ce9faee4e5514f4f86e27577a875888014036d50a18888e9828a184e4
                                            • Opcode Fuzzy Hash: 27aaa417d191d00a83de9183a3baff59e44b01bffcf209e7502378201e5db50e
                                            • Instruction Fuzzy Hash: 9321E8B1911358EFDB00EFD4E888B9EBBF6FB09750F00512AF511AA2A0D7B155448FA1

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 00624864: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,006E62F8,?,006237C0,?), ref: 00624882
                                              • Part of subcall function 0064074F: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,006272C5), ref: 00640771
                                            • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00627308
                                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0065ECF1
                                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0065ED32
                                            • RegCloseKey.ADVAPI32(?), ref: 0065ED70
                                            • _wcscat.LIBCMT ref: 0065EDC9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                            • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                            • API String ID: 2673923337-2727554177
                                            • Opcode ID: 57fca0fead37defc6df060c685b3f2e8055618cc053df473f0c8073c035d77d0
                                            • Instruction ID: 06acd003aeaba1c8135ab1f5eb0246bc1b9399898dcaa60aa225ce2a9eeb4533
                                            • Opcode Fuzzy Hash: 57fca0fead37defc6df060c685b3f2e8055618cc053df473f0c8073c035d77d0
                                            • Instruction Fuzzy Hash: B971AF714083519EC754EF65EC818ABBBFAFF59340F40152EF6458B2A0EB309A49CF66

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 760 623633-623681 762 623683-623686 760->762 763 6236e1-6236e3 760->763 765 6236e7 762->765 766 623688-62368f 762->766 763->762 764 6236e5 763->764 767 6236ca-6236d2 DefWindowProcW 764->767 768 65d31c-65d34a call 6311d0 call 6311f3 765->768 769 6236ed-6236f0 765->769 770 623695-62369a 766->770 771 62375d-623765 PostQuitMessage 766->771 772 6236d8-6236de 767->772 804 65d34f-65d356 768->804 774 6236f2-6236f3 769->774 775 623715-62373c SetTimer RegisterWindowMessageW 769->775 776 6236a0-6236a2 770->776 777 65d38f-65d3a3 call 682a16 770->777 773 623711-623713 771->773 773->772 780 65d2bf-65d2c2 774->780 781 6236f9-62370c KillTimer call 6244cb call 623114 774->781 775->773 782 62373e-623749 CreatePopupMenu 775->782 783 623767-623776 call 624531 776->783 784 6236a8-6236ad 776->784 777->773 796 65d3a9 777->796 789 65d2c4-65d2c6 780->789 790 65d2f8-65d317 MoveWindow 780->790 781->773 782->773 783->773 792 65d374-65d37b 784->792 793 6236b3-6236b8 784->793 799 65d2e7-65d2f3 SetFocus 789->799 800 65d2c8-65d2cb 789->800 790->773 792->767 802 65d381-65d38a call 67817e 792->802 794 62374b-62375b call 6245df 793->794 795 6236be-6236c4 793->795 794->773 795->767 795->804 796->767 799->773 800->795 805 65d2d1-65d2e2 call 6311d0 800->805 802->767 804->767 809 65d35c-65d36f call 6244cb call 6243db 804->809 805->773 809->767
                                            APIs
                                            • DefWindowProcW.USER32(?,?,?,?), ref: 006236D2
                                            • KillTimer.USER32(?,00000001), ref: 006236FC
                                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0062371F
                                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0062372A
                                            • CreatePopupMenu.USER32 ref: 0062373E
                                            • PostQuitMessage.USER32(00000000), ref: 0062375F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                            • String ID: TaskbarCreated$%k
                                            • API String ID: 129472671-2455537126
                                            • Opcode ID: e659b4ae5d623b4f25bedb2aa7b8528ebd778143dac2bb6ab8a4c4e6b3d35472
                                            • Instruction ID: cfe9f21d3dfe07d9dafade70823c35a81dd24b920c6779368dcaa20f5ac0bbd1
                                            • Opcode Fuzzy Hash: e659b4ae5d623b4f25bedb2aa7b8528ebd778143dac2bb6ab8a4c4e6b3d35472
                                            • Instruction Fuzzy Hash: 43415EB1100A75BBDF206F64FC49BBA375BE711340F000128FA42863E1CB69AE059F7A

                                            Control-flow Graph

                                            APIs
                                            • GetSysColorBrush.USER32(0000000F), ref: 00623A62
                                            • LoadCursorW.USER32(00000000,00007F00), ref: 00623A71
                                            • LoadIconW.USER32(00000063), ref: 00623A88
                                            • LoadIconW.USER32(000000A4), ref: 00623A9A
                                            • LoadIconW.USER32(000000A2), ref: 00623AAC
                                            • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00623AD2
                                            • RegisterClassExW.USER32(?), ref: 00623B28
                                              • Part of subcall function 00623041: GetSysColorBrush.USER32(0000000F), ref: 00623074
                                              • Part of subcall function 00623041: RegisterClassExW.USER32(00000030), ref: 0062309E
                                              • Part of subcall function 00623041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 006230AF
                                              • Part of subcall function 00623041: InitCommonControlsEx.COMCTL32(?), ref: 006230CC
                                              • Part of subcall function 00623041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 006230DC
                                              • Part of subcall function 00623041: LoadIconW.USER32(000000A9), ref: 006230F2
                                              • Part of subcall function 00623041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00623101
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                            • String ID: #$0$AutoIt v3
                                            • API String ID: 423443420-4155596026
                                            • Opcode ID: 554d19adb8733e9ca8b78ec659e43f9008ca069d126e2855d156023a11012560
                                            • Instruction ID: bf3fc0d6dfdfe0d1fbb51f5b6e7d2f4cad0f0794ce00de6790675a4bc4a92c91
                                            • Opcode Fuzzy Hash: 554d19adb8733e9ca8b78ec659e43f9008ca069d126e2855d156023a11012560
                                            • Instruction Fuzzy Hash: AA217E70D00354AFDB109FA4EC89B9D7FB6FB18751F001129F604AE2E0C3BAA6448F84

                                            Control-flow Graph

                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                            • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW$bn
                                            • API String ID: 1825951767-3767551264
                                            • Opcode ID: 6cf66bf1554dc0f5ef067952d3b22527ee2559056216e0601fa239597644cf6a
                                            • Instruction ID: 40e9fcdb388054038c20029dbdcd19c7a56e0ab7fd00720b00342222937a432f
                                            • Opcode Fuzzy Hash: 6cf66bf1554dc0f5ef067952d3b22527ee2559056216e0601fa239597644cf6a
                                            • Instruction Fuzzy Hash: ADA14D71C106799ACB54EBA0EC91AEEB77ABF14300F10042EF512B7291EF345A09CF65

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 006403A2: MapVirtualKeyW.USER32(0000005B,00000000), ref: 006403D3
                                              • Part of subcall function 006403A2: MapVirtualKeyW.USER32(00000010,00000000), ref: 006403DB
                                              • Part of subcall function 006403A2: MapVirtualKeyW.USER32(000000A0,00000000), ref: 006403E6
                                              • Part of subcall function 006403A2: MapVirtualKeyW.USER32(000000A1,00000000), ref: 006403F1
                                              • Part of subcall function 006403A2: MapVirtualKeyW.USER32(00000011,00000000), ref: 006403F9
                                              • Part of subcall function 006403A2: MapVirtualKeyW.USER32(00000012,00000000), ref: 00640401
                                              • Part of subcall function 00636259: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,0062FA90), ref: 006362B4
                                            • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0062FB2D
                                            • OleInitialize.OLE32(00000000), ref: 0062FBAA
                                            • CloseHandle.KERNEL32(00000000), ref: 006649F2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                            • String ID: <gn$\dn$%k$cn
                                            • API String ID: 1986988660-1507471717
                                            • Opcode ID: 7996d7bdfed47b884922c221ab3f0457ed09d2403d070d1949e91e8aeab86ca6
                                            • Instruction ID: bb3881c844c26755a5e8df7bcc967427e1337f19f702871319b40f72a0bfef4c
                                            • Opcode Fuzzy Hash: 7996d7bdfed47b884922c221ab3f0457ed09d2403d070d1949e91e8aeab86ca6
                                            • Instruction Fuzzy Hash: EE81ACB09013D0CEC784EF6AE9956557BE7EB78398710A13EB019CF2A1EB3154098F55

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 993 1ec25d0-1ec267e call 1ec0000 996 1ec2685-1ec26ab call 1ec34e0 CreateFileW 993->996 999 1ec26ad 996->999 1000 1ec26b2-1ec26c2 996->1000 1001 1ec27fd-1ec2801 999->1001 1008 1ec26c9-1ec26e3 VirtualAlloc 1000->1008 1009 1ec26c4 1000->1009 1002 1ec2843-1ec2846 1001->1002 1003 1ec2803-1ec2807 1001->1003 1005 1ec2849-1ec2850 1002->1005 1006 1ec2809-1ec280c 1003->1006 1007 1ec2813-1ec2817 1003->1007 1012 1ec28a5-1ec28ba 1005->1012 1013 1ec2852-1ec285d 1005->1013 1006->1007 1014 1ec2819-1ec2823 1007->1014 1015 1ec2827-1ec282b 1007->1015 1010 1ec26ea-1ec2701 ReadFile 1008->1010 1011 1ec26e5 1008->1011 1009->1001 1016 1ec2708-1ec2748 VirtualAlloc 1010->1016 1017 1ec2703 1010->1017 1011->1001 1020 1ec28bc-1ec28c7 VirtualFree 1012->1020 1021 1ec28ca-1ec28d2 1012->1021 1018 1ec285f 1013->1018 1019 1ec2861-1ec286d 1013->1019 1014->1015 1022 1ec282d-1ec2837 1015->1022 1023 1ec283b 1015->1023 1024 1ec274f-1ec276a call 1ec3730 1016->1024 1025 1ec274a 1016->1025 1017->1001 1018->1012 1026 1ec286f-1ec287f 1019->1026 1027 1ec2881-1ec288d 1019->1027 1020->1021 1022->1023 1023->1002 1033 1ec2775-1ec277f 1024->1033 1025->1001 1029 1ec28a3 1026->1029 1030 1ec288f-1ec2898 1027->1030 1031 1ec289a-1ec28a0 1027->1031 1029->1005 1030->1029 1031->1029 1034 1ec2781-1ec27b0 call 1ec3730 1033->1034 1035 1ec27b2-1ec27c6 call 1ec3540 1033->1035 1034->1033 1040 1ec27c8 1035->1040 1041 1ec27ca-1ec27ce 1035->1041 1040->1001 1043 1ec27da-1ec27de 1041->1043 1044 1ec27d0-1ec27d4 FindCloseChangeNotification 1041->1044 1045 1ec27ee-1ec27f7 1043->1045 1046 1ec27e0-1ec27eb VirtualFree 1043->1046 1044->1043 1045->996 1045->1001 1046->1045
                                            APIs
                                            • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 01EC26A1
                                            • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 01EC28C7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2003220455.0000000001EC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 01EC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_1ec0000_ss.jbxd
                                            Similarity
                                            • API ID: CreateFileFreeVirtual
                                            • String ID:
                                            • API String ID: 204039940-0
                                            • Opcode ID: e364f936384ad5a75a3e6820b612275e2b186d73597ef444eab7978b091760cf
                                            • Instruction ID: 32c2391c38e65e1f0023f1d1f74039b3016b9eb19b40e14ae0b44ec512b5e305
                                            • Opcode Fuzzy Hash: e364f936384ad5a75a3e6820b612275e2b186d73597ef444eab7978b091760cf
                                            • Instruction Fuzzy Hash: 68A10975E0020AEBDB14CFA4CA94BEEBBB5FF48704F20955DE601BB280D7759A41CB54

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1114 6239e7-623a57 CreateWindowExW * 2 ShowWindow * 2
                                            APIs
                                            • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00623A15
                                            • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00623A36
                                            • ShowWindow.USER32(00000000,?,?), ref: 00623A4A
                                            • ShowWindow.USER32(00000000,?,?), ref: 00623A53
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Window$CreateShow
                                            • String ID: AutoIt v3$edit
                                            • API String ID: 1584632944-3779509399
                                            • Opcode ID: af7e43a1f191a44ef4ea907605917b9b888a80523f46d53cebb713ec4b52fd36
                                            • Instruction ID: 3e5530b9a58fc66026365aa8075b7892a3f84c26d67ef5cefb9fe0f720f6ba7b
                                            • Opcode Fuzzy Hash: af7e43a1f191a44ef4ea907605917b9b888a80523f46d53cebb713ec4b52fd36
                                            • Instruction Fuzzy Hash: 62F030706003D07EEB301753AC88E773E7FD7D7FA0B001029BA00A61B0C1A51840CEB1

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1115 1ec23b0-1ec24cd call 1ec0000 call 1ec22a0 CreateFileW 1122 1ec24cf 1115->1122 1123 1ec24d4-1ec24e4 1115->1123 1124 1ec2584-1ec2589 1122->1124 1126 1ec24eb-1ec2505 VirtualAlloc 1123->1126 1127 1ec24e6 1123->1127 1128 1ec2509-1ec2520 ReadFile 1126->1128 1129 1ec2507 1126->1129 1127->1124 1130 1ec2524-1ec255e call 1ec22e0 call 1ec12a0 1128->1130 1131 1ec2522 1128->1131 1129->1124 1136 1ec257a-1ec2582 ExitProcess 1130->1136 1137 1ec2560-1ec2575 call 1ec2330 1130->1137 1131->1124 1136->1124 1137->1136
                                            APIs
                                              • Part of subcall function 01EC22A0: Sleep.KERNELBASE(000001F4), ref: 01EC22B1
                                            • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 01EC24C3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2003220455.0000000001EC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 01EC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_1ec0000_ss.jbxd
                                            Similarity
                                            • API ID: CreateFileSleep
                                            • String ID: 8VJZB9KR6453XVDEO
                                            • API String ID: 2694422964-389435106
                                            • Opcode ID: c0fbd86b574590b5ee660a8b9f84d7e863fd93bc44c327029640d5756fbe8cac
                                            • Instruction ID: 45b914a7c34155686eb0e3001735f09ce3959d1a5a843ef946eca32fbb3054d7
                                            • Opcode Fuzzy Hash: c0fbd86b574590b5ee660a8b9f84d7e863fd93bc44c327029640d5756fbe8cac
                                            • Instruction Fuzzy Hash: 31518F30D0424ADBEF15DBA4CD14BEFBB79AF18704F004199E609BB2C0D6B90B49CB66

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1139 62410d-624123 1140 624200-624204 1139->1140 1141 624129-62413e call 627b76 1139->1141 1144 624144-624164 call 627d2c 1141->1144 1145 65d5dd-65d5ec LoadStringW 1141->1145 1148 65d5f7-65d60f call 627c8e call 627143 1144->1148 1150 62416a-62416e 1144->1150 1145->1148 1157 62417e-6241fb call 643020 call 62463e call 642ffc Shell_NotifyIconW call 625a64 1148->1157 1161 65d615-65d633 call 627e0b call 627143 call 627e0b 1148->1161 1152 624174-624179 call 627c8e 1150->1152 1153 624205-62420e call 6281a7 1150->1153 1152->1157 1153->1157 1157->1140 1161->1157
                                            APIs
                                            • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 0065D5EC
                                              • Part of subcall function 00627D2C: _memmove.LIBCMT ref: 00627D66
                                            • _memset.LIBCMT ref: 0062418D
                                            • _wcscpy.LIBCMT ref: 006241E1
                                            • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 006241F1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                            • String ID: Line:
                                            • API String ID: 3942752672-1585850449
                                            • Opcode ID: f7333f9e64fc6c41b0096b638a2007321aa3f7eabe46fe6f9cde9629d1ad3ae1
                                            • Instruction ID: 216e956f36c2b920803b28c7bbff503ca761f44f30d891de5e6ba3ce7a271447
                                            • Opcode Fuzzy Hash: f7333f9e64fc6c41b0096b638a2007321aa3f7eabe46fe6f9cde9629d1ad3ae1
                                            • Instruction Fuzzy Hash: 8731C1710087649ED761EB60EC86FDB77EAAF54300F10491EB185961A1EF70A748CF97
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                            • String ID:
                                            • API String ID: 1559183368-0
                                            • Opcode ID: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                                            • Instruction ID: 796443faea8dc5d7818a43a0fb82a5020b810ca70a887d30a1c7e4ea766f8c87
                                            • Opcode Fuzzy Hash: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                                            • Instruction Fuzzy Hash: 1F519030A01B05DBDB249FA9C8806AE77A7AF41320F258739F826962E2D7709D558B44
                                            APIs
                                              • Part of subcall function 00624F3D: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,006E62F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00624F6F
                                            • _free.LIBCMT ref: 0065E68C
                                            • _free.LIBCMT ref: 0065E6D3
                                              • Part of subcall function 00626BEC: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00626D0D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: _free$CurrentDirectoryLibraryLoad
                                            • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                            • API String ID: 2861923089-1757145024
                                            • Opcode ID: 61e648b5c47eaf72ca828923805262633886b44a02c3bfcb7b52babc71f03948
                                            • Instruction ID: a5b78750d539d481067f99023741edb735c9470233f4bf9ab122b054ded4dd97
                                            • Opcode Fuzzy Hash: 61e648b5c47eaf72ca828923805262633886b44a02c3bfcb7b52babc71f03948
                                            • Instruction Fuzzy Hash: A0919F719106299FCF48EFA4D8919EDB7B6FF15300F14442EF815AB291EB319A09CF64
                                            APIs
                                            • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,006235A1,SwapMouseButtons,00000004,?), ref: 006235D4
                                            • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,006235A1,SwapMouseButtons,00000004,?,?,?,?,00622754), ref: 006235F5
                                            • RegCloseKey.KERNELBASE(00000000,?,?,006235A1,SwapMouseButtons,00000004,?,?,?,?,00622754), ref: 00623617
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: CloseOpenQueryValue
                                            • String ID: Control Panel\Mouse
                                            • API String ID: 3677997916-824357125
                                            • Opcode ID: fc5f1fcb132bca16bad12ac881556eb961d392402bf4d1f4ba9d32e19fa31037
                                            • Instruction ID: 4b2f9c9a7873933a64a06338a8652e5240d6d838875a4134420fa81ebffb05ff
                                            • Opcode Fuzzy Hash: fc5f1fcb132bca16bad12ac881556eb961d392402bf4d1f4ba9d32e19fa31037
                                            • Instruction Fuzzy Hash: CC114871610628BFDB209FA4EC40AEEB7BEEF05740F015469E805D7310E371AE409B60
                                            APIs
                                            • CreateProcessW.KERNELBASE(?,00000000), ref: 01EC1ACD
                                            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01EC1AF1
                                            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01EC1B13
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2003220455.0000000001EC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 01EC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_1ec0000_ss.jbxd
                                            Similarity
                                            • API ID: Process$ContextCreateMemoryReadThreadWow64
                                            • String ID:
                                            • API String ID: 2438371351-0
                                            • Opcode ID: a5f8eca76df1c4d60a387bf050efe929c827b8bdc82418feca4108ede207e1c1
                                            • Instruction ID: ee81d2ad90b4bed67640dfa756895e1b13e7ba00c701dd9cbc978094fad2b1cb
                                            • Opcode Fuzzy Hash: a5f8eca76df1c4d60a387bf050efe929c827b8bdc82418feca4108ede207e1c1
                                            • Instruction Fuzzy Hash: 6C621930A14258DBEB24CBA4CD40BDEB772EF58704F1091A9E20DEB391E7759E81CB59
                                            APIs
                                              • Part of subcall function 00625045: _fseek.LIBCMT ref: 0062505D
                                              • Part of subcall function 006899BE: _wcscmp.LIBCMT ref: 00689AAE
                                              • Part of subcall function 006899BE: _wcscmp.LIBCMT ref: 00689AC1
                                            • _free.LIBCMT ref: 0068992C
                                            • _free.LIBCMT ref: 00689933
                                            • _free.LIBCMT ref: 0068999E
                                              • Part of subcall function 00642F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00649C64), ref: 00642FA9
                                              • Part of subcall function 00642F95: GetLastError.KERNEL32(00000000,?,00649C64), ref: 00642FBB
                                            • _free.LIBCMT ref: 006899A6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                            • String ID:
                                            • API String ID: 1552873950-0
                                            • Opcode ID: c040f5d591410a8d3afab51092a26b6f5939c84b98243336257d617f1f09bfd3
                                            • Instruction ID: 765537ab0cf664cc5d5216c4460ec2c39e57f3b39ee49d33162431be9f5a6a0c
                                            • Opcode Fuzzy Hash: c040f5d591410a8d3afab51092a26b6f5939c84b98243336257d617f1f09bfd3
                                            • Instruction Fuzzy Hash: D95172B1D04619AFDF649F64DC41AAEBBBAEF48300F1405AEF209A7241DB315E90CF58
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                            • String ID:
                                            • API String ID: 2782032738-0
                                            • Opcode ID: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                                            • Instruction ID: e46de704283f389da5bdce2e2246ecaf8a5244e27728834553701a2bf92bd016
                                            • Opcode Fuzzy Hash: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                                            • Instruction Fuzzy Hash: FF41C471A006059BDB28CEA9C882BAF77A7EF80360B24817DE85587784DF70DD819B48
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: _memmove
                                            • String ID: AU3!P/k$EA06
                                            • API String ID: 4104443479-947634993
                                            • Opcode ID: 824e637fedb401d9ad5f9212e54f3b427d516e04c6b7173ce479f7ad1ae462bd
                                            • Instruction ID: 894c744ddf08f5096d66fd4f804c31bff25e585811efbdd3e19fda6eff165732
                                            • Opcode Fuzzy Hash: 824e637fedb401d9ad5f9212e54f3b427d516e04c6b7173ce479f7ad1ae462bd
                                            • Instruction Fuzzy Hash: 81418C21A04E745BEF219B64EC517FE7FA7AF41340F194068ECC29B282DE319D858FA1
                                            APIs
                                            • _memset.LIBCMT ref: 0065EE62
                                            • GetOpenFileNameW.COMDLG32(?), ref: 0065EEAC
                                              • Part of subcall function 006248AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,006248A1,?,?,006237C0,?), ref: 006248CE
                                              • Part of subcall function 006409D5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 006409F4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Name$Path$FileFullLongOpen_memset
                                            • String ID: X
                                            • API String ID: 3777226403-3081909835
                                            • Opcode ID: 24b1c5fd526606bb7fd250991bd4f8ae55ea4162d8ce2a35670f7626b9698aa9
                                            • Instruction ID: 50df8c0017672f510f53539e32d15c1b30f7da0dde45549f76a2d98a59e31115
                                            • Opcode Fuzzy Hash: 24b1c5fd526606bb7fd250991bd4f8ae55ea4162d8ce2a35670f7626b9698aa9
                                            • Instruction Fuzzy Hash: 8E21C671D106689BCF45DF94D845BEE7BFA9F49300F00441AF408E7381DBB45A898FA5
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: __fread_nolock_memmove
                                            • String ID: EA06
                                            • API String ID: 1988441806-3962188686
                                            • Opcode ID: e7d157aa4257261df02cb4515d9789bc05b3e66965ee5343f48f4e693d261333
                                            • Instruction ID: 3999354e0636c14ae2ca577c39e323ab3aabff2fe1aebe128fb1869047e9f195
                                            • Opcode Fuzzy Hash: e7d157aa4257261df02cb4515d9789bc05b3e66965ee5343f48f4e693d261333
                                            • Instruction Fuzzy Hash: CD01F9718042186FDB28C6A8C816EFE7BF89B11301F00429EF553D2181E975A604CB60
                                            APIs
                                            • GetTempPathW.KERNEL32(00000104,?), ref: 00689B82
                                            • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00689B99
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Temp$FileNamePath
                                            • String ID: aut
                                            • API String ID: 3285503233-3010740371
                                            • Opcode ID: 687327fc7aeb3794374f96d444e79ab2f91bdcdf3d0dab16a1db6a0751fef771
                                            • Instruction ID: f172440a8a0d5deaf7127b854cfd0ffb467cd282095a4691fa92d5fcf8700d17
                                            • Opcode Fuzzy Hash: 687327fc7aeb3794374f96d444e79ab2f91bdcdf3d0dab16a1db6a0751fef771
                                            • Instruction Fuzzy Hash: F5D05E7994030DABDB10ABD0DC0EFDA776DE704701F0042A1BE94911A1DEB466988F92
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e0a1d51966e9d5da9aed78bdc8a89459bff246cea4f12666da1cb2f4121610f5
                                            • Instruction ID: 5899c4d7603fc0f3161d11427ca960f8647bb88016b6f06634675ea7bf9f5029
                                            • Opcode Fuzzy Hash: e0a1d51966e9d5da9aed78bdc8a89459bff246cea4f12666da1cb2f4121610f5
                                            • Instruction Fuzzy Hash: 9AF15D719087019FCB54DF28C485A6ABBEAFF88314F14892EF8999B351D731E945CF82
                                            APIs
                                            • _memset.LIBCMT ref: 00624401
                                            • Shell_NotifyIconW.SHELL32(00000000,?), ref: 006244A6
                                            • Shell_NotifyIconW.SHELL32(00000001,?), ref: 006244C3
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: IconNotifyShell_$_memset
                                            • String ID:
                                            • API String ID: 1505330794-0
                                            • Opcode ID: b883e19f50dd6e0f39e361a942450e6abf0f4307c13bd35662bce0327e9a2de7
                                            • Instruction ID: b078b183ded5e333b1414087801dfd2951bd4c4346cfc6541f8392b8e4242c13
                                            • Opcode Fuzzy Hash: b883e19f50dd6e0f39e361a942450e6abf0f4307c13bd35662bce0327e9a2de7
                                            • Instruction Fuzzy Hash: 423181705047518FD720EF24E88479BBBE9FB59344F00092EF69A87351DB75AA48CF92
                                            APIs
                                            • __FF_MSGBANNER.LIBCMT ref: 00645963
                                              • Part of subcall function 0064A3AB: __NMSG_WRITE.LIBCMT ref: 0064A3D2
                                              • Part of subcall function 0064A3AB: __NMSG_WRITE.LIBCMT ref: 0064A3DC
                                            • __NMSG_WRITE.LIBCMT ref: 0064596A
                                              • Part of subcall function 0064A408: GetModuleFileNameW.KERNEL32(00000000,006E43BA,00000104,?,00000001,00000000), ref: 0064A49A
                                              • Part of subcall function 0064A408: ___crtMessageBoxW.LIBCMT ref: 0064A548
                                              • Part of subcall function 006432DF: ___crtCorExitProcess.LIBCMT ref: 006432E5
                                              • Part of subcall function 006432DF: ExitProcess.KERNEL32 ref: 006432EE
                                              • Part of subcall function 00648D68: __getptd_noexit.LIBCMT ref: 00648D68
                                            • RtlAllocateHeap.NTDLL(011F0000,00000000,00000001,00000000,?,?,?,00641013,?), ref: 0064598F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                            • String ID:
                                            • API String ID: 1372826849-0
                                            • Opcode ID: 5aaef4bb1ad50fae3327757f32b630175e47e8f135bfe0b7532bc315c207d036
                                            • Instruction ID: 3e707a415265bbf5a8feb1589b43565354c6c6d0809eabf6c276f24610bd9ad5
                                            • Opcode Fuzzy Hash: 5aaef4bb1ad50fae3327757f32b630175e47e8f135bfe0b7532bc315c207d036
                                            • Instruction Fuzzy Hash: 3C01DE32241B95EFE7613B75E842AAE738B9F52770F10002EF502AB282DF709D018669
                                            APIs
                                            • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,006897D2,?,?,?,?,?,00000004), ref: 00689B45
                                            • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,006897D2,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00689B5B
                                            • CloseHandle.KERNEL32(00000000,?,006897D2,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00689B62
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: File$CloseCreateHandleTime
                                            • String ID:
                                            • API String ID: 3397143404-0
                                            • Opcode ID: 984edd8c5cfcb4c7cdee43a64191c4dea6422ca9f85afe1b74265d5536eacb40
                                            • Instruction ID: d6e73b8dc1bfe3bb73f162948e4fc33a5b32c478d98d88e0f6827d83df354a12
                                            • Opcode Fuzzy Hash: 984edd8c5cfcb4c7cdee43a64191c4dea6422ca9f85afe1b74265d5536eacb40
                                            • Instruction Fuzzy Hash: 9AE08632280214BBDB313B94EC09FDA7B5AAB06761F144220FB54690E087B179119B99
                                            APIs
                                            • _free.LIBCMT ref: 00688FA5
                                              • Part of subcall function 00642F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00649C64), ref: 00642FA9
                                              • Part of subcall function 00642F95: GetLastError.KERNEL32(00000000,?,00649C64), ref: 00642FBB
                                            • _free.LIBCMT ref: 00688FB6
                                            • _free.LIBCMT ref: 00688FC8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapLast
                                            • String ID:
                                            • API String ID: 776569668-0
                                            • Opcode ID: 358057a8cee776a4634d1da6a11f7167cf7af4a4bc472a0de26b354d0d310ced
                                            • Instruction ID: 90bd830bd0dceba243c70f9c6b87466d8eed754a851eff3a1fdc75781f92f270
                                            • Opcode Fuzzy Hash: 358057a8cee776a4634d1da6a11f7167cf7af4a4bc472a0de26b354d0d310ced
                                            • Instruction Fuzzy Hash: 4BE012A16097128ECBA4B978AD50AD35BEF5F483D07E8091DB509DB242DE24F8558628
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: CALL
                                            • API String ID: 0-4196123274
                                            • Opcode ID: c43de786f4880b01d089428729d8058270ec04a50bd8a06d8eee35384bffc67a
                                            • Instruction ID: 1c840fe79e919f7eeb286968d62654283f33072c0aae1568cfb13274e9420db3
                                            • Opcode Fuzzy Hash: c43de786f4880b01d089428729d8058270ec04a50bd8a06d8eee35384bffc67a
                                            • Instruction Fuzzy Hash: 0E223770508661CFD724DF54D494A6ABBE2FF84300F15896DE8868B362D771ED86CF82
                                            APIs
                                            • IsThemeActive.UXTHEME ref: 00624992
                                              • Part of subcall function 006435AC: __lock.LIBCMT ref: 006435B2
                                              • Part of subcall function 006435AC: DecodePointer.KERNEL32(00000001,?,006249A7,006781BC), ref: 006435BE
                                              • Part of subcall function 006435AC: EncodePointer.KERNEL32(?,?,006249A7,006781BC), ref: 006435C9
                                              • Part of subcall function 00624A5B: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00624A73
                                              • Part of subcall function 00624A5B: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00624A88
                                              • Part of subcall function 00623B4C: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00623B7A
                                              • Part of subcall function 00623B4C: IsDebuggerPresent.KERNEL32 ref: 00623B8C
                                              • Part of subcall function 00623B4C: GetFullPathNameW.KERNEL32(00007FFF,?,?,006E62F8,006E62E0,?,?), ref: 00623BFD
                                              • Part of subcall function 00623B4C: SetCurrentDirectoryW.KERNEL32(?), ref: 00623C81
                                            • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 006249D2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                            • String ID:
                                            • API String ID: 1438897964-0
                                            • Opcode ID: ec3491c9b377ced40d971db9b2051c8908d41cbcb8b7572fbd7d29ae1015063a
                                            • Instruction ID: 3b9358cf653f9f0df3a262adcb3db7cc8f453fa1559ca9e6d2c1ac6cd3490698
                                            • Opcode Fuzzy Hash: ec3491c9b377ced40d971db9b2051c8908d41cbcb8b7572fbd7d29ae1015063a
                                            • Instruction Fuzzy Hash: 92118C719083619FC700EF69EC8590ABFEAEB94750F00451EF5458B2B1DB709645CF96
                                            APIs
                                            • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000,?,00625981,?,?,?,?), ref: 00625E27
                                            • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,00000000,?,00625981,?,?,?,?), ref: 0065E19C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: CreateFile
                                            • String ID:
                                            • API String ID: 823142352-0
                                            • Opcode ID: 82e71a53e4f47eb3ea9148a2d820ca69b74a38bb837536f7c0d87c3d188df6d2
                                            • Instruction ID: e9af98fbcd3abd52a97bdb6bc4589b07a278f6b7b320f25f72d926a0cbf10edd
                                            • Opcode Fuzzy Hash: 82e71a53e4f47eb3ea9148a2d820ca69b74a38bb837536f7c0d87c3d188df6d2
                                            • Instruction Fuzzy Hash: A701B970244B18BEF7341E14DC86FB637DDEB01768F108318BAE65A2E0C6B45E458F50
                                            APIs
                                              • Part of subcall function 0064594C: __FF_MSGBANNER.LIBCMT ref: 00645963
                                              • Part of subcall function 0064594C: __NMSG_WRITE.LIBCMT ref: 0064596A
                                              • Part of subcall function 0064594C: RtlAllocateHeap.NTDLL(011F0000,00000000,00000001,00000000,?,?,?,00641013,?), ref: 0064598F
                                            • std::exception::exception.LIBCMT ref: 0064102C
                                            • __CxxThrowException@8.LIBCMT ref: 00641041
                                              • Part of subcall function 006487DB: RaiseException.KERNEL32(?,?,?,006DBAF8,00000000,?,?,?,?,00641046,?,006DBAF8,?,00000001), ref: 00648830
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                            • String ID:
                                            • API String ID: 3902256705-0
                                            • Opcode ID: ad782dfa3edc7df18b1a2d9c1be7c68e1bde08ea8722bbe3b20bbd60feb773a1
                                            • Instruction ID: 8a640efbcb1436be535114733047498eb8c6cbe16b2df871646ae4b89d4cce38
                                            • Opcode Fuzzy Hash: ad782dfa3edc7df18b1a2d9c1be7c68e1bde08ea8722bbe3b20bbd60feb773a1
                                            • Instruction Fuzzy Hash: 12F0A47550025DA6CB60BE58EC259DF7BEF9F02750F10042AF8049A692DFB18AD08298
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: __lock_file_memset
                                            • String ID:
                                            • API String ID: 26237723-0
                                            • Opcode ID: f57d7ef24d560aab537a6f3498eac3088a6cb1f3289ed9f815160f726ed0d3a5
                                            • Instruction ID: 881636028c4d6ca3f1780ef8472b15208a7debd513359e81d29e7ee33201fc58
                                            • Opcode Fuzzy Hash: f57d7ef24d560aab537a6f3498eac3088a6cb1f3289ed9f815160f726ed0d3a5
                                            • Instruction Fuzzy Hash: 3601D431C00618EFCF62BF698C014CE7B63AF80360F048219F8141B2A2DF318A11DB95
                                            APIs
                                              • Part of subcall function 00648D68: __getptd_noexit.LIBCMT ref: 00648D68
                                            • __lock_file.LIBCMT ref: 0064561B
                                              • Part of subcall function 00646E4E: __lock.LIBCMT ref: 00646E71
                                            • __fclose_nolock.LIBCMT ref: 00645626
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                            • String ID:
                                            • API String ID: 2800547568-0
                                            • Opcode ID: f21cfc1e9c249882f85c3b1c6eedab7a5256e18935a4df2bce50ef126903bfa4
                                            • Instruction ID: b78b62e7f0a2d20cff908d82cf9a3e53ec68d4e53e43f650a28ddc1719cec6ec
                                            • Opcode Fuzzy Hash: f21cfc1e9c249882f85c3b1c6eedab7a5256e18935a4df2bce50ef126903bfa4
                                            • Instruction Fuzzy Hash: 9FF0B471801B059FDBA0BF75880276E77E36F42734F56820EA416AB1D3CF7C89029B59
                                            APIs
                                            • CreateProcessW.KERNELBASE(?,00000000), ref: 01EC1ACD
                                            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01EC1AF1
                                            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01EC1B13
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2003220455.0000000001EC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 01EC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_1ec0000_ss.jbxd
                                            Similarity
                                            • API ID: Process$ContextCreateMemoryReadThreadWow64
                                            • String ID:
                                            • API String ID: 2438371351-0
                                            • Opcode ID: 6ff7500a3617197a005732162d507dd4d37460c8dcbf147a4ae2be43d63b6423
                                            • Instruction ID: ec8bb41ce755603dc681f53efba2b28ca3067dca36004aa1aaa4fbe4cc41b856
                                            • Opcode Fuzzy Hash: 6ff7500a3617197a005732162d507dd4d37460c8dcbf147a4ae2be43d63b6423
                                            • Instruction Fuzzy Hash: 1612CE24E14658C6EB24DF64D8507DEB232EF68700F10A0ED910DEB7A5E77A4E81CF5A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 97cafaf431e8c4d74b30d71c58c901922e8695aac35a8b851b2927c571acc246
                                            • Instruction ID: 9d25b3651c4779fc3a2d74d3c7a2ce074da970c21fcdb58ad8c211193b05d54a
                                            • Opcode Fuzzy Hash: 97cafaf431e8c4d74b30d71c58c901922e8695aac35a8b851b2927c571acc246
                                            • Instruction Fuzzy Hash: 28518234600A15AFCF54EB64D992EAE77A7AF85310F14816CF906AB392CF30ED01CB59
                                            APIs
                                            • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000000,?,?,00000000), ref: 00625CF6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: FilePointer
                                            • String ID:
                                            • API String ID: 973152223-0
                                            • Opcode ID: 4712943b9f8d08d0f1d0b3e895ff27a969d2a52559c3b37364b5a7cb4155d9a7
                                            • Instruction ID: 0acf9d7c7b768876264420c2cd34de42401e269a8f17be094d9d7f5cf83846aa
                                            • Opcode Fuzzy Hash: 4712943b9f8d08d0f1d0b3e895ff27a969d2a52559c3b37364b5a7cb4155d9a7
                                            • Instruction Fuzzy Hash: A7315C71A00F29ABCB28DF29D48469DB7B6FF48310F148629D81A93710E731BD50DF95
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ClearVariant
                                            • String ID:
                                            • API String ID: 1473721057-0
                                            • Opcode ID: 48051a7a38786622095d2fe58375fc718bee07438c9816777599353d91585e4d
                                            • Instruction ID: 66f41c52c23191bd635fcdf1239f31de582caee9cf3efdf49cc0a0daf24dc1c0
                                            • Opcode Fuzzy Hash: 48051a7a38786622095d2fe58375fc718bee07438c9816777599353d91585e4d
                                            • Instruction Fuzzy Hash: 01412474508751CFDB24DF54C484B5ABBE2BF45318F0988ACE8898B362C772E886CF52
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: _memmove
                                            • String ID:
                                            • API String ID: 4104443479-0
                                            • Opcode ID: 64602025b210a69d44d795642d596fdfc93abb49ffaa1266944914acc7b2a18e
                                            • Instruction ID: 959b92ba410d83200a029b9355afbe01e0575d1431e521df2f05a5cb45022ba6
                                            • Opcode Fuzzy Hash: 64602025b210a69d44d795642d596fdfc93abb49ffaa1266944914acc7b2a18e
                                            • Instruction Fuzzy Hash: 9511E431209626AFD714DF28E881C6EB3AAEF45360724851EE815DB3A0DB32AC118B94
                                            APIs
                                              • Part of subcall function 00624D13: FreeLibrary.KERNEL32(00000000,?), ref: 00624D4D
                                              • Part of subcall function 0064548B: __wfsopen.LIBCMT ref: 00645496
                                            • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,006E62F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00624F6F
                                              • Part of subcall function 00624CC8: FreeLibrary.KERNEL32(00000000), ref: 00624D02
                                              • Part of subcall function 00624DD0: _memmove.LIBCMT ref: 00624E1A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Library$Free$Load__wfsopen_memmove
                                            • String ID:
                                            • API String ID: 1396898556-0
                                            • Opcode ID: d6bae24cf44a4519f17293f17586dcc36533b6f3fb913c42afea8aa56c4aca5a
                                            • Instruction ID: 78780230c171e067005537197f19b5cdee6f181c6758b176bbe9b519976b749d
                                            • Opcode Fuzzy Hash: d6bae24cf44a4519f17293f17586dcc36533b6f3fb913c42afea8aa56c4aca5a
                                            • Instruction Fuzzy Hash: CA11EB31600B25ABCB60BF74EC02BAD77A79F80701F10842DF541961C1DE715A059F65
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ClearVariant
                                            • String ID:
                                            • API String ID: 1473721057-0
                                            • Opcode ID: 484b34e08df7d19a6d67bdff322eae6350baabaa9118161d2f01c6d083b7074c
                                            • Instruction ID: 00a90603bb18d4981b2b4efdd18fae8e11c32eba83334bf7e2bb87254a0665f7
                                            • Opcode Fuzzy Hash: 484b34e08df7d19a6d67bdff322eae6350baabaa9118161d2f01c6d083b7074c
                                            • Instruction Fuzzy Hash: 1E215374508751CFCB24DF50D444A5ABBE2BF89304F05896CE88A4B321C731E886CFA3
                                            APIs
                                            • ReadFile.KERNELBASE(?,?,00010000,?,00000000,00000000,?,00010000,?,00625807,00000000,00010000,00000000,00000000,00000000,00000000), ref: 00625D76
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: FileRead
                                            • String ID:
                                            • API String ID: 2738559852-0
                                            • Opcode ID: 0b96ee6b16b3ddc425c530ce32f49ab8cafc2d0a9462572b90190c2cdd07081a
                                            • Instruction ID: 031fa5152379e7b548f30a11f20502295f4b715a89f05b71d3ea9fe3e5ceeb6b
                                            • Opcode Fuzzy Hash: 0b96ee6b16b3ddc425c530ce32f49ab8cafc2d0a9462572b90190c2cdd07081a
                                            • Instruction Fuzzy Hash: EB112835200F119FD3308F15E484BA2B7E6EF45750F10C92EE4AB86A50D770E945CF64
                                            APIs
                                            • __lock_file.LIBCMT ref: 00644AD6
                                              • Part of subcall function 00648D68: __getptd_noexit.LIBCMT ref: 00648D68
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: __getptd_noexit__lock_file
                                            • String ID:
                                            • API String ID: 2597487223-0
                                            • Opcode ID: 927c9d17f70f3bb57bad6ca12b09cb0d10e26f140fd4bdfe49acf69c819f3830
                                            • Instruction ID: 7efd6b01dd4c5cf196547782fc979a08d9eb78cdf1fef68684a1b73afb352f1a
                                            • Opcode Fuzzy Hash: 927c9d17f70f3bb57bad6ca12b09cb0d10e26f140fd4bdfe49acf69c819f3830
                                            • Instruction Fuzzy Hash: 7DF0AF31940209AFDFA1AF64CC073DE36A3AF00325F058519B824AB2D5CF788A91EF59
                                            APIs
                                            • FreeLibrary.KERNEL32(?,?,006E62F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00624FDE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: FreeLibrary
                                            • String ID:
                                            • API String ID: 3664257935-0
                                            • Opcode ID: 68f0e42ab24fcb6b5bf4a8309113a0cb0f4a36799444ef4f18f7793598555811
                                            • Instruction ID: 8168628c3678dcb48458535c1f12c2369d5b2879ef674b46224e2828d833dbdf
                                            • Opcode Fuzzy Hash: 68f0e42ab24fcb6b5bf4a8309113a0cb0f4a36799444ef4f18f7793598555811
                                            • Instruction Fuzzy Hash: 07F03971105B22CFCB349F64E594862BBE2BF843293208A3EE1D782A10CB31A844DF40
                                            APIs
                                            • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 006409F4
                                              • Part of subcall function 00627D2C: _memmove.LIBCMT ref: 00627D66
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: LongNamePath_memmove
                                            • String ID:
                                            • API String ID: 2514874351-0
                                            • Opcode ID: 6d127d237a6e34ced6c5044d25e236965cf00fd665eee2d5490e229b6635f73e
                                            • Instruction ID: b966aaf48a041ab929c2f961123adefc588f5d931bb0c5af4c093155048d6e31
                                            • Opcode Fuzzy Hash: 6d127d237a6e34ced6c5044d25e236965cf00fd665eee2d5490e229b6635f73e
                                            • Instruction Fuzzy Hash: E7E0CD3690522857C720E6989C05FFA77EEDFC9791F0401B5FC4CD7205D9A0AD818A95
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: __fread_nolock
                                            • String ID:
                                            • API String ID: 2638373210-0
                                            • Opcode ID: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                                            • Instruction ID: 1db15d27ee06616c43d422e056546c702c6ea7e03d54480db0ad2c1fec8e6e91
                                            • Opcode Fuzzy Hash: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                                            • Instruction Fuzzy Hash: 9BE092B0118B005FD7349A24D8147E377E1AB06315F04091CF2EB83342EF6378418759
                                            APIs
                                            • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001,?,?,?,0065E16B,?,?,00000000), ref: 00625DBF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: FilePointer
                                            • String ID:
                                            • API String ID: 973152223-0
                                            • Opcode ID: e54caa023cbc0ffc7a32755d805f31654149e62f8247eb1a57cfe72f523b59ca
                                            • Instruction ID: 5aef83233dd8aa2055912dca56f174b9b680b2e171186e3d125df31d9dc81539
                                            • Opcode Fuzzy Hash: e54caa023cbc0ffc7a32755d805f31654149e62f8247eb1a57cfe72f523b59ca
                                            • Instruction Fuzzy Hash: 3ED0C77464020CBFE710DB80DC46FA977BDD705710F100194FD0456290D6B27D508B95
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: __wfsopen
                                            • String ID:
                                            • API String ID: 197181222-0
                                            • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                            • Instruction ID: 126fe1666cbe3c7d14d820acbc5053d3efe81823d136888e512cb336dd9b7f96
                                            • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                            • Instruction Fuzzy Hash: 56B0927684020C77DF412E82EC02A593B5A9B40778F808020FB0C1C162A673AAA09689
                                            APIs
                                            • GetLastError.KERNEL32(00000002,00000000), ref: 0068D46A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ErrorLast
                                            • String ID:
                                            • API String ID: 1452528299-0
                                            • Opcode ID: 51d9c464a5c800a18d1e01ecfea588623f5b67f73144440cb41490260a67e4af
                                            • Instruction ID: 22f8193e99c128a3a953f1a6e3eccacbee50701aaee82ce5baed274b5d10950b
                                            • Opcode Fuzzy Hash: 51d9c464a5c800a18d1e01ecfea588623f5b67f73144440cb41490260a67e4af
                                            • Instruction Fuzzy Hash: 7E7153306047128FCB54EF24D491A6EB7E2AF88314F04466DF99697391DB30ED49CF66
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                            • Instruction ID: c5de99f0ef067f12105bc2f9b9b121b0f05637f8ed4660246ba1f565ec3b2b1c
                                            • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                            • Instruction Fuzzy Hash: BE31D371A00115EBE718DF58D4809A9F7A7FF99300B648AA5EA0ACB751D731EDD1CB80
                                            APIs
                                            • Sleep.KERNELBASE(000001F4), ref: 01EC22B1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2003220455.0000000001EC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 01EC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_1ec0000_ss.jbxd
                                            Similarity
                                            • API ID: Sleep
                                            • String ID:
                                            • API String ID: 3472027048-0
                                            • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                            • Instruction ID: 29a299e31701f28ec0bbc94218a3e1ab47499f60f01d85c3ec12f854aa5ad461
                                            • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                            • Instruction Fuzzy Hash: 48E0BF7494020EEFDB00EFA8DA496DE7BB4EF04711F1005A5FD05D7681DB309E548A62
                                            APIs
                                            • Sleep.KERNELBASE(000001F4), ref: 01EC22B1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2003220455.0000000001EC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 01EC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_1ec0000_ss.jbxd
                                            Similarity
                                            • API ID: Sleep
                                            • String ID:
                                            • API String ID: 3472027048-0
                                            • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                            • Instruction ID: 885e0dd8a8d9698c7c6ea1c1ea0d2460f80b62a19a84bc89bf6d76854f9d7a51
                                            • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                            • Instruction Fuzzy Hash: 8FE0E67494020EDFDB00EFB8DA4969E7FB4EF04701F100165FD01D2281D6309D508A72
                                            APIs
                                              • Part of subcall function 00622612: GetWindowLongW.USER32(?,000000EB), ref: 00622623
                                            • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 006ACE50
                                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 006ACE91
                                            • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 006ACED6
                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 006ACF00
                                            • SendMessageW.USER32 ref: 006ACF29
                                            • _wcsncpy.LIBCMT ref: 006ACFA1
                                            • GetKeyState.USER32(00000011), ref: 006ACFC2
                                            • GetKeyState.USER32(00000009), ref: 006ACFCF
                                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 006ACFE5
                                            • GetKeyState.USER32(00000010), ref: 006ACFEF
                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 006AD018
                                            • SendMessageW.USER32 ref: 006AD03F
                                            • SendMessageW.USER32(?,00001030,?,006AB602), ref: 006AD145
                                            • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 006AD15B
                                            • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 006AD16E
                                            • SetCapture.USER32(?), ref: 006AD177
                                            • ClientToScreen.USER32(?,?), ref: 006AD1DC
                                            • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 006AD1E9
                                            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 006AD203
                                            • ReleaseCapture.USER32 ref: 006AD20E
                                            • GetCursorPos.USER32(?), ref: 006AD248
                                            • ScreenToClient.USER32(?,?), ref: 006AD255
                                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 006AD2B1
                                            • SendMessageW.USER32 ref: 006AD2DF
                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 006AD31C
                                            • SendMessageW.USER32 ref: 006AD34B
                                            • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 006AD36C
                                            • SendMessageW.USER32(?,0000110B,00000009,?), ref: 006AD37B
                                            • GetCursorPos.USER32(?), ref: 006AD39B
                                            • ScreenToClient.USER32(?,?), ref: 006AD3A8
                                            • GetParent.USER32(?), ref: 006AD3C8
                                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 006AD431
                                            • SendMessageW.USER32 ref: 006AD462
                                            • ClientToScreen.USER32(?,?), ref: 006AD4C0
                                            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 006AD4F0
                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 006AD51A
                                            • SendMessageW.USER32 ref: 006AD53D
                                            • ClientToScreen.USER32(?,?), ref: 006AD58F
                                            • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 006AD5C3
                                              • Part of subcall function 006225DB: GetWindowLongW.USER32(?,000000EB), ref: 006225EC
                                            • GetWindowLongW.USER32(?,000000F0), ref: 006AD65F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                            • String ID: @GUI_DRAGID$F$prn
                                            • API String ID: 3977979337-3802375623
                                            • Opcode ID: 8fe9678727aa5ea77bc968d874033c03297f481938289044d99764555a1214ab
                                            • Instruction ID: f3be10944a8387a784906cbb591112a5575e41428e905faf9d0ffc03d8b74f22
                                            • Opcode Fuzzy Hash: 8fe9678727aa5ea77bc968d874033c03297f481938289044d99764555a1214ab
                                            • Instruction Fuzzy Hash: 6E427C30204341EFD725EF68C884AAABBE6FF4A364F14151DF696872A1C731AC51CF92
                                            APIs
                                            • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 006A873F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID: %d/%02d/%02d
                                            • API String ID: 3850602802-328681919
                                            • Opcode ID: cd8fd49134e183b6a4988207ca0e9b396015021f91114263f5112e8cbb439c15
                                            • Instruction ID: e15c69c8c4907ecd63480543ebdc5401e675520bd2265cb1f264693b1439d78d
                                            • Opcode Fuzzy Hash: cd8fd49134e183b6a4988207ca0e9b396015021f91114263f5112e8cbb439c15
                                            • Instruction Fuzzy Hash: CA12BE71500214AFEB25AF64CC49FAE7BBAEF8A710F244129F915EB2A1DB709D41CF50
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: _memmove$_memset
                                            • String ID: 0wm$DEFINE$Oac$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                                            • API String ID: 1357608183-261310638
                                            • Opcode ID: b97c2cbe8ed1e6d2616e6bb923af12f94eef5d5ad65cb5c9d5fc21fe80f44306
                                            • Instruction ID: 58caa4d147c838421bce4a33c846d29864c8dd3a9b22f81ca364b57bf3655bcc
                                            • Opcode Fuzzy Hash: b97c2cbe8ed1e6d2616e6bb923af12f94eef5d5ad65cb5c9d5fc21fe80f44306
                                            • Instruction Fuzzy Hash: 41939471A00216DFDB24CF58C8917EDB7B2FF48710F25816AE959AB381E7709E81DB90
                                            APIs
                                            • GetForegroundWindow.USER32(00000000,?), ref: 00624A3D
                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0065DA8E
                                            • IsIconic.USER32(?), ref: 0065DA97
                                            • ShowWindow.USER32(?,00000009), ref: 0065DAA4
                                            • SetForegroundWindow.USER32(?), ref: 0065DAAE
                                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0065DAC4
                                            • GetCurrentThreadId.KERNEL32 ref: 0065DACB
                                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 0065DAD7
                                            • AttachThreadInput.USER32(?,00000000,00000001), ref: 0065DAE8
                                            • AttachThreadInput.USER32(?,00000000,00000001), ref: 0065DAF0
                                            • AttachThreadInput.USER32(00000000,?,00000001), ref: 0065DAF8
                                            • SetForegroundWindow.USER32(?), ref: 0065DAFB
                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0065DB10
                                            • keybd_event.USER32(00000012,00000000), ref: 0065DB1B
                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0065DB25
                                            • keybd_event.USER32(00000012,00000000), ref: 0065DB2A
                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0065DB33
                                            • keybd_event.USER32(00000012,00000000), ref: 0065DB38
                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0065DB42
                                            • keybd_event.USER32(00000012,00000000), ref: 0065DB47
                                            • SetForegroundWindow.USER32(?), ref: 0065DB4A
                                            • AttachThreadInput.USER32(?,?,00000000), ref: 0065DB71
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                            • String ID: Shell_TrayWnd
                                            • API String ID: 4125248594-2988720461
                                            • Opcode ID: 5d5c0677efe059cda06f6842e4658f1f582d3dbeb611319de250b036e3afdc7c
                                            • Instruction ID: 7ba12d964978c2250ecbc26e0c9e60bd4180cb34944bbcc7d131243da65850e1
                                            • Opcode Fuzzy Hash: 5d5c0677efe059cda06f6842e4658f1f582d3dbeb611319de250b036e3afdc7c
                                            • Instruction Fuzzy Hash: 75316071A40318BAEB306FA19C49FBF3E6EEB45B51F115025FA04AA1D0D6B06901AFA1
                                            APIs
                                              • Part of subcall function 00678CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00678D0D
                                              • Part of subcall function 00678CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00678D3A
                                              • Part of subcall function 00678CC3: GetLastError.KERNEL32 ref: 00678D47
                                            • _memset.LIBCMT ref: 0067889B
                                            • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 006788ED
                                            • CloseHandle.KERNEL32(?), ref: 006788FE
                                            • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00678915
                                            • GetProcessWindowStation.USER32 ref: 0067892E
                                            • SetProcessWindowStation.USER32(00000000), ref: 00678938
                                            • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00678952
                                              • Part of subcall function 00678713: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00678851), ref: 00678728
                                              • Part of subcall function 00678713: CloseHandle.KERNEL32(?,?,00678851), ref: 0067873A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                            • String ID: $default$winsta0
                                            • API String ID: 2063423040-1027155976
                                            • Opcode ID: 8bb879156da23d13abeb2c299af909166bc8a95f81c4dde6c16539126f8e3c74
                                            • Instruction ID: 5f0a9faa552cbb2b1a0cbddf2b60d4d97f8160d67b0d60b941d3e48d41269cec
                                            • Opcode Fuzzy Hash: 8bb879156da23d13abeb2c299af909166bc8a95f81c4dde6c16539126f8e3c74
                                            • Instruction Fuzzy Hash: 0F816D71940249AFDF11DFA4DC49AEE7BBAEF04304F18812AF918A7261DB319E14DB61
                                            APIs
                                            • OpenClipboard.USER32(006AF910), ref: 00694284
                                            • IsClipboardFormatAvailable.USER32(0000000D), ref: 00694292
                                            • GetClipboardData.USER32(0000000D), ref: 0069429A
                                            • CloseClipboard.USER32 ref: 006942A6
                                            • GlobalLock.KERNEL32(00000000), ref: 006942C2
                                            • CloseClipboard.USER32 ref: 006942CC
                                            • GlobalUnlock.KERNEL32(00000000,00000000), ref: 006942E1
                                            • IsClipboardFormatAvailable.USER32(00000001), ref: 006942EE
                                            • GetClipboardData.USER32(00000001), ref: 006942F6
                                            • GlobalLock.KERNEL32(00000000), ref: 00694303
                                            • GlobalUnlock.KERNEL32(00000000,00000000,?), ref: 00694337
                                            • CloseClipboard.USER32 ref: 00694447
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                            • String ID:
                                            • API String ID: 3222323430-0
                                            • Opcode ID: 4888cfd9302308d9a07c54109206376bb377c711dada9d0565bbb17d63f4f56c
                                            • Instruction ID: 15a6889e8802f93a4db3a5c77c66bbfdef52a8d4333aa59670bfcb74e112a979
                                            • Opcode Fuzzy Hash: 4888cfd9302308d9a07c54109206376bb377c711dada9d0565bbb17d63f4f56c
                                            • Instruction Fuzzy Hash: 84519131204701ABDB10BFA0EC86F6E77AEAF85B01F10552DF556D21A1DF70E9068F66
                                            APIs
                                            • FindFirstFileW.KERNEL32(?,?), ref: 0068C9F8
                                            • FindClose.KERNEL32(00000000), ref: 0068CA4C
                                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0068CA71
                                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0068CA88
                                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 0068CAAF
                                            • __swprintf.LIBCMT ref: 0068CAFB
                                            • __swprintf.LIBCMT ref: 0068CB3E
                                              • Part of subcall function 00627F41: _memmove.LIBCMT ref: 00627F82
                                            • __swprintf.LIBCMT ref: 0068CB92
                                              • Part of subcall function 006438D8: __woutput_l.LIBCMT ref: 00643931
                                            • __swprintf.LIBCMT ref: 0068CBE0
                                              • Part of subcall function 006438D8: __flsbuf.LIBCMT ref: 00643953
                                              • Part of subcall function 006438D8: __flsbuf.LIBCMT ref: 0064396B
                                            • __swprintf.LIBCMT ref: 0068CC2F
                                            • __swprintf.LIBCMT ref: 0068CC7E
                                            • __swprintf.LIBCMT ref: 0068CCCD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                            • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                            • API String ID: 3953360268-2428617273
                                            • Opcode ID: ff60145f985fcc3e2eb15f0ca82594cf8d22f4a6270e2ad8c372097842af9d52
                                            • Instruction ID: 916e3079c826c004b1c97d6c21128b305c0d509971a937198ae232be0867d16c
                                            • Opcode Fuzzy Hash: ff60145f985fcc3e2eb15f0ca82594cf8d22f4a6270e2ad8c372097842af9d52
                                            • Instruction Fuzzy Hash: 6FA15FB1408714ABC750FBA4D986DAFB7EEEF94700F40491EF586D2191EA34DA08CB66
                                            APIs
                                            • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 0068F221
                                            • _wcscmp.LIBCMT ref: 0068F236
                                            • _wcscmp.LIBCMT ref: 0068F24D
                                            • GetFileAttributesW.KERNEL32(?), ref: 0068F25F
                                            • SetFileAttributesW.KERNEL32(?,?), ref: 0068F279
                                            • FindNextFileW.KERNEL32(00000000,?), ref: 0068F291
                                            • FindClose.KERNEL32(00000000), ref: 0068F29C
                                            • FindFirstFileW.KERNEL32(*.*,?), ref: 0068F2B8
                                            • _wcscmp.LIBCMT ref: 0068F2DF
                                            • _wcscmp.LIBCMT ref: 0068F2F6
                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 0068F308
                                            • SetCurrentDirectoryW.KERNEL32(006DA5A0), ref: 0068F326
                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 0068F330
                                            • FindClose.KERNEL32(00000000), ref: 0068F33D
                                            • FindClose.KERNEL32(00000000), ref: 0068F34F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                            • String ID: *.*
                                            • API String ID: 1803514871-438819550
                                            • Opcode ID: 320b031a41f2767d21c2e6d22cfce408b8b6d8125d19d384083b18c09eb0d7ef
                                            • Instruction ID: 78ad512f895e6debf78e2450adc64d37b061e95166cc9d01476592b4edc32d57
                                            • Opcode Fuzzy Hash: 320b031a41f2767d21c2e6d22cfce408b8b6d8125d19d384083b18c09eb0d7ef
                                            • Instruction Fuzzy Hash: 0731B3765002196BDB10FBF4EC58ADE77AEAF09361F100276E840D3290EB71EE458FA5
                                            APIs
                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 006A0BDE
                                            • RegCreateKeyExW.ADVAPI32(?,?,00000000,006AF910,00000000,?,00000000,?,?), ref: 006A0C4C
                                            • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 006A0C94
                                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 006A0D1D
                                            • RegCloseKey.ADVAPI32(?), ref: 006A103D
                                            • RegCloseKey.ADVAPI32(00000000), ref: 006A104A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Close$ConnectCreateRegistryValue
                                            • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                            • API String ID: 536824911-966354055
                                            • Opcode ID: 60e3713c04e5a1c64b3bd8fd7931d8aba5c47541f43e7c285bbe12b04c67d5ac
                                            • Instruction ID: 836b21a02dc3fffeb3ba3f40c070a3490b43ed9ad868d588701b01ed36faf047
                                            • Opcode Fuzzy Hash: 60e3713c04e5a1c64b3bd8fd7931d8aba5c47541f43e7c285bbe12b04c67d5ac
                                            • Instruction Fuzzy Hash: AA0257356006119FDB54EF24D891E2AB7E6EF89724F04885DF88A9B362CB31EC41CF95
                                            APIs
                                            • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 0068F37E
                                            • _wcscmp.LIBCMT ref: 0068F393
                                            • _wcscmp.LIBCMT ref: 0068F3AA
                                              • Part of subcall function 006845C1: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 006845DC
                                            • FindNextFileW.KERNEL32(00000000,?), ref: 0068F3D9
                                            • FindClose.KERNEL32(00000000), ref: 0068F3E4
                                            • FindFirstFileW.KERNEL32(*.*,?), ref: 0068F400
                                            • _wcscmp.LIBCMT ref: 0068F427
                                            • _wcscmp.LIBCMT ref: 0068F43E
                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 0068F450
                                            • SetCurrentDirectoryW.KERNEL32(006DA5A0), ref: 0068F46E
                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 0068F478
                                            • FindClose.KERNEL32(00000000), ref: 0068F485
                                            • FindClose.KERNEL32(00000000), ref: 0068F497
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                            • String ID: *.*
                                            • API String ID: 1824444939-438819550
                                            • Opcode ID: 890530b190aaffcef33628512f278b5c6b84f58d90a8d82d069d9bb3e78d0ba4
                                            • Instruction ID: fa0f6971e8cf4e9639fea5931bc38c90c38ea5901fd146faa16a9cb6b0e426c2
                                            • Opcode Fuzzy Hash: 890530b190aaffcef33628512f278b5c6b84f58d90a8d82d069d9bb3e78d0ba4
                                            • Instruction Fuzzy Hash: 0C31B7715011196BCF10BBA4EC84ADE77EE9F49360F100376E850A32A1DB70DE45CFA5
                                            APIs
                                              • Part of subcall function 0067874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00678766
                                              • Part of subcall function 0067874A: GetLastError.KERNEL32(?,0067822A,?,?,?), ref: 00678770
                                              • Part of subcall function 0067874A: GetProcessHeap.KERNEL32(00000008,?,?,0067822A,?,?,?), ref: 0067877F
                                              • Part of subcall function 0067874A: HeapAlloc.KERNEL32(00000000,?,0067822A,?,?,?), ref: 00678786
                                              • Part of subcall function 0067874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0067879D
                                              • Part of subcall function 006787E7: GetProcessHeap.KERNEL32(00000008,00678240,00000000,00000000,?,00678240,?), ref: 006787F3
                                              • Part of subcall function 006787E7: HeapAlloc.KERNEL32(00000000,?,00678240,?), ref: 006787FA
                                              • Part of subcall function 006787E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00678240,?), ref: 0067880B
                                            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0067825B
                                            • _memset.LIBCMT ref: 00678270
                                            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0067828F
                                            • GetLengthSid.ADVAPI32(?), ref: 006782A0
                                            • GetAce.ADVAPI32(?,00000000,?), ref: 006782DD
                                            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 006782F9
                                            • GetLengthSid.ADVAPI32(?), ref: 00678316
                                            • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00678325
                                            • HeapAlloc.KERNEL32(00000000), ref: 0067832C
                                            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0067834D
                                            • CopySid.ADVAPI32(00000000), ref: 00678354
                                            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00678385
                                            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 006783AB
                                            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 006783BF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                            • String ID:
                                            • API String ID: 3996160137-0
                                            • Opcode ID: acf473918f453581bf34993f6e78a24a753ff784c4f34f70ea8aa9fe9fbf3b0b
                                            • Instruction ID: 834e8adb88c9c2e72f321324c60731931e4e5e736525d034ca735e9b028e9b52
                                            • Opcode Fuzzy Hash: acf473918f453581bf34993f6e78a24a753ff784c4f34f70ea8aa9fe9fbf3b0b
                                            • Instruction Fuzzy Hash: DD612A71940219EFDF109F94DC48AEEBBBAFF05710B148269F819A7291DB359E05CF60
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$Oac$PJl$UCP)$UTF)$UTF16)
                                            • API String ID: 0-3239182561
                                            • Opcode ID: a8294f2ab482824a260511882bdaec6f93567423d50acb7071e9519c2d3349ee
                                            • Instruction ID: 809d628c56a982d3a5bd69e974260a9a80890f8378f0a7de068c2d99a6a7de30
                                            • Opcode Fuzzy Hash: a8294f2ab482824a260511882bdaec6f93567423d50acb7071e9519c2d3349ee
                                            • Instruction Fuzzy Hash: 0F725E75E002199BDB24CF59C8907EEB7B6EF49710F14816AE949EB390EB709D81CB90
                                            APIs
                                              • Part of subcall function 006A10A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,006A0038,?,?), ref: 006A10BC
                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 006A0737
                                              • Part of subcall function 00629997: __itow.LIBCMT ref: 006299C2
                                              • Part of subcall function 00629997: __swprintf.LIBCMT ref: 00629A0C
                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 006A07D6
                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 006A086E
                                            • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 006A0AAD
                                            • RegCloseKey.ADVAPI32(00000000), ref: 006A0ABA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                            • String ID:
                                            • API String ID: 1240663315-0
                                            • Opcode ID: 19b5f84029391bf449ad65a21a682de57ce45add12b3d4f9505191008336ff0a
                                            • Instruction ID: 1d0acd46db280b03178d3a9ec45f9b28e62f3e9e7747073b258d8e8dd1baec8d
                                            • Opcode Fuzzy Hash: 19b5f84029391bf449ad65a21a682de57ce45add12b3d4f9505191008336ff0a
                                            • Instruction Fuzzy Hash: BDE16F31604310AFDB54EF28C891D6ABBE6EF89714F04856DF54ADB262DA31ED01CF51
                                            APIs
                                            • GetKeyboardState.USER32(?), ref: 00680241
                                            • GetAsyncKeyState.USER32(000000A0), ref: 006802C2
                                            • GetKeyState.USER32(000000A0), ref: 006802DD
                                            • GetAsyncKeyState.USER32(000000A1), ref: 006802F7
                                            • GetKeyState.USER32(000000A1), ref: 0068030C
                                            • GetAsyncKeyState.USER32(00000011), ref: 00680324
                                            • GetKeyState.USER32(00000011), ref: 00680336
                                            • GetAsyncKeyState.USER32(00000012), ref: 0068034E
                                            • GetKeyState.USER32(00000012), ref: 00680360
                                            • GetAsyncKeyState.USER32(0000005B), ref: 00680378
                                            • GetKeyState.USER32(0000005B), ref: 0068038A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: State$Async$Keyboard
                                            • String ID:
                                            • API String ID: 541375521-0
                                            • Opcode ID: 403e061dc7c655cdd2f68f4e8b8326c3025775570df6fa793576fc5171272238
                                            • Instruction ID: 73ecea21d654cfc9aa1c0133053d62583b6bc756fdf5959a9d0900b25e7dadcd
                                            • Opcode Fuzzy Hash: 403e061dc7c655cdd2f68f4e8b8326c3025775570df6fa793576fc5171272238
                                            • Instruction Fuzzy Hash: F64187349047CA6FFFB1BBA488183E5BAA26F22340F184A9DD5C5563C2D7D45ACC8792
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                            • String ID:
                                            • API String ID: 1737998785-0
                                            • Opcode ID: ad70dc84da74f4a29cf199a1fd70bf9cc3a59e8b2c5d4cfef7fde2aff67dddb6
                                            • Instruction ID: bd19bf7dcf4b5133dcadfb41f78f1c222db4fd18338cf38df71cd63c734de0a6
                                            • Opcode Fuzzy Hash: ad70dc84da74f4a29cf199a1fd70bf9cc3a59e8b2c5d4cfef7fde2aff67dddb6
                                            • Instruction Fuzzy Hash: 192180356006209FDB10AFA0EC49F697BAAEF45711F14901AF946DB261DB30BD02CF59
                                            APIs
                                              • Part of subcall function 006248AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,006248A1,?,?,006237C0,?), ref: 006248CE
                                              • Part of subcall function 00684CD3: GetFileAttributesW.KERNEL32(?,00683947), ref: 00684CD4
                                            • FindFirstFileW.KERNEL32(?,?), ref: 00683ADF
                                            • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00683B87
                                            • MoveFileW.KERNEL32(?,?), ref: 00683B9A
                                            • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00683BB7
                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00683BD9
                                            • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00683BF5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                            • String ID: \*.*
                                            • API String ID: 4002782344-1173974218
                                            • Opcode ID: e181c5f62003bc8ce25011d3599777451ed94dac8cddae5a1cae65c913724330
                                            • Instruction ID: aac20ee85e261e0f61f34790dd6e40f0c762a4212fa4010177edb2b6e4cd95bf
                                            • Opcode Fuzzy Hash: e181c5f62003bc8ce25011d3599777451ed94dac8cddae5a1cae65c913724330
                                            • Instruction Fuzzy Hash: E6517D318016699ACF55FBA0D9929EDB77AAF14300F244269E44277291EF306F09CFA4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ERCP$Oac$VUUU$VUUU$VUUU$VUUU
                                            • API String ID: 0-600082611
                                            • Opcode ID: c0026eac12160585abec7710b8de897e42de589557b5c3634ba2dd907aee1b53
                                            • Instruction ID: d7c6a79bf2d24ab72a702b93d9db77a4cc872e5e55914618e90162e0ef7d2638
                                            • Opcode Fuzzy Hash: c0026eac12160585abec7710b8de897e42de589557b5c3634ba2dd907aee1b53
                                            • Instruction Fuzzy Hash: B5A25D70E0421A8BDF24CF58C9907EDF7B2BF55314F1486AAD856A7380DB74AE85CB90
                                            APIs
                                              • Part of subcall function 00627F41: _memmove.LIBCMT ref: 00627F82
                                            • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 0068F6AB
                                            • Sleep.KERNEL32(0000000A), ref: 0068F6DB
                                            • _wcscmp.LIBCMT ref: 0068F6EF
                                            • _wcscmp.LIBCMT ref: 0068F70A
                                            • FindNextFileW.KERNEL32(?,?), ref: 0068F7A8
                                            • FindClose.KERNEL32(00000000), ref: 0068F7BE
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                            • String ID: *.*
                                            • API String ID: 713712311-438819550
                                            • Opcode ID: db2056181cd549f6dceb8c960c415bafab29ce12a24b2bbda86f245a7a0a239c
                                            • Instruction ID: cb19c19b2f258876b876adf854b8049287ece437d78dd2b27357e51e3ff455e6
                                            • Opcode Fuzzy Hash: db2056181cd549f6dceb8c960c415bafab29ce12a24b2bbda86f245a7a0a239c
                                            • Instruction Fuzzy Hash: 0441917190021A9FDF50EFA4DC45AEEBBB6FF05310F14466AE815A3290EB309E44CFA4
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: _memmove
                                            • String ID:
                                            • API String ID: 4104443479-0
                                            • Opcode ID: 2bd7d1abbeb11a049cf0093ddbfe225a5c1cb999c708d9f01b550fd0f9a2663e
                                            • Instruction ID: ed871253ee992cd4c75dcf378d9d2ce6edf9f7dc7cd27d5ae18a2d89dac309ca
                                            • Opcode Fuzzy Hash: 2bd7d1abbeb11a049cf0093ddbfe225a5c1cb999c708d9f01b550fd0f9a2663e
                                            • Instruction Fuzzy Hash: A0128E70A00A19DFDF14DFA4D985AEEB7F6FF48300F108569E406A7291EB35AD11CBA4
                                            APIs
                                              • Part of subcall function 00640FF6: std::exception::exception.LIBCMT ref: 0064102C
                                              • Part of subcall function 00640FF6: __CxxThrowException@8.LIBCMT ref: 00641041
                                            • _memmove.LIBCMT ref: 0067062F
                                            • _memmove.LIBCMT ref: 00670744
                                            • _memmove.LIBCMT ref: 006707EB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: _memmove$Exception@8Throwstd::exception::exception
                                            • String ID: yZc
                                            • API String ID: 1300846289-814616561
                                            • Opcode ID: 4b4e7bb613604015fc97cc12bab1ec30dafcd2f9546720d843daec7836d15d36
                                            • Instruction ID: cdda8c0e440d41e342a030945dd7e3aab8c6c624d36d1957e84c38c2d27560b2
                                            • Opcode Fuzzy Hash: 4b4e7bb613604015fc97cc12bab1ec30dafcd2f9546720d843daec7836d15d36
                                            • Instruction Fuzzy Hash: 4A02A0B0E00619DFDF44DF64D981AAEBBB6EF44300F148069E80ADB395EB31D951CBA5
                                            APIs
                                              • Part of subcall function 00678CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00678D0D
                                              • Part of subcall function 00678CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00678D3A
                                              • Part of subcall function 00678CC3: GetLastError.KERNEL32 ref: 00678D47
                                            • ExitWindowsEx.USER32(?,00000000), ref: 0068549B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                            • String ID: $@$SeShutdownPrivilege
                                            • API String ID: 2234035333-194228
                                            • Opcode ID: 4fc6870d78378d751b8a03fbbd99c5ca3cef1b85fe0135353fe3a166110dddf3
                                            • Instruction ID: 45d49c4cbf4a1d01962d2ee482498e4ba6705fa52c6c82cae4d7b83100fdd681
                                            • Opcode Fuzzy Hash: 4fc6870d78378d751b8a03fbbd99c5ca3cef1b85fe0135353fe3a166110dddf3
                                            • Instruction Fuzzy Hash: D6012431A94A112AE76873B89C4ABFA729AAB01742F200335FC07E22C2DA601C848395
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: __itow__swprintf
                                            • String ID: Oac
                                            • API String ID: 674341424-752515563
                                            • Opcode ID: 06076a6420138a05d7f1b9572a8f5f42498961572ad58841ea459d9d00115c7e
                                            • Instruction ID: 3d5df8df8b223ba4d03d0046d30de0d300722fd09047d248c1538dc5999f0541
                                            • Opcode Fuzzy Hash: 06076a6420138a05d7f1b9572a8f5f42498961572ad58841ea459d9d00115c7e
                                            • Instruction Fuzzy Hash: B922BC716083119FD760DF24C891BAFB7E6AF84714F00891DF88A97391DB30EA45CB96
                                            APIs
                                            • socket.WSOCK32(00000002,00000001,00000006), ref: 006965EF
                                            • WSAGetLastError.WSOCK32(00000000), ref: 006965FE
                                            • bind.WSOCK32(00000000,?,00000010), ref: 0069661A
                                            • listen.WSOCK32(00000000,00000005), ref: 00696629
                                            • WSAGetLastError.WSOCK32(00000000), ref: 00696643
                                            • closesocket.WSOCK32(00000000), ref: 00696657
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ErrorLast$bindclosesocketlistensocket
                                            • String ID:
                                            • API String ID: 1279440585-0
                                            • Opcode ID: 23c51119ef66ca8f6fca4ed61c28c4802b67cdda5b2cf6a46bec3145a32613a8
                                            • Instruction ID: ad0da5d92464fce17e173bdedbb9603e737422b70649ffd7c0a79cd033df9356
                                            • Opcode Fuzzy Hash: 23c51119ef66ca8f6fca4ed61c28c4802b67cdda5b2cf6a46bec3145a32613a8
                                            • Instruction Fuzzy Hash: C5219C306006109FDF10AF64D889A6EB7BAEF49720F14816DF95AE73D1CB70AD01CB66
                                            APIs
                                              • Part of subcall function 00622612: GetWindowLongW.USER32(?,000000EB), ref: 00622623
                                            • DefDlgProcW.USER32(?,?,?,?,?), ref: 006219FA
                                            • GetSysColor.USER32(0000000F), ref: 00621A4E
                                            • SetBkColor.GDI32(?,00000000), ref: 00621A61
                                              • Part of subcall function 00621290: DefDlgProcW.USER32(?,00000020,?), ref: 006212D8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ColorProc$LongWindow
                                            • String ID:
                                            • API String ID: 3744519093-0
                                            • Opcode ID: c184b44729d9b0bdf301a314e7ce5371cd751a538556758920a082b9111a759a
                                            • Instruction ID: 7dd92563720663fef9a0b07e4e4f2ff3d056cc15be84ec3c48ea383d0e882ea3
                                            • Opcode Fuzzy Hash: c184b44729d9b0bdf301a314e7ce5371cd751a538556758920a082b9111a759a
                                            • Instruction Fuzzy Hash: 47A16A70109DA4BAD738AB28AC55EFF255FDB63392F14010DF802DD291CE129D429EBA
                                            APIs
                                              • Part of subcall function 006980A0: inet_addr.WSOCK32(00000000), ref: 006980CB
                                            • socket.WSOCK32(00000002,00000002,00000011), ref: 00696AB1
                                            • WSAGetLastError.WSOCK32(00000000), ref: 00696ADA
                                            • bind.WSOCK32(00000000,?,00000010), ref: 00696B13
                                            • WSAGetLastError.WSOCK32(00000000), ref: 00696B20
                                            • closesocket.WSOCK32(00000000), ref: 00696B34
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                            • String ID:
                                            • API String ID: 99427753-0
                                            • Opcode ID: d70d0146a00056a365824f144b26e3a8516d3ef56b231e3776103cca862785fa
                                            • Instruction ID: 5980af3c8d941c2059e17db81bf4feea3d2d9b5e737826613d07f407673b98af
                                            • Opcode Fuzzy Hash: d70d0146a00056a365824f144b26e3a8516d3ef56b231e3776103cca862785fa
                                            • Instruction Fuzzy Hash: 1E41B875B007209FEB50BF64EC86F6E77AA9B45720F04805CF95AAB3C2DA705D018B65
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                            • String ID:
                                            • API String ID: 292994002-0
                                            • Opcode ID: be49ddaa520a370df366ab498f7d1e8e12af782e62959ab76cafeee86acf569f
                                            • Instruction ID: f6fa8269d32b169700089b781a19857d21ff23694865ad7db616ccb7231a6981
                                            • Opcode Fuzzy Hash: be49ddaa520a370df366ab498f7d1e8e12af782e62959ab76cafeee86acf569f
                                            • Instruction Fuzzy Hash: 0811C831B00A206FD721BF66DC44A6F779BEF56721B446029F447D7251CB70ED018EA5
                                            APIs
                                            • CoInitialize.OLE32(00000000), ref: 0068C69D
                                            • CoCreateInstance.OLE32(006B2D6C,00000000,00000001,006B2BDC,?), ref: 0068C6B5
                                              • Part of subcall function 00627F41: _memmove.LIBCMT ref: 00627F82
                                            • CoUninitialize.OLE32 ref: 0068C922
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: CreateInitializeInstanceUninitialize_memmove
                                            • String ID: .lnk
                                            • API String ID: 2683427295-24824748
                                            • Opcode ID: 910b211b34537b9e7b0fbabbe3285c3c3cf455a9c58952bdceaeb120cff21264
                                            • Instruction ID: 6f6b0dd40eb5e89157f376693f4e436f258a4e986420fd01a76c7b2771fe7cb6
                                            • Opcode Fuzzy Hash: 910b211b34537b9e7b0fbabbe3285c3c3cf455a9c58952bdceaeb120cff21264
                                            • Instruction Fuzzy Hash: F9A16A71108715AFD740EF54D892EABB7E9EF94304F00491CF196971A2EB70EA09CF66
                                            APIs
                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,00661D88,?), ref: 0069C312
                                            • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0069C324
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                            • API String ID: 2574300362-1816364905
                                            • Opcode ID: b153108118aeb41b2419bf1c290f027d7bf2282df3f03ec9e73eaf4b8b220707
                                            • Instruction ID: 1c1906e39962db70979077478d31aa10fdb7c396dbc5bf335e9d553c06608ada
                                            • Opcode Fuzzy Hash: b153108118aeb41b2419bf1c290f027d7bf2282df3f03ec9e73eaf4b8b220707
                                            • Instruction Fuzzy Hash: 2FE08C70600703CFDF206F65C814A8676EAEB09765B809439E895C2710E770E841CBA0
                                            APIs
                                            • CreateToolhelp32Snapshot.KERNEL32 ref: 0069F151
                                            • Process32FirstW.KERNEL32(00000000,?), ref: 0069F15F
                                              • Part of subcall function 00627F41: _memmove.LIBCMT ref: 00627F82
                                            • Process32NextW.KERNEL32(00000000,?), ref: 0069F21F
                                            • CloseHandle.KERNEL32(00000000,?,?,?), ref: 0069F22E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                            • String ID:
                                            • API String ID: 2576544623-0
                                            • Opcode ID: bfcb48492e25e714991913afca575629317a3c0bca600812b988cfb1264b9388
                                            • Instruction ID: 30e9fb436e4fc92022ca2be840f08a67a0c1f7adb77cae54df22344537bbe020
                                            • Opcode Fuzzy Hash: bfcb48492e25e714991913afca575629317a3c0bca600812b988cfb1264b9388
                                            • Instruction Fuzzy Hash: 89519E715047119FD750EF24EC82E6BB7EAFF88710F14482DF49697291EB70AA08CB96
                                            APIs
                                            • lstrlenW.KERNEL32(?,?,?,00000000), ref: 0067EB19
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: lstrlen
                                            • String ID: ($|
                                            • API String ID: 1659193697-1631851259
                                            • Opcode ID: 7be84d31c226a25b5bfcdf04f25099c2fe467ce4d7c577fe5ab0bf50e80e2595
                                            • Instruction ID: 4604e0eb13f43f38f55815e8b77c954f3a70890e6bc18597f2271e45b89e4890
                                            • Opcode Fuzzy Hash: 7be84d31c226a25b5bfcdf04f25099c2fe467ce4d7c577fe5ab0bf50e80e2595
                                            • Instruction Fuzzy Hash: F0324775A007059FD728CF29C4819AAB7F2FF48710B15C5AEE89ADB3A1E770E941CB44
                                            APIs
                                            • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000), ref: 006926D5
                                            • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 0069270C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Internet$AvailableDataFileQueryRead
                                            • String ID:
                                            • API String ID: 599397726-0
                                            • Opcode ID: 7fc0975c788ad4d59cf0b6e3ecde115ad9de189c6b62a058f776d1577cd86a90
                                            • Instruction ID: ac8e10845c3bcb82bf5e0fed2558c502fe92c207577597bc9401fccb08a6f92d
                                            • Opcode Fuzzy Hash: 7fc0975c788ad4d59cf0b6e3ecde115ad9de189c6b62a058f776d1577cd86a90
                                            • Instruction Fuzzy Hash: 8041D67550420ABFEF20DF94DC95EFBB7FEEB40714F10406EF601AAA40EA71AE419664
                                            APIs
                                            • SetErrorMode.KERNEL32(00000001), ref: 0068B5AE
                                            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 0068B608
                                            • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 0068B655
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ErrorMode$DiskFreeSpace
                                            • String ID:
                                            • API String ID: 1682464887-0
                                            • Opcode ID: a8529d01cc9abec94d9327392e4e19c5088aedd60b47c55e0237e704d1cadc3b
                                            • Instruction ID: 9ab07dc85f5759b58eb328f0ef2998a67783abbf05d87d0610f675ee1c29bd77
                                            • Opcode Fuzzy Hash: a8529d01cc9abec94d9327392e4e19c5088aedd60b47c55e0237e704d1cadc3b
                                            • Instruction Fuzzy Hash: AC219035A00618EFCB00EFA5D881EADBBB9FF89310F0480A9E805AB351DB31A945CF55
                                            APIs
                                              • Part of subcall function 00640FF6: std::exception::exception.LIBCMT ref: 0064102C
                                              • Part of subcall function 00640FF6: __CxxThrowException@8.LIBCMT ref: 00641041
                                            • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00678D0D
                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00678D3A
                                            • GetLastError.KERNEL32 ref: 00678D47
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                            • String ID:
                                            • API String ID: 1922334811-0
                                            • Opcode ID: b1aadf8570df05041d7b9d946e4c8ea46936eaa06cf4dc329c510dd08394e63c
                                            • Instruction ID: ff584e7043d73de80b9ce62746fe858a8a4429202db3d0d1eacceddf20f236ad
                                            • Opcode Fuzzy Hash: b1aadf8570df05041d7b9d946e4c8ea46936eaa06cf4dc329c510dd08394e63c
                                            • Instruction Fuzzy Hash: 761182B1414209AFE728EF64DC85D6BB7BEEF44711B10852EF45597241DB30BC418A64
                                            APIs
                                            • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0068404B
                                            • DeviceIoControl.KERNEL32(00000000,002D1400,00000007,0000000C,?,0000000C,?,00000000), ref: 00684088
                                            • CloseHandle.KERNEL32(00000000,?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00684091
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: CloseControlCreateDeviceFileHandle
                                            • String ID:
                                            • API String ID: 33631002-0
                                            • Opcode ID: a607be82088e7902060537c94925b3cf93544ef3898886d223614c0d0120f051
                                            • Instruction ID: 5fe8919d668dc3882b2d696828171f421a7e0f503c24c0c419810f0ae5fe0019
                                            • Opcode Fuzzy Hash: a607be82088e7902060537c94925b3cf93544ef3898886d223614c0d0120f051
                                            • Instruction Fuzzy Hash: 071186B1D00229BEE710EBE8DC44FAFBBBDEB09710F000656BA04E7190C6745D0547E1
                                            APIs
                                            • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00684C2C
                                            • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00684C43
                                            • FreeSid.ADVAPI32(?), ref: 00684C53
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: AllocateCheckFreeInitializeMembershipToken
                                            • String ID:
                                            • API String ID: 3429775523-0
                                            • Opcode ID: 22efc697dd797eb4ea8c907821d7c49fae9a281ffd72cac6305375a69a442b0d
                                            • Instruction ID: 4add5b5fa732cf0c9ec5ec2efc59275e0801fb0bb0b8a977f5a55b3c7da7d24c
                                            • Opcode Fuzzy Hash: 22efc697dd797eb4ea8c907821d7c49fae9a281ffd72cac6305375a69a442b0d
                                            • Instruction Fuzzy Hash: 1DF04975A1130DBFDF04EFF0DC99AAEBBBDEF08201F0044A9A901E2281E6706A448B51
                                            APIs
                                            • __time64.LIBCMT ref: 00688B25
                                              • Part of subcall function 0064543A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,006891F8,00000000,?,?,?,?,006893A9,00000000,?), ref: 00645443
                                              • Part of subcall function 0064543A: __aulldiv.LIBCMT ref: 00645463
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Time$FileSystem__aulldiv__time64
                                            • String ID: 0un
                                            • API String ID: 2893107130-594083182
                                            • Opcode ID: bbb403f9d7eea51e82d14c86b7a615713157a4f0473f58a45b1e7620928b95d2
                                            • Instruction ID: cdd2fe97890f66e66170747fe7e8d54155425eb216bc6b212a4950c81d838f64
                                            • Opcode Fuzzy Hash: bbb403f9d7eea51e82d14c86b7a615713157a4f0473f58a45b1e7620928b95d2
                                            • Instruction Fuzzy Hash: 4721A2726256108FC729CF25D441A92B3E2EBA5311B688F6CD1E5CF2D0CE74BD45CB94
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6cd749b3e8d941ceccce55904af52770f5ee7ee051b9b6496028562423a4c5c1
                                            • Instruction ID: 4da9631dd5d50af1f18b08d3e50d265e73db9f0eb588438d53fbf4640c2a753d
                                            • Opcode Fuzzy Hash: 6cd749b3e8d941ceccce55904af52770f5ee7ee051b9b6496028562423a4c5c1
                                            • Instruction Fuzzy Hash: 16229E74A00626CFDB24DF54E485AAEB7F2FF08300F148179E856AB341E736A985CF91
                                            APIs
                                            • FindFirstFileW.KERNEL32(?,?), ref: 0068C966
                                            • FindClose.KERNEL32(00000000), ref: 0068C996
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Find$CloseFileFirst
                                            • String ID:
                                            • API String ID: 2295610775-0
                                            • Opcode ID: e7060d9aaed8ba6c3202e4fc8b1f6a9512079da73110057b39e45af9051cc912
                                            • Instruction ID: 91fbac5ae4ce1fa7042d49ad8f9fdfe1e78f6408eaf3efd2d6497f17ae4c3726
                                            • Opcode Fuzzy Hash: e7060d9aaed8ba6c3202e4fc8b1f6a9512079da73110057b39e45af9051cc912
                                            • Instruction Fuzzy Hash: 0711A5316006109FDB10EF29D845A2AF7E6FF85320F00895EF8A9D7291DB30AC00CF95
                                            APIs
                                            • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,0069977D,?,006AFB84,?), ref: 0068A302
                                            • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,0069977D,?,006AFB84,?), ref: 0068A314
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ErrorFormatLastMessage
                                            • String ID:
                                            • API String ID: 3479602957-0
                                            • Opcode ID: b5f32df9a6804ddef0debd463e352b23329807059f0aad450398843fe04f175a
                                            • Instruction ID: cb1fc4407ed84f7748abacfc4b1f8e6e17a1682028b250f9e1cf8d1b91ce8eb7
                                            • Opcode Fuzzy Hash: b5f32df9a6804ddef0debd463e352b23329807059f0aad450398843fe04f175a
                                            • Instruction Fuzzy Hash: 12F0823554422DBBEB10AFE4CC48FEA776EBF09762F00426ABD08D6181D6309944CFE1
                                            APIs
                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00678851), ref: 00678728
                                            • CloseHandle.KERNEL32(?,?,00678851), ref: 0067873A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: AdjustCloseHandlePrivilegesToken
                                            • String ID:
                                            • API String ID: 81990902-0
                                            • Opcode ID: 1b7ca7b330187d1fffe695c2b7506b7ff96f351333468d1a17113004be74862f
                                            • Instruction ID: c9ffd368d18b2838ae79ae1fa32de02596dd2a2dbd94e4da1cfcfdf28b32015f
                                            • Opcode Fuzzy Hash: 1b7ca7b330187d1fffe695c2b7506b7ff96f351333468d1a17113004be74862f
                                            • Instruction Fuzzy Hash: 48E0EC76010650EFEB652B60EC09D77BBEAEF05750724993DF49684470DB62ACD0DB50
                                            APIs
                                            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00648F97,?,?,?,00000001), ref: 0064A39A
                                            • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 0064A3A3
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled
                                            • String ID:
                                            • API String ID: 3192549508-0
                                            • Opcode ID: b24af25b72076449e2fd8c1f451b728a956d4323268f5cacef8b6b492d247c47
                                            • Instruction ID: 5c85b47a9ca5b165b631710f4af02afe2340066ed290384afa5387285e4f0ed4
                                            • Opcode Fuzzy Hash: b24af25b72076449e2fd8c1f451b728a956d4323268f5cacef8b6b492d247c47
                                            • Instruction Fuzzy Hash: 6FB09231054208ABCF003BD1EC59B883F6AEB46AA2F405020F60D84060CFA264508ED2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 63008b15ba1aecddb184ce8883c4bf4e67c9e11081837e19bffc2b8bab8c42e6
                                            • Instruction ID: 527728fb85bc77a6f23567bd6c88dfe5a5ea450d1fc02d2f055a2292363fe23e
                                            • Opcode Fuzzy Hash: 63008b15ba1aecddb184ce8883c4bf4e67c9e11081837e19bffc2b8bab8c42e6
                                            • Instruction Fuzzy Hash: F0320661D69F414DD7239A34D872336A28AAFB73C4F15E737E819B5AA6EB29C4C34100
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1a6796f2c6ef5f5173263e5ef29dbede143c0688f7cb9bd0078eac47621ad5c4
                                            • Instruction ID: b2e34f7a5f20aaf746769600f585e87c328fdeff188d8a135365c2b726a399fd
                                            • Opcode Fuzzy Hash: 1a6796f2c6ef5f5173263e5ef29dbede143c0688f7cb9bd0078eac47621ad5c4
                                            • Instruction Fuzzy Hash: A1B1BA70D2AF414DD72396398831336BA8DAFBB2C5F51E71BFC2674922EB2185C34241
                                            APIs
                                            • BlockInput.USER32(00000001), ref: 00694218
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: BlockInput
                                            • String ID:
                                            • API String ID: 3456056419-0
                                            • Opcode ID: c6badf24650ca70dfa603b473a27348e3d68b08986ed6cfce47adf7433e660db
                                            • Instruction ID: 0b7d1c2335ff90ec607b3491c5e21c9879b06574ee9dceaea8675bae3d4854b3
                                            • Opcode Fuzzy Hash: c6badf24650ca70dfa603b473a27348e3d68b08986ed6cfce47adf7433e660db
                                            • Instruction Fuzzy Hash: B6E04F312406149FDB10EF5AE845E9AF7EEAF98760F00802AFC49C7752DA71E9418FA1
                                            APIs
                                            • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 00684F18
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: mouse_event
                                            • String ID:
                                            • API String ID: 2434400541-0
                                            • Opcode ID: 6c68284c96cfff2663245c11875f17d6956d21996fe1f0d06d7e0bda7bd6d249
                                            • Instruction ID: 496537a596ebbeb583c6776f7c086ea77f6b917d3216e696247d3eb176461ca2
                                            • Opcode Fuzzy Hash: 6c68284c96cfff2663245c11875f17d6956d21996fe1f0d06d7e0bda7bd6d249
                                            • Instruction Fuzzy Hash: 0FD05EF016420738FC187B20AC0FFB6110BF3C0781F845B8D3301855C1ADE56801A635
                                            APIs
                                            • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,006788D1), ref: 00678CB3
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: LogonUser
                                            • String ID:
                                            • API String ID: 1244722697-0
                                            • Opcode ID: a160111d4390295db2277937de674a0e445223d3a9b6d0c1fa73d2d122585ac6
                                            • Instruction ID: 47a9b81596f014605f68be65e8699609b4d55a97aa46cd00c40cc4b43bcce695
                                            • Opcode Fuzzy Hash: a160111d4390295db2277937de674a0e445223d3a9b6d0c1fa73d2d122585ac6
                                            • Instruction Fuzzy Hash: 73D05E322A050EABEF019FA4DC01EAE3B6AEB04B01F408111FE15C50A1C775E835AF60
                                            APIs
                                            • GetUserNameW.ADVAPI32(?,?), ref: 00662242
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: NameUser
                                            • String ID:
                                            • API String ID: 2645101109-0
                                            • Opcode ID: d314e144aa22bf2e00de8a2ba1158ad967813c73277a79aea95a2206e93d7c5f
                                            • Instruction ID: a369a6b1ed7f8a76e2469b0fee12177ec63058149550e58bae63cb1d80932b75
                                            • Opcode Fuzzy Hash: d314e144aa22bf2e00de8a2ba1158ad967813c73277a79aea95a2206e93d7c5f
                                            • Instruction Fuzzy Hash: 28C048F1800109DBDB05EBA0DA98DEEB7BDAB09304F2440A6A142F2100E774AB448E72
                                            APIs
                                            • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0064A36A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled
                                            • String ID:
                                            • API String ID: 3192549508-0
                                            • Opcode ID: 6d16c002c506000ceb37ec727f433fe47e4454512ee7840c44290adaaff0518b
                                            • Instruction ID: e300dd6a5b13f515c8a84b0e758eabf73ea11fd834e5986c6950148cfd82a771
                                            • Opcode Fuzzy Hash: 6d16c002c506000ceb37ec727f433fe47e4454512ee7840c44290adaaff0518b
                                            • Instruction Fuzzy Hash: CDA0113000020CAB8F002B82EC08888BFAEEA022A0B008020F80C800228F32A8208AC2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7836dce13caca725d406847fe388fcfa0babeb9505be0b99f6ec9add04ee4b4e
                                            • Instruction ID: c26132b0b9f8676cd38e9bb27132cf4d3b4111e84bc958c273cf5f3e525b3beb
                                            • Opcode Fuzzy Hash: 7836dce13caca725d406847fe388fcfa0babeb9505be0b99f6ec9add04ee4b4e
                                            • Instruction Fuzzy Hash: 7F22D6309057568FDF288B14C4946FDB7B3FB41304F6484AAE4578B792EB749D82CBA1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                            • Instruction ID: 512080266b007a102f1a7e182d96342824a42534abc291db7d7f38c334ad8934
                                            • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                            • Instruction Fuzzy Hash: A0C1A4322050530AEB5D4639D4341BEBAE26AA37B13AA075DF4B3CF6C5FF20D569D620
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                            • Instruction ID: 711ce4d88399cedcb8ede87d093e93f0ac3c5c7e7ab885a47e8bb418ae45ad84
                                            • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                            • Instruction Fuzzy Hash: 97C1963220519309EB6D463A847407EBBE26B937B13AA075DF4B2DF6C4FF20D569D620
                                            APIs
                                            • DeleteObject.GDI32(00000000), ref: 00697B70
                                            • DeleteObject.GDI32(00000000), ref: 00697B82
                                            • DestroyWindow.USER32 ref: 00697B90
                                            • GetDesktopWindow.USER32 ref: 00697BAA
                                            • GetWindowRect.USER32(00000000), ref: 00697BB1
                                            • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00697CF2
                                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00697D02
                                            • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00697D4A
                                            • GetClientRect.USER32(00000000,?), ref: 00697D56
                                            • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00697D90
                                            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00697DB2
                                            • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00697DC5
                                            • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00697DD0
                                            • GlobalLock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00697DD9
                                            • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00697DE8
                                            • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00697DF1
                                            • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00697DF8
                                            • GlobalFree.KERNEL32(00000000), ref: 00697E03
                                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00697E15
                                            • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,006B2CAC,00000000), ref: 00697E2B
                                            • GlobalFree.KERNEL32(00000000), ref: 00697E3B
                                            • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00697E61
                                            • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00697E80
                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00697EA2
                                            • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0069808F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                            • String ID: $AutoIt v3$DISPLAY$static
                                            • API String ID: 2211948467-2373415609
                                            • Opcode ID: 46219706f011acd63c08170addc58c98dd463385fa00f7001f856169f6319232
                                            • Instruction ID: dc2e98518f9ed3b234006e087de076e1e17f906fa61d97c9bfd48dba7b849340
                                            • Opcode Fuzzy Hash: 46219706f011acd63c08170addc58c98dd463385fa00f7001f856169f6319232
                                            • Instruction Fuzzy Hash: FB026B71A10215EFDF14DFA4DC89EAE7BBAEB49314F148159F905AB2A1CB70AD01CF60
                                            APIs
                                            • CharUpperBuffW.USER32(?,?,006AF910), ref: 006A38AF
                                            • IsWindowVisible.USER32(?), ref: 006A38D3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: BuffCharUpperVisibleWindow
                                            • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                            • API String ID: 4105515805-45149045
                                            • Opcode ID: 9741a4ce0a487b704e62a45636c0a2b7deab936cea4d129c50aebf9e45296697
                                            • Instruction ID: 9f8ab15a91dfd5a31a36ff43b4ea1afe382d5a73eb62f8db09a90f83a8c53add
                                            • Opcode Fuzzy Hash: 9741a4ce0a487b704e62a45636c0a2b7deab936cea4d129c50aebf9e45296697
                                            • Instruction Fuzzy Hash: 95D19130604325DBCB54FF10C851AAABBE3AF95354F11845DB8865B3A6CB31EE0ACF95
                                            APIs
                                            • SetTextColor.GDI32(?,00000000), ref: 006AA89F
                                            • GetSysColorBrush.USER32(0000000F), ref: 006AA8D0
                                            • GetSysColor.USER32(0000000F), ref: 006AA8DC
                                            • SetBkColor.GDI32(?,000000FF), ref: 006AA8F6
                                            • SelectObject.GDI32(?,?), ref: 006AA905
                                            • InflateRect.USER32(?,000000FF,000000FF), ref: 006AA930
                                            • GetSysColor.USER32(00000010), ref: 006AA938
                                            • CreateSolidBrush.GDI32(00000000), ref: 006AA93F
                                            • FrameRect.USER32(?,?,00000000), ref: 006AA94E
                                            • DeleteObject.GDI32(00000000), ref: 006AA955
                                            • InflateRect.USER32(?,000000FE,000000FE), ref: 006AA9A0
                                            • FillRect.USER32(?,?,?), ref: 006AA9D2
                                            • GetWindowLongW.USER32(?,000000F0), ref: 006AA9FD
                                              • Part of subcall function 006AAB60: GetSysColor.USER32(00000012), ref: 006AAB99
                                              • Part of subcall function 006AAB60: SetTextColor.GDI32(?,?), ref: 006AAB9D
                                              • Part of subcall function 006AAB60: GetSysColorBrush.USER32(0000000F), ref: 006AABB3
                                              • Part of subcall function 006AAB60: GetSysColor.USER32(0000000F), ref: 006AABBE
                                              • Part of subcall function 006AAB60: GetSysColor.USER32(00000011), ref: 006AABDB
                                              • Part of subcall function 006AAB60: CreatePen.GDI32(00000000,00000001,00743C00), ref: 006AABE9
                                              • Part of subcall function 006AAB60: SelectObject.GDI32(?,00000000), ref: 006AABFA
                                              • Part of subcall function 006AAB60: SetBkColor.GDI32(?,00000000), ref: 006AAC03
                                              • Part of subcall function 006AAB60: SelectObject.GDI32(?,?), ref: 006AAC10
                                              • Part of subcall function 006AAB60: InflateRect.USER32(?,000000FF,000000FF), ref: 006AAC2F
                                              • Part of subcall function 006AAB60: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 006AAC46
                                              • Part of subcall function 006AAB60: GetWindowLongW.USER32(00000000,000000F0), ref: 006AAC5B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                            • String ID:
                                            • API String ID: 4124339563-0
                                            • Opcode ID: 61928a215ccf7253179cda63da2b3fc91df0ed44c098c48f5c412b229f6376aa
                                            • Instruction ID: 842353946206770ca17c27a5a71eb5cf78cdf3027ef8304b6705f4f62a76db30
                                            • Opcode Fuzzy Hash: 61928a215ccf7253179cda63da2b3fc91df0ed44c098c48f5c412b229f6376aa
                                            • Instruction Fuzzy Hash: 17A18471408301AFD710AFA4DC08A5B77EAFF4A321F105B2AF562961A1D735E945CF53
                                            APIs
                                            • DestroyWindow.USER32(?,?,?), ref: 00622CA2
                                            • DeleteObject.GDI32(00000000), ref: 00622CE8
                                            • DeleteObject.GDI32(00000000), ref: 00622CF3
                                            • DestroyIcon.USER32(00000000,?,?,?), ref: 00622CFE
                                            • DestroyWindow.USER32(00000000,?,?,?), ref: 00622D09
                                            • SendMessageW.USER32(?,00001308,?,00000000), ref: 0065C68B
                                            • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 0065C6C4
                                            • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 0065CAED
                                              • Part of subcall function 00621B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00622036,?,00000000,?,?,?,?,006216CB,00000000,?), ref: 00621B9A
                                            • SendMessageW.USER32(?,00001053), ref: 0065CB2A
                                            • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 0065CB41
                                            • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0065CB57
                                            • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0065CB62
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                            • String ID: 0
                                            • API String ID: 464785882-4108050209
                                            • Opcode ID: b92b7fd5f7e025474f1435666be141a897259e9818004cb2c2c3f515b21dd296
                                            • Instruction ID: 360daa67cfb97d49bd5351f5c7ebabef1d017a3302914f8b620adf77d0bab56d
                                            • Opcode Fuzzy Hash: b92b7fd5f7e025474f1435666be141a897259e9818004cb2c2c3f515b21dd296
                                            • Instruction Fuzzy Hash: 2B12AD30604612EFCB60DF24D894BA9BBE2BF49321F544569F885DB662C731E886CF91
                                            APIs
                                            • DestroyWindow.USER32(00000000), ref: 006977F1
                                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 006978B0
                                            • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 006978EE
                                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00697900
                                            • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00697946
                                            • GetClientRect.USER32(00000000,?), ref: 00697952
                                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00697996
                                            • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 006979A5
                                            • GetStockObject.GDI32(00000011), ref: 006979B5
                                            • SelectObject.GDI32(00000000,00000000), ref: 006979B9
                                            • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 006979C9
                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 006979D2
                                            • DeleteDC.GDI32(00000000), ref: 006979DB
                                            • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00697A07
                                            • SendMessageW.USER32(00000030,00000000,00000001), ref: 00697A1E
                                            • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00697A59
                                            • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00697A6D
                                            • SendMessageW.USER32(00000404,00000001,00000000), ref: 00697A7E
                                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00697AAE
                                            • GetStockObject.GDI32(00000011), ref: 00697AB9
                                            • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00697AC4
                                            • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00697ACE
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                            • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                            • API String ID: 2910397461-517079104
                                            • Opcode ID: 92c3a50c4aa6114d7417c7fa74af44387bc1871a66942d64f553a4f42e5d9b15
                                            • Instruction ID: 69f2e7f87fdad2253f56d6c9bdd5d0a2e2bfb6a02cba95339f0514b5d648540a
                                            • Opcode Fuzzy Hash: 92c3a50c4aa6114d7417c7fa74af44387bc1871a66942d64f553a4f42e5d9b15
                                            • Instruction Fuzzy Hash: BFA17371A40215BFEB14DBA4DD4AFAE7BBAEB45714F008118FA15AB2E0D770AD00CF65
                                            APIs
                                            • SetErrorMode.KERNEL32(00000001), ref: 0068AF89
                                            • GetDriveTypeW.KERNEL32(?,006AFAC0,?,\\.\,006AF910), ref: 0068B066
                                            • SetErrorMode.KERNEL32(00000000,006AFAC0,?,\\.\,006AF910), ref: 0068B1C4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ErrorMode$DriveType
                                            • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                            • API String ID: 2907320926-4222207086
                                            • Opcode ID: ec0333d03c1050a15843f327da1cf685a55fc58fba8a01d48ec6711e43744c46
                                            • Instruction ID: 3239e88f90e27fde9e265931444f179318b0e4ad44fae0475b5204b82d8cc225
                                            • Opcode Fuzzy Hash: ec0333d03c1050a15843f327da1cf685a55fc58fba8a01d48ec6711e43744c46
                                            • Instruction Fuzzy Hash: B051F534B88305EBCB00FB90C996CBD73B3AB54341B61621AF44AAB391CB359D42DF52
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: __wcsnicmp
                                            • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                            • API String ID: 1038674560-86951937
                                            • Opcode ID: 8c1ef650af820882bbb5334dc9e0be17362e877b29e4092ea610b7ead663de40
                                            • Instruction ID: c465134b10936029e170d259c4e049b566892beedd62371d86f83e0e3b4f9c0c
                                            • Opcode Fuzzy Hash: 8c1ef650af820882bbb5334dc9e0be17362e877b29e4092ea610b7ead663de40
                                            • Instruction Fuzzy Hash: 9C815A70640626AACF24AF60DC92FEB776BAF15301F044029FD41AA281EB61DB99CB55
                                            APIs
                                            • GetSysColor.USER32(00000012), ref: 006AAB99
                                            • SetTextColor.GDI32(?,?), ref: 006AAB9D
                                            • GetSysColorBrush.USER32(0000000F), ref: 006AABB3
                                            • GetSysColor.USER32(0000000F), ref: 006AABBE
                                            • CreateSolidBrush.GDI32(?), ref: 006AABC3
                                            • GetSysColor.USER32(00000011), ref: 006AABDB
                                            • CreatePen.GDI32(00000000,00000001,00743C00), ref: 006AABE9
                                            • SelectObject.GDI32(?,00000000), ref: 006AABFA
                                            • SetBkColor.GDI32(?,00000000), ref: 006AAC03
                                            • SelectObject.GDI32(?,?), ref: 006AAC10
                                            • InflateRect.USER32(?,000000FF,000000FF), ref: 006AAC2F
                                            • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 006AAC46
                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 006AAC5B
                                            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 006AACA7
                                            • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 006AACCE
                                            • InflateRect.USER32(?,000000FD,000000FD), ref: 006AACEC
                                            • DrawFocusRect.USER32(?,?), ref: 006AACF7
                                            • GetSysColor.USER32(00000011), ref: 006AAD05
                                            • SetTextColor.GDI32(?,00000000), ref: 006AAD0D
                                            • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 006AAD21
                                            • SelectObject.GDI32(?,006AA869), ref: 006AAD38
                                            • DeleteObject.GDI32(?), ref: 006AAD43
                                            • SelectObject.GDI32(?,?), ref: 006AAD49
                                            • DeleteObject.GDI32(?), ref: 006AAD4E
                                            • SetTextColor.GDI32(?,?), ref: 006AAD54
                                            • SetBkColor.GDI32(?,?), ref: 006AAD5E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                            • String ID:
                                            • API String ID: 1996641542-0
                                            • Opcode ID: 79e2909fd3f88dbb840a7a1144ed499614ece626d525aa954409da7d3cd00686
                                            • Instruction ID: a4586e4d3c10fdda092a7bdcce7f3d3d99b21749f2735c3fd7157506eb8a663a
                                            • Opcode Fuzzy Hash: 79e2909fd3f88dbb840a7a1144ed499614ece626d525aa954409da7d3cd00686
                                            • Instruction Fuzzy Hash: 51615F71900218EFDB11AFE4DC48EAE7B7AEF0A320F105126F915AB2A1D775AD40DF91
                                            APIs
                                            • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 006A8D34
                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 006A8D45
                                            • CharNextW.USER32(0000014E), ref: 006A8D74
                                            • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 006A8DB5
                                            • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 006A8DCB
                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 006A8DDC
                                            • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 006A8DF9
                                            • SetWindowTextW.USER32(?,0000014E), ref: 006A8E45
                                            • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 006A8E5B
                                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 006A8E8C
                                            • _memset.LIBCMT ref: 006A8EB1
                                            • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 006A8EFA
                                            • _memset.LIBCMT ref: 006A8F59
                                            • SendMessageW.USER32(?,00001053,000000FF,?), ref: 006A8F83
                                            • SendMessageW.USER32(?,00001074,?,00000001), ref: 006A8FDB
                                            • SendMessageW.USER32(?,0000133D,?,?), ref: 006A9088
                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 006A90AA
                                            • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 006A90F4
                                            • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 006A9121
                                            • DrawMenuBar.USER32(?), ref: 006A9130
                                            • SetWindowTextW.USER32(?,0000014E), ref: 006A9158
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                            • String ID: 0
                                            • API String ID: 1073566785-4108050209
                                            • Opcode ID: e803801b16a3eb2a2bfca71bf33d1ff3e0d590f876d3288a475a4f61c9580797
                                            • Instruction ID: aa49d9751b9f1a71e64cc9a54dbb806a44ee14d4a539b045243e277c31cc3930
                                            • Opcode Fuzzy Hash: e803801b16a3eb2a2bfca71bf33d1ff3e0d590f876d3288a475a4f61c9580797
                                            • Instruction Fuzzy Hash: 1CE18170900219AEDF20AF60CC84EEE7BBAEF06710F148159F9169B291DB749E85DF61
                                            APIs
                                            • GetCursorPos.USER32(?), ref: 006A4C51
                                            • GetDesktopWindow.USER32 ref: 006A4C66
                                            • GetWindowRect.USER32(00000000), ref: 006A4C6D
                                            • GetWindowLongW.USER32(?,000000F0), ref: 006A4CCF
                                            • DestroyWindow.USER32(?), ref: 006A4CFB
                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 006A4D24
                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 006A4D42
                                            • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 006A4D68
                                            • SendMessageW.USER32(?,00000421,?,?), ref: 006A4D7D
                                            • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 006A4D90
                                            • IsWindowVisible.USER32(?), ref: 006A4DB0
                                            • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 006A4DCB
                                            • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 006A4DDF
                                            • GetWindowRect.USER32(?,?), ref: 006A4DF7
                                            • MonitorFromPoint.USER32(?,?,00000002), ref: 006A4E1D
                                            • GetMonitorInfoW.USER32(00000000,?), ref: 006A4E37
                                            • CopyRect.USER32(?,?), ref: 006A4E4E
                                            • SendMessageW.USER32(?,00000412,00000000), ref: 006A4EB9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                            • String ID: ($0$tooltips_class32
                                            • API String ID: 698492251-4156429822
                                            • Opcode ID: 6211b787cd656f6c98f390b4a6272c0f05449aa65f1797adf7a0673c6e991ea2
                                            • Instruction ID: 1792fdc773441defc97e8b4bad44136b14e3da3f2aab42b997618ff2a85cd2ff
                                            • Opcode Fuzzy Hash: 6211b787cd656f6c98f390b4a6272c0f05449aa65f1797adf7a0673c6e991ea2
                                            • Instruction Fuzzy Hash: E0B18D71604350AFDB44EF64C844B6ABBE6BF85314F00891CF5899B2A1DBB1EC05CFA6
                                            APIs
                                            • GetFileVersionInfoSizeW.VERSION(?,?), ref: 006846E8
                                            • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 0068470E
                                            • _wcscpy.LIBCMT ref: 0068473C
                                            • _wcscmp.LIBCMT ref: 00684747
                                            • _wcscat.LIBCMT ref: 0068475D
                                            • _wcsstr.LIBCMT ref: 00684768
                                            • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00684784
                                            • _wcscat.LIBCMT ref: 006847CD
                                            • _wcscat.LIBCMT ref: 006847D4
                                            • _wcsncpy.LIBCMT ref: 006847FF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                            • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                            • API String ID: 699586101-1459072770
                                            • Opcode ID: 1cf643877a87a64c34bf22fb5b93c8785cde5cd31a21c2b60a19184470c2cfc7
                                            • Instruction ID: bd35b4b4457015843bf95e934c8eea7b791f7ff084c06b5893e7575d760ea269
                                            • Opcode Fuzzy Hash: 1cf643877a87a64c34bf22fb5b93c8785cde5cd31a21c2b60a19184470c2cfc7
                                            • Instruction Fuzzy Hash: B2412A71A04215BAE750B7B49C43EBF776EDF02710F14016EF904E6282EF70EA4197A9
                                            APIs
                                            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 006228BC
                                            • GetSystemMetrics.USER32(00000007), ref: 006228C4
                                            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 006228EF
                                            • GetSystemMetrics.USER32(00000008), ref: 006228F7
                                            • GetSystemMetrics.USER32(00000004), ref: 0062291C
                                            • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00622939
                                            • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00622949
                                            • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0062297C
                                            • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00622990
                                            • GetClientRect.USER32(00000000,000000FF), ref: 006229AE
                                            • GetStockObject.GDI32(00000011), ref: 006229CA
                                            • SendMessageW.USER32(00000000,00000030,00000000), ref: 006229D5
                                              • Part of subcall function 00622344: GetCursorPos.USER32(?), ref: 00622357
                                              • Part of subcall function 00622344: ScreenToClient.USER32(006E67B0,?), ref: 00622374
                                              • Part of subcall function 00622344: GetAsyncKeyState.USER32(00000001), ref: 00622399
                                              • Part of subcall function 00622344: GetAsyncKeyState.USER32(00000002), ref: 006223A7
                                            • SetTimer.USER32(00000000,00000000,00000028,00621256), ref: 006229FC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                            • String ID: AutoIt v3 GUI
                                            • API String ID: 1458621304-248962490
                                            • Opcode ID: 57ca5c4079c0cf3807eab59e570fb8f20f8416b4cc384e65c47ec3ac8607eeb6
                                            • Instruction ID: 64f9c8706a7f2345c6efa7d1928fa968d3936e255212057e4a208d4007d5a7d0
                                            • Opcode Fuzzy Hash: 57ca5c4079c0cf3807eab59e570fb8f20f8416b4cc384e65c47ec3ac8607eeb6
                                            • Instruction Fuzzy Hash: 93B1AF70A0021AEFDB14DFA8DC95BEE7BB6FB18311F104229FA15A6290DB34E841CF51
                                            APIs
                                            • CharUpperBuffW.USER32(?,?), ref: 006A40F6
                                            • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 006A41B6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: BuffCharMessageSendUpper
                                            • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                            • API String ID: 3974292440-719923060
                                            • Opcode ID: 75a8bcf63ae57c132d2dc0e0b0fdaca0f730a1e5b4483ffaf77bb33869f6ad88
                                            • Instruction ID: a8704863f6fc68362260f4338e404df59ca6e7fae46ce1e2961abb051591d1a1
                                            • Opcode Fuzzy Hash: 75a8bcf63ae57c132d2dc0e0b0fdaca0f730a1e5b4483ffaf77bb33869f6ad88
                                            • Instruction Fuzzy Hash: 24A1AD306143119BDB54FF20C841AAAB7A7AFC5314F14896CB8969B392DF70ED0ACF55
                                            APIs
                                            • LoadCursorW.USER32(00000000,00007F89), ref: 00695309
                                            • LoadCursorW.USER32(00000000,00007F8A), ref: 00695314
                                            • LoadCursorW.USER32(00000000,00007F00), ref: 0069531F
                                            • LoadCursorW.USER32(00000000,00007F03), ref: 0069532A
                                            • LoadCursorW.USER32(00000000,00007F8B), ref: 00695335
                                            • LoadCursorW.USER32(00000000,00007F01), ref: 00695340
                                            • LoadCursorW.USER32(00000000,00007F81), ref: 0069534B
                                            • LoadCursorW.USER32(00000000,00007F88), ref: 00695356
                                            • LoadCursorW.USER32(00000000,00007F80), ref: 00695361
                                            • LoadCursorW.USER32(00000000,00007F86), ref: 0069536C
                                            • LoadCursorW.USER32(00000000,00007F83), ref: 00695377
                                            • LoadCursorW.USER32(00000000,00007F85), ref: 00695382
                                            • LoadCursorW.USER32(00000000,00007F82), ref: 0069538D
                                            • LoadCursorW.USER32(00000000,00007F84), ref: 00695398
                                            • LoadCursorW.USER32(00000000,00007F04), ref: 006953A3
                                            • LoadCursorW.USER32(00000000,00007F02), ref: 006953AE
                                            • GetCursorInfo.USER32(?), ref: 006953BE
                                            • GetLastError.KERNEL32(00000001,00000000), ref: 006953E9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Cursor$Load$ErrorInfoLast
                                            • String ID:
                                            • API String ID: 3215588206-0
                                            • Opcode ID: f9bdd8ad18b577768036b5c032a848c953e77c16edd151380eace73332dad1c0
                                            • Instruction ID: 977bde2adf35a0bbf71d33502c49c70fea0c3e9c1ac79a18a7e115649461ed30
                                            • Opcode Fuzzy Hash: f9bdd8ad18b577768036b5c032a848c953e77c16edd151380eace73332dad1c0
                                            • Instruction Fuzzy Hash: D9417170E043196ADF509FBA8C4986EFFFDEF51B10F10452FA509E7290DAB8A4018FA1
                                            APIs
                                            • GetClassNameW.USER32(?,?,00000100), ref: 0067AAA5
                                            • __swprintf.LIBCMT ref: 0067AB46
                                            • _wcscmp.LIBCMT ref: 0067AB59
                                            • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0067ABAE
                                            • _wcscmp.LIBCMT ref: 0067ABEA
                                            • GetClassNameW.USER32(?,?,00000400), ref: 0067AC21
                                            • GetDlgCtrlID.USER32(?), ref: 0067AC73
                                            • GetWindowRect.USER32(?,?), ref: 0067ACA9
                                            • GetParent.USER32(?), ref: 0067ACC7
                                            • ScreenToClient.USER32(00000000), ref: 0067ACCE
                                            • GetClassNameW.USER32(?,?,00000100), ref: 0067AD48
                                            • _wcscmp.LIBCMT ref: 0067AD5C
                                            • GetWindowTextW.USER32(?,?,00000400), ref: 0067AD82
                                            • _wcscmp.LIBCMT ref: 0067AD96
                                              • Part of subcall function 0064386C: _iswctype.LIBCMT ref: 00643874
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                            • String ID: %s%u
                                            • API String ID: 3744389584-679674701
                                            • Opcode ID: d9d12b4e55209336db5596a8a5dc1d9dbe3864f47ab94ce26aa58e35d7527e46
                                            • Instruction ID: 5bedc084c75846d7ce45767ab14bf90cbaa4668cd27981669be003e3c3d4e451
                                            • Opcode Fuzzy Hash: d9d12b4e55209336db5596a8a5dc1d9dbe3864f47ab94ce26aa58e35d7527e46
                                            • Instruction Fuzzy Hash: 47A1A171204606AFD729DFA4C884BEEB7AAFF84315F10862DF99D92250D730E945CB92
                                            APIs
                                            • GetClassNameW.USER32(00000008,?,00000400), ref: 0067B3DB
                                            • _wcscmp.LIBCMT ref: 0067B3EC
                                            • GetWindowTextW.USER32(00000001,?,00000400), ref: 0067B414
                                            • CharUpperBuffW.USER32(?,00000000), ref: 0067B431
                                            • _wcscmp.LIBCMT ref: 0067B44F
                                            • _wcsstr.LIBCMT ref: 0067B460
                                            • GetClassNameW.USER32(00000018,?,00000400), ref: 0067B498
                                            • _wcscmp.LIBCMT ref: 0067B4A8
                                            • GetWindowTextW.USER32(00000002,?,00000400), ref: 0067B4CF
                                            • GetClassNameW.USER32(00000018,?,00000400), ref: 0067B518
                                            • _wcscmp.LIBCMT ref: 0067B528
                                            • GetClassNameW.USER32(00000010,?,00000400), ref: 0067B550
                                            • GetWindowRect.USER32(00000004,?), ref: 0067B5B9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                            • String ID: @$ThumbnailClass
                                            • API String ID: 1788623398-1539354611
                                            • Opcode ID: 768dacb45b3a87d47bd8f6a5a0c793039402a47ae85ecf8ebb11ea023d11fc4b
                                            • Instruction ID: f8e4aadbf2fe21abcee52ade861e3325937bfff5de0b75ada1887bd256a6222c
                                            • Opcode Fuzzy Hash: 768dacb45b3a87d47bd8f6a5a0c793039402a47ae85ecf8ebb11ea023d11fc4b
                                            • Instruction Fuzzy Hash: CF81AE710083059BEB04DF10D885FAA7BEAEF44314F08E56DFD899A296DB30DD49CBA1
                                            APIs
                                              • Part of subcall function 00622612: GetWindowLongW.USER32(?,000000EB), ref: 00622623
                                            • DragQueryPoint.SHELL32(?,?), ref: 006AC917
                                              • Part of subcall function 006AADF1: ClientToScreen.USER32(?,?), ref: 006AAE1A
                                              • Part of subcall function 006AADF1: GetWindowRect.USER32(?,?), ref: 006AAE90
                                              • Part of subcall function 006AADF1: PtInRect.USER32(?,?,006AC304), ref: 006AAEA0
                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 006AC980
                                            • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 006AC98B
                                            • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 006AC9AE
                                            • _wcscat.LIBCMT ref: 006AC9DE
                                            • SendMessageW.USER32(?,000000C2,00000001,?), ref: 006AC9F5
                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 006ACA0E
                                            • SendMessageW.USER32(?,000000B1,?,?), ref: 006ACA25
                                            • SendMessageW.USER32(?,000000B1,?,?), ref: 006ACA47
                                            • DragFinish.SHELL32(?), ref: 006ACA4E
                                            • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 006ACB41
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                            • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$prn
                                            • API String ID: 169749273-2044922903
                                            • Opcode ID: f9e3960e6ac0d495a282e1ce02ba7b613de84795111c1c89b7e7b1feeda8cf31
                                            • Instruction ID: 219e94d1c90a9ea495bb92295c0e714489cbaceacf5ed6ff756f89a9c7689b52
                                            • Opcode Fuzzy Hash: f9e3960e6ac0d495a282e1ce02ba7b613de84795111c1c89b7e7b1feeda8cf31
                                            • Instruction Fuzzy Hash: 15617D71508301AFC711EF64DC85D9BBBEAEF89710F04091EF591962A1DB30AA09CFA6
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: __wcsnicmp
                                            • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                            • API String ID: 1038674560-1810252412
                                            • Opcode ID: 8561ca81a14c69c73ea6de2b93229ca31ca2ce2c638793c13de68aae2b375b9c
                                            • Instruction ID: ecd12c60eef1bda8a01373a4425289f61aa46eb34463b0f735b05da88d70212f
                                            • Opcode Fuzzy Hash: 8561ca81a14c69c73ea6de2b93229ca31ca2ce2c638793c13de68aae2b375b9c
                                            • Instruction Fuzzy Hash: 2931D030A44215A6DB50FA60DD43FFE77B79F10750F20441EB415B22D2EF61AF04CA69
                                            APIs
                                            • LoadIconW.USER32(00000063), ref: 0067C4D4
                                            • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0067C4E6
                                            • SetWindowTextW.USER32(?,?), ref: 0067C4FD
                                            • GetDlgItem.USER32(?,000003EA), ref: 0067C512
                                            • SetWindowTextW.USER32(00000000,?), ref: 0067C518
                                            • GetDlgItem.USER32(?,000003E9), ref: 0067C528
                                            • SetWindowTextW.USER32(00000000,?), ref: 0067C52E
                                            • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 0067C54F
                                            • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 0067C569
                                            • GetWindowRect.USER32(?,?), ref: 0067C572
                                            • SetWindowTextW.USER32(?,?), ref: 0067C5DD
                                            • GetDesktopWindow.USER32 ref: 0067C5E3
                                            • GetWindowRect.USER32(00000000), ref: 0067C5EA
                                            • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 0067C636
                                            • GetClientRect.USER32(?,?), ref: 0067C643
                                            • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 0067C668
                                            • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 0067C693
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                            • String ID:
                                            • API String ID: 3869813825-0
                                            • Opcode ID: 05e8bf12655409b8011e89f68fbb643f8e87ba77ec7ebdf2aa50b27114bd3e4b
                                            • Instruction ID: 276edf7798572778550f43685826d1fc44f3411f47f9d252ec3cca4cfe617079
                                            • Opcode Fuzzy Hash: 05e8bf12655409b8011e89f68fbb643f8e87ba77ec7ebdf2aa50b27114bd3e4b
                                            • Instruction Fuzzy Hash: 83515D70900709AFDB20AFA8DD85BAEBBF6FB04715F00552CE686A26A0C775B914CF50
                                            APIs
                                            • _memset.LIBCMT ref: 006AA4C8
                                            • DestroyWindow.USER32(?,?), ref: 006AA542
                                              • Part of subcall function 00627D2C: _memmove.LIBCMT ref: 00627D66
                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 006AA5BC
                                            • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 006AA5DE
                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 006AA5F1
                                            • DestroyWindow.USER32(00000000), ref: 006AA613
                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00620000,00000000), ref: 006AA64A
                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 006AA663
                                            • GetDesktopWindow.USER32 ref: 006AA67C
                                            • GetWindowRect.USER32(00000000), ref: 006AA683
                                            • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 006AA69B
                                            • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 006AA6B3
                                              • Part of subcall function 006225DB: GetWindowLongW.USER32(?,000000EB), ref: 006225EC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                            • String ID: 0$tooltips_class32
                                            • API String ID: 1297703922-3619404913
                                            • Opcode ID: a69dc611e7786126557ecfb66a2e23e803fbf1edf9d913735ae31d1708c8b084
                                            • Instruction ID: 3f416e9550266728f9b804a31b32f915b9deb1475c9574d92818df24f55e3875
                                            • Opcode Fuzzy Hash: a69dc611e7786126557ecfb66a2e23e803fbf1edf9d913735ae31d1708c8b084
                                            • Instruction Fuzzy Hash: D6716A71140245AFD720EF68CC45FA67BE6EB9A300F08552EF985872A1D771ED02CF66
                                            APIs
                                            • CharUpperBuffW.USER32(?,?), ref: 006A46AB
                                            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 006A46F6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: BuffCharMessageSendUpper
                                            • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                            • API String ID: 3974292440-4258414348
                                            • Opcode ID: d37c7f9aea0ce5627660119d282b3eacac0b205b63213b66f6cd8be2a590752b
                                            • Instruction ID: febaebdf41fa53cdee8db11a4850fe6246a9887cfc866044f4efa8edc3a97538
                                            • Opcode Fuzzy Hash: d37c7f9aea0ce5627660119d282b3eacac0b205b63213b66f6cd8be2a590752b
                                            • Instruction Fuzzy Hash: 06918C346047118FCB54EF10D851AAABBA3AF85314F04886DF8965B3A2CF71ED4ACF95
                                            APIs
                                            • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 006ABB6E
                                            • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,006A9431), ref: 006ABBCA
                                            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 006ABC03
                                            • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 006ABC46
                                            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 006ABC7D
                                            • FreeLibrary.KERNEL32(?), ref: 006ABC89
                                            • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 006ABC99
                                            • DestroyIcon.USER32(?,?,?,?,?,006A9431), ref: 006ABCA8
                                            • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 006ABCC5
                                            • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 006ABCD1
                                              • Part of subcall function 0064313D: __wcsicmp_l.LIBCMT ref: 006431C6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                            • String ID: .dll$.exe$.icl
                                            • API String ID: 1212759294-1154884017
                                            • Opcode ID: ccfbf9a3c41e28945a39788906f0965622e5a52af6abc9180fbda5ce446b4299
                                            • Instruction ID: f0bc7cb714d145f4899a18f4a142e005b425f926ee88656bab1b888c0cf12166
                                            • Opcode Fuzzy Hash: ccfbf9a3c41e28945a39788906f0965622e5a52af6abc9180fbda5ce446b4299
                                            • Instruction Fuzzy Hash: 7661EF71900219BAEB14EF64CC41FFA77AAEB09721F105219F816D62D2DB74AD90CFA0
                                            APIs
                                            • LoadStringW.USER32(00000066,?,00000FFF,006AFB78), ref: 0068A0FC
                                              • Part of subcall function 00627F41: _memmove.LIBCMT ref: 00627F82
                                            • LoadStringW.USER32(?,?,00000FFF,?), ref: 0068A11E
                                            • __swprintf.LIBCMT ref: 0068A177
                                            • __swprintf.LIBCMT ref: 0068A190
                                            • _wprintf.LIBCMT ref: 0068A246
                                            • _wprintf.LIBCMT ref: 0068A264
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: LoadString__swprintf_wprintf$_memmove
                                            • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR$%k
                                            • API String ID: 311963372-3215148653
                                            • Opcode ID: 02768259816a36af3ffb6f86727f330db08e4f917f11822237c87bf2088b8f7e
                                            • Instruction ID: 10d41a3374f5a7411ca524082470b2e49d0b4cf4fc21095c0ef6ef2f05fc5d12
                                            • Opcode Fuzzy Hash: 02768259816a36af3ffb6f86727f330db08e4f917f11822237c87bf2088b8f7e
                                            • Instruction Fuzzy Hash: EA51BE3180061AAADF65FBE0DD96EEEB77AAF04300F14016AF505721A1EB312F48DF65
                                            APIs
                                              • Part of subcall function 00629997: __itow.LIBCMT ref: 006299C2
                                              • Part of subcall function 00629997: __swprintf.LIBCMT ref: 00629A0C
                                            • CharLowerBuffW.USER32(?,?), ref: 0068A636
                                            • GetDriveTypeW.KERNEL32 ref: 0068A683
                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0068A6CB
                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0068A702
                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0068A730
                                              • Part of subcall function 00627D2C: _memmove.LIBCMT ref: 00627D66
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                            • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                            • API String ID: 2698844021-4113822522
                                            • Opcode ID: 84b26023721b2b811b0b23dd3aa4a5a820bf0838cc2ede3dfc524d42f71471f3
                                            • Instruction ID: de9833533744d1f12ada710058387fa098871622c47bc2c2298f8c643ddf5b6c
                                            • Opcode Fuzzy Hash: 84b26023721b2b811b0b23dd3aa4a5a820bf0838cc2ede3dfc524d42f71471f3
                                            • Instruction Fuzzy Hash: 745168715087149FD740EF20D881C6AB7E6EF84318F04496DF88657261DB31EE0ACF52
                                            APIs
                                            • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0068A47A
                                            • __swprintf.LIBCMT ref: 0068A49C
                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 0068A4D9
                                            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0068A4FE
                                            • _memset.LIBCMT ref: 0068A51D
                                            • _wcsncpy.LIBCMT ref: 0068A559
                                            • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0068A58E
                                            • CloseHandle.KERNEL32(00000000), ref: 0068A599
                                            • RemoveDirectoryW.KERNEL32(?), ref: 0068A5A2
                                            • CloseHandle.KERNEL32(00000000), ref: 0068A5AC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                            • String ID: :$\$\??\%s
                                            • API String ID: 2733774712-3457252023
                                            • Opcode ID: 716660d4f794556e11a5ac36cb4b5e8a83f5d05467e79da0f633fbf5b9df63b6
                                            • Instruction ID: 0b7721421badbbbef2e7a7e58daaf4ca9545d61da3137f90cbcd14de7f133206
                                            • Opcode Fuzzy Hash: 716660d4f794556e11a5ac36cb4b5e8a83f5d05467e79da0f633fbf5b9df63b6
                                            • Instruction Fuzzy Hash: 7D31A0B1500119ABEB20AFE0DC49FEB73BEEF89701F1041B6F908D2160E77097858B66
                                            APIs
                                            • __wsplitpath.LIBCMT ref: 0068DC7B
                                            • _wcscat.LIBCMT ref: 0068DC93
                                            • _wcscat.LIBCMT ref: 0068DCA5
                                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0068DCBA
                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 0068DCCE
                                            • GetFileAttributesW.KERNEL32(?), ref: 0068DCE6
                                            • SetFileAttributesW.KERNEL32(?,00000000), ref: 0068DD00
                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 0068DD12
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                            • String ID: *.*
                                            • API String ID: 34673085-438819550
                                            • Opcode ID: cc329489c7373cbb95affb1651c8efb4f6d3c7e6ca133f3aca6e0b124c7cd6bd
                                            • Instruction ID: 7f4006c00aa265b4b88ce210272929f1a160934ae36057bfc8bd6f9555f3089b
                                            • Opcode Fuzzy Hash: cc329489c7373cbb95affb1651c8efb4f6d3c7e6ca133f3aca6e0b124c7cd6bd
                                            • Instruction Fuzzy Hash: A38190B15042419FCB60FF64C8459AAB7EABF88350F19892EF885C7391E770ED45CB62
                                            APIs
                                              • Part of subcall function 00622612: GetWindowLongW.USER32(?,000000EB), ref: 00622623
                                            • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 006AC4EC
                                            • GetFocus.USER32 ref: 006AC4FC
                                            • GetDlgCtrlID.USER32(00000000), ref: 006AC507
                                            • _memset.LIBCMT ref: 006AC632
                                            • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 006AC65D
                                            • GetMenuItemCount.USER32(?), ref: 006AC67D
                                            • GetMenuItemID.USER32(?,00000000), ref: 006AC690
                                            • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 006AC6C4
                                            • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 006AC70C
                                            • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 006AC744
                                            • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 006AC779
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                            • String ID: 0
                                            • API String ID: 1296962147-4108050209
                                            • Opcode ID: 49e17c81df8878566aa5c544cffeab5eb9fa7b9152df083eef1767a501d5c131
                                            • Instruction ID: 0c0ed937a50be83fd3dd53c6e35f82471e5496dba614028444ebb7a6a101d9be
                                            • Opcode Fuzzy Hash: 49e17c81df8878566aa5c544cffeab5eb9fa7b9152df083eef1767a501d5c131
                                            • Instruction Fuzzy Hash: 31818E705083119FDB20EF14C984AABBBE6FB9A364F00552DF99597291D730ED05CFA2
                                            APIs
                                              • Part of subcall function 0067874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00678766
                                              • Part of subcall function 0067874A: GetLastError.KERNEL32(?,0067822A,?,?,?), ref: 00678770
                                              • Part of subcall function 0067874A: GetProcessHeap.KERNEL32(00000008,?,?,0067822A,?,?,?), ref: 0067877F
                                              • Part of subcall function 0067874A: HeapAlloc.KERNEL32(00000000,?,0067822A,?,?,?), ref: 00678786
                                              • Part of subcall function 0067874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0067879D
                                              • Part of subcall function 006787E7: GetProcessHeap.KERNEL32(00000008,00678240,00000000,00000000,?,00678240,?), ref: 006787F3
                                              • Part of subcall function 006787E7: HeapAlloc.KERNEL32(00000000,?,00678240,?), ref: 006787FA
                                              • Part of subcall function 006787E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00678240,?), ref: 0067880B
                                            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00678458
                                            • _memset.LIBCMT ref: 0067846D
                                            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0067848C
                                            • GetLengthSid.ADVAPI32(?), ref: 0067849D
                                            • GetAce.ADVAPI32(?,00000000,?), ref: 006784DA
                                            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 006784F6
                                            • GetLengthSid.ADVAPI32(?), ref: 00678513
                                            • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00678522
                                            • HeapAlloc.KERNEL32(00000000), ref: 00678529
                                            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0067854A
                                            • CopySid.ADVAPI32(00000000), ref: 00678551
                                            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00678582
                                            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 006785A8
                                            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 006785BC
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                            • String ID:
                                            • API String ID: 3996160137-0
                                            • Opcode ID: b5bd96407f32e946e3a01fd03377d214d4fa8e9215bcdb14af72f21f529ec4f2
                                            • Instruction ID: 47306bf3de66098c3a21cef6da4607f6be52affe3cee352412fd857396951d3d
                                            • Opcode Fuzzy Hash: b5bd96407f32e946e3a01fd03377d214d4fa8e9215bcdb14af72f21f529ec4f2
                                            • Instruction Fuzzy Hash: 05611C7194010AAFDF149F94DC49AEEBBBAFF05300F148269F919A7291DB31AE05CF60
                                            APIs
                                            • GetDC.USER32(00000000), ref: 006976A2
                                            • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 006976AE
                                            • CreateCompatibleDC.GDI32(?), ref: 006976BA
                                            • SelectObject.GDI32(00000000,?), ref: 006976C7
                                            • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 0069771B
                                            • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00697757
                                            • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 0069777B
                                            • SelectObject.GDI32(00000006,?), ref: 00697783
                                            • DeleteObject.GDI32(?), ref: 0069778C
                                            • DeleteDC.GDI32(00000006), ref: 00697793
                                            • ReleaseDC.USER32(00000000,?), ref: 0069779E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                            • String ID: (
                                            • API String ID: 2598888154-3887548279
                                            • Opcode ID: 4d381703e2808d7686904090210d21f0e12b7eaf70d9655032353a764ffa0364
                                            • Instruction ID: acbc1ef13ea1c723d0d14bfd0da5ed752db6ab0574cc73180c77193a8e2ad15e
                                            • Opcode Fuzzy Hash: 4d381703e2808d7686904090210d21f0e12b7eaf70d9655032353a764ffa0364
                                            • Instruction Fuzzy Hash: 87513975904209EFCB15DFA8CC85EAEBBBAEF49710F14852DF94997210D731A941CF60
                                            APIs
                                              • Part of subcall function 00640B9B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00626C6C,?,00008000), ref: 00640BB7
                                              • Part of subcall function 006248AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,006248A1,?,?,006237C0,?), ref: 006248CE
                                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00626D0D
                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00626E5A
                                              • Part of subcall function 006259CD: _wcscpy.LIBCMT ref: 00625A05
                                              • Part of subcall function 0064387D: _iswctype.LIBCMT ref: 00643885
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                            • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                            • API String ID: 537147316-1018226102
                                            • Opcode ID: 34468c73e7dbc7e001664ce1fc03e118ffd6c1e55ca9ffe6cd3a085ab7beeae0
                                            • Instruction ID: 8c10ae9f777c8b6893473f25e3671dfa17e88a63f96e062f48b392e46ca6e131
                                            • Opcode Fuzzy Hash: 34468c73e7dbc7e001664ce1fc03e118ffd6c1e55ca9ffe6cd3a085ab7beeae0
                                            • Instruction Fuzzy Hash: D302AC311087519FCB64EF24D881AAFBBE6BF89314F04491DF886972A1DB31DA49CF46
                                            APIs
                                            • _memset.LIBCMT ref: 006245F9
                                            • GetMenuItemCount.USER32(006E6890), ref: 0065D7CD
                                            • GetMenuItemCount.USER32(006E6890), ref: 0065D87D
                                            • GetCursorPos.USER32(?), ref: 0065D8C1
                                            • SetForegroundWindow.USER32(00000000), ref: 0065D8CA
                                            • TrackPopupMenuEx.USER32(006E6890,00000000,?,00000000,00000000,00000000), ref: 0065D8DD
                                            • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 0065D8E9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                                            • String ID:
                                            • API String ID: 2751501086-0
                                            • Opcode ID: 1a1dc0218f5ef9eb530b3318b973694328ae577e7cb7d4aca202f2d0afc61422
                                            • Instruction ID: b3f9c5bf6c66bce16c74dbea6f05a748d87af599c2d9bd2d24404764906c0221
                                            • Opcode Fuzzy Hash: 1a1dc0218f5ef9eb530b3318b973694328ae577e7cb7d4aca202f2d0afc61422
                                            • Instruction Fuzzy Hash: 86712430601216BFEB309F54DC85FEABF66FF05365F200216F915A62E1CBB16814DB95
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 00698BEC
                                            • CoInitialize.OLE32(00000000), ref: 00698C19
                                            • CoUninitialize.OLE32 ref: 00698C23
                                            • GetRunningObjectTable.OLE32(00000000,?), ref: 00698D23
                                            • SetErrorMode.KERNEL32(00000001,00000029), ref: 00698E50
                                            • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,006B2C0C), ref: 00698E84
                                            • CoGetObject.OLE32(?,00000000,006B2C0C,?), ref: 00698EA7
                                            • SetErrorMode.KERNEL32(00000000), ref: 00698EBA
                                            • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00698F3A
                                            • VariantClear.OLEAUT32(?), ref: 00698F4A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                            • String ID: ,,k
                                            • API String ID: 2395222682-759674344
                                            • Opcode ID: 2c24d4f3895ac7f0f4b8c85ec28a20fc112861637f037b05e21c9efe47784191
                                            • Instruction ID: 837eb80d5f06adf6b9933c36bf8e68c14353ddce52952e365600033b3116ac30
                                            • Opcode Fuzzy Hash: 2c24d4f3895ac7f0f4b8c85ec28a20fc112861637f037b05e21c9efe47784191
                                            • Instruction Fuzzy Hash: C2C125B1208305AFDB40EF64C88496BB7EAFF8A348F10495DF5899B251DB31ED05CB52
                                            APIs
                                            • CharUpperBuffW.USER32(?,?,?,?,?,?,?,006A0038,?,?), ref: 006A10BC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: BuffCharUpper
                                            • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                            • API String ID: 3964851224-909552448
                                            • Opcode ID: 37d0da43c88873b12f571fea9f83dc5db37f63a7b577c946c8ea505487e7e783
                                            • Instruction ID: cf50ee6a7867a4248aee5b821e461abf5cf865a1c80eed0f7004c8df43148881
                                            • Opcode Fuzzy Hash: 37d0da43c88873b12f571fea9f83dc5db37f63a7b577c946c8ea505487e7e783
                                            • Instruction Fuzzy Hash: 3541483090026ACBDF10EF90DC91AEA3727AF13340F104469EDA15B396DB31AE5ACF64
                                            APIs
                                              • Part of subcall function 00627D2C: _memmove.LIBCMT ref: 00627D66
                                              • Part of subcall function 00627A84: _memmove.LIBCMT ref: 00627B0D
                                            • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 006855D2
                                            • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 006855E8
                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 006855F9
                                            • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0068560B
                                            • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0068561C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: SendString$_memmove
                                            • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                            • API String ID: 2279737902-1007645807
                                            • Opcode ID: 90956c409bb6ad46b349afec09e8f249d7a99cfddfd6ca70b972ec4236841894
                                            • Instruction ID: c08d31c728c7aae8b1f5b64edfb0015d787b67873dcbf6b6947158a243363fee
                                            • Opcode Fuzzy Hash: 90956c409bb6ad46b349afec09e8f249d7a99cfddfd6ca70b972ec4236841894
                                            • Instruction Fuzzy Hash: DB11E23099456979D720B6A1DC4ACFF7B7FEF91B00F41052AB401E21D1EE601D45CAB2
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                            • String ID: 0.0.0.0
                                            • API String ID: 208665112-3771769585
                                            • Opcode ID: 264834c9d9c5158e8f304e26b38c5585a685a7a28c61f9f1837f33fe97b05819
                                            • Instruction ID: 817315f2d4feaebba87ce5c6d52f213d4400069fa2b16f8b07fadd364dc8550b
                                            • Opcode Fuzzy Hash: 264834c9d9c5158e8f304e26b38c5585a685a7a28c61f9f1837f33fe97b05819
                                            • Instruction Fuzzy Hash: 07110531904116ABCB70FB64EC06EDB77BE9F02710F01027AF40996151EF749A81CB66
                                            APIs
                                            • timeGetTime.WINMM ref: 0068521C
                                              • Part of subcall function 00640719: timeGetTime.WINMM(?,75A8B400,00630FF9), ref: 0064071D
                                            • Sleep.KERNEL32(0000000A), ref: 00685248
                                            • EnumThreadWindows.USER32(?,Function_000651CA,00000000), ref: 0068526C
                                            • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 0068528E
                                            • SetActiveWindow.USER32 ref: 006852AD
                                            • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 006852BB
                                            • SendMessageW.USER32(00000010,00000000,00000000), ref: 006852DA
                                            • Sleep.KERNEL32(000000FA), ref: 006852E5
                                            • IsWindow.USER32 ref: 006852F1
                                            • EndDialog.USER32(00000000), ref: 00685302
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                            • String ID: BUTTON
                                            • API String ID: 1194449130-3405671355
                                            • Opcode ID: fa0afd035e82b90a01558ecfb323452aa02453dad061a08d9297551a6cb2e15f
                                            • Instruction ID: bda176ce0c2c4ef39b29f114548f167164f99335bd3b68ebcb8c195a539b2f2c
                                            • Opcode Fuzzy Hash: fa0afd035e82b90a01558ecfb323452aa02453dad061a08d9297551a6cb2e15f
                                            • Instruction Fuzzy Hash: 63218470204B44AFE7007FA0EDC9A753BABEB56396F043529F10285271DF61AD458F62
                                            APIs
                                              • Part of subcall function 00629997: __itow.LIBCMT ref: 006299C2
                                              • Part of subcall function 00629997: __swprintf.LIBCMT ref: 00629A0C
                                            • CoInitialize.OLE32(00000000), ref: 0068D855
                                            • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 0068D8E8
                                            • SHGetDesktopFolder.SHELL32(?), ref: 0068D8FC
                                            • CoCreateInstance.OLE32(006B2D7C,00000000,00000001,006DA89C,?), ref: 0068D948
                                            • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 0068D9B7
                                            • CoTaskMemFree.OLE32(?,?), ref: 0068DA0F
                                            • _memset.LIBCMT ref: 0068DA4C
                                            • SHBrowseForFolderW.SHELL32(?), ref: 0068DA88
                                            • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 0068DAAB
                                            • CoTaskMemFree.OLE32(00000000), ref: 0068DAB2
                                            • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 0068DAE9
                                            • CoUninitialize.OLE32(00000001,00000000), ref: 0068DAEB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                            • String ID:
                                            • API String ID: 1246142700-0
                                            • Opcode ID: e8e311213c740639d4b5a0c4b99c96e7655d211344e510bc566664cf5635090e
                                            • Instruction ID: 52e1397a115c29d4dd6a79f32cd0452255133919e3252f532afa17e9d736d611
                                            • Opcode Fuzzy Hash: e8e311213c740639d4b5a0c4b99c96e7655d211344e510bc566664cf5635090e
                                            • Instruction Fuzzy Hash: 29B1FA75A00119AFDB44EFA4C884DAEBBFAEF49314F148569F809EB251DB30AD41CF64
                                            APIs
                                            • GetKeyboardState.USER32(?), ref: 006805A7
                                            • SetKeyboardState.USER32(?), ref: 00680612
                                            • GetAsyncKeyState.USER32(000000A0), ref: 00680632
                                            • GetKeyState.USER32(000000A0), ref: 00680649
                                            • GetAsyncKeyState.USER32(000000A1), ref: 00680678
                                            • GetKeyState.USER32(000000A1), ref: 00680689
                                            • GetAsyncKeyState.USER32(00000011), ref: 006806B5
                                            • GetKeyState.USER32(00000011), ref: 006806C3
                                            • GetAsyncKeyState.USER32(00000012), ref: 006806EC
                                            • GetKeyState.USER32(00000012), ref: 006806FA
                                            • GetAsyncKeyState.USER32(0000005B), ref: 00680723
                                            • GetKeyState.USER32(0000005B), ref: 00680731
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: State$Async$Keyboard
                                            • String ID:
                                            • API String ID: 541375521-0
                                            • Opcode ID: 3cb871cbbe6c2011070fd17f8bd263958b1ab48960c5a49f03cc37800a6d28d7
                                            • Instruction ID: acbc9aa18d30084960543314f15a7f7f870752063331dcf3b56d91a4d80efb0d
                                            • Opcode Fuzzy Hash: 3cb871cbbe6c2011070fd17f8bd263958b1ab48960c5a49f03cc37800a6d28d7
                                            • Instruction Fuzzy Hash: 16512E70A0478419FB74FBB085557EABFB69F02340F084B9DD5C25A2C2D654AB8CCF66
                                            APIs
                                            • GetDlgItem.USER32(?,00000001), ref: 0067C746
                                            • GetWindowRect.USER32(00000000,?), ref: 0067C758
                                            • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0067C7B6
                                            • GetDlgItem.USER32(?,00000002), ref: 0067C7C1
                                            • GetWindowRect.USER32(00000000,?), ref: 0067C7D3
                                            • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0067C827
                                            • GetDlgItem.USER32(?,000003E9), ref: 0067C835
                                            • GetWindowRect.USER32(00000000,?), ref: 0067C846
                                            • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0067C889
                                            • GetDlgItem.USER32(?,000003EA), ref: 0067C897
                                            • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0067C8B4
                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 0067C8C1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Window$ItemMoveRect$Invalidate
                                            • String ID:
                                            • API String ID: 3096461208-0
                                            • Opcode ID: 327f7aed521c79fa04d3ee8c8460044237c6ef537b2122fe9d81a409252e6934
                                            • Instruction ID: 77ff5c52580631bcc440107842ed08e56e8e49e741daa4e3b711d1783c858c13
                                            • Opcode Fuzzy Hash: 327f7aed521c79fa04d3ee8c8460044237c6ef537b2122fe9d81a409252e6934
                                            • Instruction Fuzzy Hash: 64514371B00205AFDB18DFA9DD95AAEBBB6EB89310F14812DF51AD7290D770AD40CB50
                                            APIs
                                              • Part of subcall function 00621B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00622036,?,00000000,?,?,?,?,006216CB,00000000,?), ref: 00621B9A
                                            • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 006220D3
                                            • KillTimer.USER32(-00000001,?,?,?,?,006216CB,00000000,?,?,00621AE2,?,?), ref: 0062216E
                                            • DestroyAcceleratorTable.USER32(00000000), ref: 0065BEF6
                                            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,006216CB,00000000,?,?,00621AE2,?,?), ref: 0065BF27
                                            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,006216CB,00000000,?,?,00621AE2,?,?), ref: 0065BF3E
                                            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,006216CB,00000000,?,?,00621AE2,?,?), ref: 0065BF5A
                                            • DeleteObject.GDI32(00000000), ref: 0065BF6C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                            • String ID:
                                            • API String ID: 641708696-0
                                            • Opcode ID: 481596c54a14de722e3122a30671dd1365cc60e43ffd60954ea1fb808521aec9
                                            • Instruction ID: fa91d6223c61a66cfba790ea2a61f96bc3a644b55f6c3b528712729ae26019ae
                                            • Opcode Fuzzy Hash: 481596c54a14de722e3122a30671dd1365cc60e43ffd60954ea1fb808521aec9
                                            • Instruction Fuzzy Hash: E4618E31100B62EFCB35AF14ED98B6AB7F3FB51312F10652CE9824A660C771A895DF91
                                            APIs
                                              • Part of subcall function 006225DB: GetWindowLongW.USER32(?,000000EB), ref: 006225EC
                                            • GetSysColor.USER32(0000000F), ref: 006221D3
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ColorLongWindow
                                            • String ID:
                                            • API String ID: 259745315-0
                                            • Opcode ID: 49bf167dd7ddd5ebf515dd3017abc48472d04863c2e6dc1395b3066b1b7a84db
                                            • Instruction ID: 87b76028228e84de4c480eb0228e2b9c79b542de9b3b54992cb39d7ad9692867
                                            • Opcode Fuzzy Hash: 49bf167dd7ddd5ebf515dd3017abc48472d04863c2e6dc1395b3066b1b7a84db
                                            • Instruction Fuzzy Hash: 8F41A131001A51EEDB255F68EC98BB93B67EB06331F144365FD659A2E2C7328D42DF22
                                            APIs
                                            • CharLowerBuffW.USER32(?,?,006AF910), ref: 0068AB76
                                            • GetDriveTypeW.KERNEL32(00000061,006DA620,00000061), ref: 0068AC40
                                            • _wcscpy.LIBCMT ref: 0068AC6A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: BuffCharDriveLowerType_wcscpy
                                            • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                            • API String ID: 2820617543-1000479233
                                            • Opcode ID: ee5438ece205991e730e812f18de252db446abb32e0b2948304b631ab13dfdca
                                            • Instruction ID: 807f813daefea903b2ef00283d9697fe314b7e6f658628fca47777f4d128845d
                                            • Opcode Fuzzy Hash: ee5438ece205991e730e812f18de252db446abb32e0b2948304b631ab13dfdca
                                            • Instruction Fuzzy Hash: AD51B0305083119BD750FF94D891EAAB7A7EF84300F14492EF986972A2DB31DD0ACB53
                                            APIs
                                              • Part of subcall function 00622612: GetWindowLongW.USER32(?,000000EB), ref: 00622623
                                              • Part of subcall function 00622344: GetCursorPos.USER32(?), ref: 00622357
                                              • Part of subcall function 00622344: ScreenToClient.USER32(006E67B0,?), ref: 00622374
                                              • Part of subcall function 00622344: GetAsyncKeyState.USER32(00000001), ref: 00622399
                                              • Part of subcall function 00622344: GetAsyncKeyState.USER32(00000002), ref: 006223A7
                                            • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 006AC2E4
                                            • ImageList_EndDrag.COMCTL32 ref: 006AC2EA
                                            • ReleaseCapture.USER32 ref: 006AC2F0
                                            • SetWindowTextW.USER32(?,00000000), ref: 006AC39A
                                            • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 006AC3AD
                                            • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 006AC48F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                            • String ID: @GUI_DRAGFILE$@GUI_DROPID$prn$prn
                                            • API String ID: 1924731296-1112027532
                                            • Opcode ID: e23002624684d395d572eec5b5420d9dbfe80aa638e44eabc49924d6b7f122cb
                                            • Instruction ID: 25b932ad10b0b7294cf6fe650742a79590f4134801bfe0bdd952afeebec85b3d
                                            • Opcode Fuzzy Hash: e23002624684d395d572eec5b5420d9dbfe80aa638e44eabc49924d6b7f122cb
                                            • Instruction Fuzzy Hash: 1F51AB70204304AFDB10EF24DC96FAA7BE6EB99310F00452DF5918B2E1CB70A948DF66
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: __i64tow__itow__swprintf
                                            • String ID: %.15g$0x%p$False$True
                                            • API String ID: 421087845-2263619337
                                            • Opcode ID: d41b369dd1917dbd9017019e5aefda0da1f33adf5f7b81b9e3838b2e8c100e05
                                            • Instruction ID: 03334493aeaaf74a88d8e5dc76f0963eb600693aec3fe9d5ad9daa934fdbf616
                                            • Opcode Fuzzy Hash: d41b369dd1917dbd9017019e5aefda0da1f33adf5f7b81b9e3838b2e8c100e05
                                            • Instruction Fuzzy Hash: 70412671904A15AFDB24EB38E842E7673EBEF48310F24446FE949D7381EA319846CB11
                                            APIs
                                            • _memset.LIBCMT ref: 006A73D9
                                            • CreateMenu.USER32 ref: 006A73F4
                                            • SetMenu.USER32(?,00000000), ref: 006A7403
                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 006A7490
                                            • IsMenu.USER32(?), ref: 006A74A6
                                            • CreatePopupMenu.USER32 ref: 006A74B0
                                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 006A74DD
                                            • DrawMenuBar.USER32 ref: 006A74E5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                            • String ID: 0$F
                                            • API String ID: 176399719-3044882817
                                            • Opcode ID: 1b06e005db065580d59cb5fd81d3f342b4e55b5f732ade61620cdaaca6a47dc1
                                            • Instruction ID: 0e6fdfae757e37fc32ec1fa535b9e02d20b3b1cc37dddf25bc426a8cecba0266
                                            • Opcode Fuzzy Hash: 1b06e005db065580d59cb5fd81d3f342b4e55b5f732ade61620cdaaca6a47dc1
                                            • Instruction Fuzzy Hash: D7412274A00209EFDB20EFA4D984A9ABBFAFF5A340F144428E95597360D731AD10CF60
                                            APIs
                                            • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 006A77CD
                                            • CreateCompatibleDC.GDI32(00000000), ref: 006A77D4
                                            • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 006A77E7
                                            • SelectObject.GDI32(00000000,00000000), ref: 006A77EF
                                            • GetPixel.GDI32(00000000,00000000,00000000), ref: 006A77FA
                                            • DeleteDC.GDI32(00000000), ref: 006A7803
                                            • GetWindowLongW.USER32(?,000000EC), ref: 006A780D
                                            • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 006A7821
                                            • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 006A782D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                            • String ID: static
                                            • API String ID: 2559357485-2160076837
                                            • Opcode ID: f87e8e44a030b5b8381b7106f2e95a3438b1e757cdd368e1fc7c811094bc1fee
                                            • Instruction ID: 6df8800d0d8e67f3ece4a44764a97a4f5d738d3d7796a6c7be8b447524a3b560
                                            • Opcode Fuzzy Hash: f87e8e44a030b5b8381b7106f2e95a3438b1e757cdd368e1fc7c811094bc1fee
                                            • Instruction Fuzzy Hash: D9316A32105215ABDF11AFA4DC09FDB3B6AEF0A321F111224FA55A61A0C775EC21DFA5
                                            APIs
                                            • _memset.LIBCMT ref: 0064707B
                                              • Part of subcall function 00648D68: __getptd_noexit.LIBCMT ref: 00648D68
                                            • __gmtime64_s.LIBCMT ref: 00647114
                                            • __gmtime64_s.LIBCMT ref: 0064714A
                                            • __gmtime64_s.LIBCMT ref: 00647167
                                            • __allrem.LIBCMT ref: 006471BD
                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006471D9
                                            • __allrem.LIBCMT ref: 006471F0
                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0064720E
                                            • __allrem.LIBCMT ref: 00647225
                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00647243
                                            • __invoke_watson.LIBCMT ref: 006472B4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                            • String ID:
                                            • API String ID: 384356119-0
                                            • Opcode ID: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                                            • Instruction ID: ea4b9f906cfef822598968d03410cf81a4b1e6d513d7f793be4e5f4a03023a14
                                            • Opcode Fuzzy Hash: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                                            • Instruction Fuzzy Hash: 977128B1A04717ABD7149E79CC41B9BB3AAAF10764F14423EF814E7381E770EB448794
                                            APIs
                                            • _memset.LIBCMT ref: 00682A31
                                            • GetMenuItemInfoW.USER32(006E6890,000000FF,00000000,00000030), ref: 00682A92
                                            • SetMenuItemInfoW.USER32(006E6890,00000004,00000000,00000030), ref: 00682AC8
                                            • Sleep.KERNEL32(000001F4), ref: 00682ADA
                                            • GetMenuItemCount.USER32(?), ref: 00682B1E
                                            • GetMenuItemID.USER32(?,00000000), ref: 00682B3A
                                            • GetMenuItemID.USER32(?,-00000001), ref: 00682B64
                                            • GetMenuItemID.USER32(?,?), ref: 00682BA9
                                            • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00682BEF
                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00682C03
                                            • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00682C24
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                            • String ID:
                                            • API String ID: 4176008265-0
                                            • Opcode ID: b6f1f06656b568e85566c97f76b979158991df671111d7c7361f54f9284f4d83
                                            • Instruction ID: bf85070a72e671ca34496d3c7dc30640240ccf88183d067760a546211853756c
                                            • Opcode Fuzzy Hash: b6f1f06656b568e85566c97f76b979158991df671111d7c7361f54f9284f4d83
                                            • Instruction Fuzzy Hash: 3461B0B090124AAFDB21EFA4C8A8DFE7BBAFF11308F140659F84197251D731AD46DB21
                                            APIs
                                            • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 006A7214
                                            • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 006A7217
                                            • GetWindowLongW.USER32(?,000000F0), ref: 006A723B
                                            • _memset.LIBCMT ref: 006A724C
                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 006A725E
                                            • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 006A72D6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: MessageSend$LongWindow_memset
                                            • String ID:
                                            • API String ID: 830647256-0
                                            • Opcode ID: 33ab92a2cfd4e7d18ec690bac069db42d38c85e282120792ac9d5e851966978f
                                            • Instruction ID: 052f31dba630f21f2260b092cd2482f843c573bac29fc43fdf0740af2aa56635
                                            • Opcode Fuzzy Hash: 33ab92a2cfd4e7d18ec690bac069db42d38c85e282120792ac9d5e851966978f
                                            • Instruction Fuzzy Hash: 8D616C71900248AFDB10EFA4CC81EEE77FAAB0A710F144159FA15AB3A1D770AD45DF64
                                            APIs
                                            • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00677135
                                            • SafeArrayAllocData.OLEAUT32(?), ref: 0067718E
                                            • VariantInit.OLEAUT32(?), ref: 006771A0
                                            • SafeArrayAccessData.OLEAUT32(?,?), ref: 006771C0
                                            • VariantCopy.OLEAUT32(?,?), ref: 00677213
                                            • SafeArrayUnaccessData.OLEAUT32(?), ref: 00677227
                                            • VariantClear.OLEAUT32(?), ref: 0067723C
                                            • SafeArrayDestroyData.OLEAUT32(?), ref: 00677249
                                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00677252
                                            • VariantClear.OLEAUT32(?), ref: 00677264
                                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0067726F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                            • String ID:
                                            • API String ID: 2706829360-0
                                            • Opcode ID: 87f618a1154c17d70b3d864c0f6127e7f3517f96095b5e20b7321fcb6fad43e5
                                            • Instruction ID: bce6d2c45ee2cd9d97e074d8366a3dfecc9480d73ef2c874d28d6d4174d79b0c
                                            • Opcode Fuzzy Hash: 87f618a1154c17d70b3d864c0f6127e7f3517f96095b5e20b7321fcb6fad43e5
                                            • Instruction Fuzzy Hash: A0414235A042199FCB00EFA4D8449AEBBFAFF48354F00C069F955E7262DB30AA45CF91
                                            APIs
                                              • Part of subcall function 00629997: __itow.LIBCMT ref: 006299C2
                                              • Part of subcall function 00629997: __swprintf.LIBCMT ref: 00629A0C
                                            • CoInitialize.OLE32 ref: 00698718
                                            • CoUninitialize.OLE32 ref: 00698723
                                            • CoCreateInstance.OLE32(?,00000000,00000017,006B2BEC,?), ref: 00698783
                                            • IIDFromString.OLE32(?,?), ref: 006987F6
                                            • VariantInit.OLEAUT32(?), ref: 00698890
                                            • VariantClear.OLEAUT32(?), ref: 006988F1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                            • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                            • API String ID: 834269672-1287834457
                                            • Opcode ID: 3e8b091b28f6cac2efd50569d672db840fc14707b8b7ee0c00d961479c45ae44
                                            • Instruction ID: 1f79698e57bd013acc81306edb6ce38c8e890a99572c72f37f8a7bc148653a39
                                            • Opcode Fuzzy Hash: 3e8b091b28f6cac2efd50569d672db840fc14707b8b7ee0c00d961479c45ae44
                                            • Instruction Fuzzy Hash: BC61E1706087119FDB10DF64C944B6EB7EAAF8A714F10481DF8859B791CB30ED44CBA6
                                            APIs
                                            • WSAStartup.WSOCK32(00000101,?), ref: 00695AA6
                                            • inet_addr.WSOCK32(?), ref: 00695AEB
                                            • gethostbyname.WSOCK32(?), ref: 00695AF7
                                            • IcmpCreateFile.IPHLPAPI ref: 00695B05
                                            • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00695B75
                                            • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00695B8B
                                            • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00695C00
                                            • WSACleanup.WSOCK32 ref: 00695C06
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                            • String ID: Ping
                                            • API String ID: 1028309954-2246546115
                                            • Opcode ID: 8289bcf96f1585da2866e4b37446198339b33eca8a73300c9a847e84f3223dbb
                                            • Instruction ID: 8b743bffe6ef708dc5b8d88d3d11e4d4d7ad6695955d00f460fd34d8ce1ae4ca
                                            • Opcode Fuzzy Hash: 8289bcf96f1585da2866e4b37446198339b33eca8a73300c9a847e84f3223dbb
                                            • Instruction Fuzzy Hash: 3F519E31604B109FDB21AF24DC55B6AB7EAEF48310F04892AF956DB2A1DB70EC01CF56
                                            APIs
                                            • SetErrorMode.KERNEL32(00000001), ref: 0068B73B
                                            • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 0068B7B1
                                            • GetLastError.KERNEL32 ref: 0068B7BB
                                            • SetErrorMode.KERNEL32(00000000,READY), ref: 0068B828
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Error$Mode$DiskFreeLastSpace
                                            • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                            • API String ID: 4194297153-14809454
                                            • Opcode ID: 0fc4fc2688605bf60fa37e9d4a4db5a09b67504ee1c7203ec7b347e982e85f6f
                                            • Instruction ID: 9f2d78a97057807122563fec88190a8a6ed491dfb008080f176f256bea6e8317
                                            • Opcode Fuzzy Hash: 0fc4fc2688605bf60fa37e9d4a4db5a09b67504ee1c7203ec7b347e982e85f6f
                                            • Instruction Fuzzy Hash: C6319235A002059FDB10FFA4D885AFE7BBAEF85700F14912AF902D7391DB71A946CB51
                                            APIs
                                              • Part of subcall function 00627F41: _memmove.LIBCMT ref: 00627F82
                                              • Part of subcall function 0067B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0067B0E7
                                            • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 006794F6
                                            • GetDlgCtrlID.USER32 ref: 00679501
                                            • GetParent.USER32 ref: 0067951D
                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00679520
                                            • GetDlgCtrlID.USER32(?), ref: 00679529
                                            • GetParent.USER32(?), ref: 00679545
                                            • SendMessageW.USER32(00000000,?,?,00000111), ref: 00679548
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: MessageSend$CtrlParent$ClassName_memmove
                                            • String ID: ComboBox$ListBox
                                            • API String ID: 1536045017-1403004172
                                            • Opcode ID: 5704227f27144a0956f2d746a092dfc44f53dee14e81ce874c64b2eb72d2db2a
                                            • Instruction ID: 80a7e4a4e5fbfdd12a46673b792b4076928cce70dfe73fa57a433b3a572fcb35
                                            • Opcode Fuzzy Hash: 5704227f27144a0956f2d746a092dfc44f53dee14e81ce874c64b2eb72d2db2a
                                            • Instruction Fuzzy Hash: AB21F170D00204BBDF00ABA4CC85EFEBBB7EF4A300F105129B922972A2DB755919DF60
                                            APIs
                                              • Part of subcall function 00627F41: _memmove.LIBCMT ref: 00627F82
                                              • Part of subcall function 0067B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0067B0E7
                                            • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 006795DF
                                            • GetDlgCtrlID.USER32 ref: 006795EA
                                            • GetParent.USER32 ref: 00679606
                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00679609
                                            • GetDlgCtrlID.USER32(?), ref: 00679612
                                            • GetParent.USER32(?), ref: 0067962E
                                            • SendMessageW.USER32(00000000,?,?,00000111), ref: 00679631
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: MessageSend$CtrlParent$ClassName_memmove
                                            • String ID: ComboBox$ListBox
                                            • API String ID: 1536045017-1403004172
                                            • Opcode ID: 8ffbb0ca5bb66422df300eb99a9d5a35a6d30e11f677118f5b46053c84bda403
                                            • Instruction ID: 0ec001b2e0fbbe1493884ca4349e792461cf91efd14cc5ef2099a88647cf761d
                                            • Opcode Fuzzy Hash: 8ffbb0ca5bb66422df300eb99a9d5a35a6d30e11f677118f5b46053c84bda403
                                            • Instruction Fuzzy Hash: 9A21B374900204BBDF01ABB4CC85EFEBBBAEF49300F105159B911972A1DB759919DF70
                                            APIs
                                            • GetParent.USER32 ref: 00679651
                                            • GetClassNameW.USER32(00000000,?,00000100), ref: 00679666
                                            • _wcscmp.LIBCMT ref: 00679678
                                            • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 006796F3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ClassMessageNameParentSend_wcscmp
                                            • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                            • API String ID: 1704125052-3381328864
                                            • Opcode ID: c5dbd8fecdbc2e2096567145bd9c7dbabcc999ef8ff6f22add374c9450412f0b
                                            • Instruction ID: c3858fd16061e3e49467704adccb02fa397233c74827e1b13b26ee1dbbcaef01
                                            • Opcode Fuzzy Hash: c5dbd8fecdbc2e2096567145bd9c7dbabcc999ef8ff6f22add374c9450412f0b
                                            • Instruction Fuzzy Hash: 3A112976648317BAFB052620EC07DE677DFDB05364F20422BFA04E56D1FEA269114ABC
                                            APIs
                                            • __swprintf.LIBCMT ref: 0068419D
                                            • __swprintf.LIBCMT ref: 006841AA
                                              • Part of subcall function 006438D8: __woutput_l.LIBCMT ref: 00643931
                                            • FindResourceW.KERNEL32(?,?,0000000E), ref: 006841D4
                                            • LoadResource.KERNEL32(?,00000000), ref: 006841E0
                                            • LockResource.KERNEL32(00000000), ref: 006841ED
                                            • FindResourceW.KERNEL32(?,?,00000003), ref: 0068420D
                                            • LoadResource.KERNEL32(?,00000000), ref: 0068421F
                                            • SizeofResource.KERNEL32(?,00000000), ref: 0068422E
                                            • LockResource.KERNEL32(?), ref: 0068423A
                                            • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 0068429B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                            • String ID:
                                            • API String ID: 1433390588-0
                                            • Opcode ID: 98579bb70e89a1b17d17a1bedf597b2c7e3cc4ddc41b0cd8a17f4f5efb1bc064
                                            • Instruction ID: 91c852b48c5f8c4393cff7034de4b97a3bd0cac2f3443490049c5ee78f35c4f9
                                            • Opcode Fuzzy Hash: 98579bb70e89a1b17d17a1bedf597b2c7e3cc4ddc41b0cd8a17f4f5efb1bc064
                                            • Instruction Fuzzy Hash: 9031927160921BAFDB11AFA0DC58EBF7BAEEF05301F004625F905D6250EB30DA519BA1
                                            APIs
                                            • GetCurrentThreadId.KERNEL32 ref: 00681700
                                            • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00680778,?,00000001), ref: 00681714
                                            • GetWindowThreadProcessId.USER32(00000000), ref: 0068171B
                                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00680778,?,00000001), ref: 0068172A
                                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 0068173C
                                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00680778,?,00000001), ref: 00681755
                                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00680778,?,00000001), ref: 00681767
                                            • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00680778,?,00000001), ref: 006817AC
                                            • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00680778,?,00000001), ref: 006817C1
                                            • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00680778,?,00000001), ref: 006817CC
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                            • String ID:
                                            • API String ID: 2156557900-0
                                            • Opcode ID: 7bea1ecee5a43a616cd04a253fd362dff8e5303163aa88c67593ca9da48e704e
                                            • Instruction ID: 9bbfa581dc8510d7067eb6b9b1207f0970c7c0e8d1403938de7ec6e98f741b11
                                            • Opcode Fuzzy Hash: 7bea1ecee5a43a616cd04a253fd362dff8e5303163aa88c67593ca9da48e704e
                                            • Instruction Fuzzy Hash: 88318E75604304ABEB21AF54DC84FA97BAFAB56711F105129F904CE3A0E7B4AD428F61
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Variant$ClearInit$_memset
                                            • String ID: ,,k$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                            • API String ID: 2862541840-852925445
                                            • Opcode ID: d0b9fcdca7a3249ab662e2879a08c9c6c892dfa529393f238df7569e98dc7be1
                                            • Instruction ID: 8e23e1ed2da3c1c2d7ee780241ba821b1f5b27891ff87988df73c375c838abb2
                                            • Opcode Fuzzy Hash: d0b9fcdca7a3249ab662e2879a08c9c6c892dfa529393f238df7569e98dc7be1
                                            • Instruction Fuzzy Hash: 15917B71A00215ABDF24DFA9C844FAEBBBAEF85714F10815EF515AB280D7709945CFB0
                                            APIs
                                            • EnumChildWindows.USER32(?,0067AA64), ref: 0067A9A2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ChildEnumWindows
                                            • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                            • API String ID: 3555792229-1603158881
                                            • Opcode ID: db7779344547295569532599b5ebbb591926dd687aaa9e0265b24d3cc86a606b
                                            • Instruction ID: fb354399eede450cba41dfbc520e3d94e91001f1272a052746de2f8f07088e5a
                                            • Opcode Fuzzy Hash: db7779344547295569532599b5ebbb591926dd687aaa9e0265b24d3cc86a606b
                                            • Instruction Fuzzy Hash: F2918430A006169ADB58DFA0C481BEDFB77BF44314F10C11DE99EA7251DB30A95ACBA5
                                            APIs
                                            • SetWindowLongW.USER32(?,000000EB), ref: 00622EAE
                                              • Part of subcall function 00621DB3: GetClientRect.USER32(?,?), ref: 00621DDC
                                              • Part of subcall function 00621DB3: GetWindowRect.USER32(?,?), ref: 00621E1D
                                              • Part of subcall function 00621DB3: ScreenToClient.USER32(?,?), ref: 00621E45
                                            • GetDC.USER32 ref: 0065CF82
                                            • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0065CF95
                                            • SelectObject.GDI32(00000000,00000000), ref: 0065CFA3
                                            • SelectObject.GDI32(00000000,00000000), ref: 0065CFB8
                                            • ReleaseDC.USER32(?,00000000), ref: 0065CFC0
                                            • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0065D04B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                            • String ID: U
                                            • API String ID: 4009187628-3372436214
                                            • Opcode ID: bb89c8b308aa3dae84a2f6ac6bd49b95867f21db56d319f743b5bde2f9c515a1
                                            • Instruction ID: 4d7dfcb68492a96a15dfcf67b1f1d0ca7bd4889c393411019a0b685ab4231bcf
                                            • Opcode Fuzzy Hash: bb89c8b308aa3dae84a2f6ac6bd49b95867f21db56d319f743b5bde2f9c515a1
                                            • Instruction Fuzzy Hash: DB71D030400205EFCF219F64D890AEA3BB7FF49361F14426AFD955A2A6C7319C46EF61
                                            APIs
                                            • GetModuleFileNameW.KERNEL32(?,?,00000104,?,006AF910), ref: 0069903D
                                            • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,006AF910), ref: 00699071
                                            • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 006991EB
                                            • SysFreeString.OLEAUT32(?), ref: 00699215
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                            • String ID:
                                            • API String ID: 560350794-0
                                            • Opcode ID: fe7a46a8510800fade27a7562fc7be525b932cd35e38870500923183aa92226f
                                            • Instruction ID: 0c4eedb5af5f779c846c621beaa573ae3a7c6ea5fceaba858bac0afbe2a44a6e
                                            • Opcode Fuzzy Hash: fe7a46a8510800fade27a7562fc7be525b932cd35e38870500923183aa92226f
                                            • Instruction Fuzzy Hash: 78F1F971A00119EFDF14DF98C888EEEB7BABF49315F108059F915AB251DB31AE46CB60
                                            APIs
                                            • _memset.LIBCMT ref: 0069F9C9
                                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0069FB5C
                                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0069FB80
                                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0069FBC0
                                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0069FBE2
                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0069FD5E
                                            • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 0069FD90
                                            • CloseHandle.KERNEL32(?), ref: 0069FDBF
                                            • CloseHandle.KERNEL32(?), ref: 0069FE36
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                            • String ID:
                                            • API String ID: 4090791747-0
                                            • Opcode ID: 6cd17fc0088d1e9da9567c9f3a2c498fd47c6c439313ea012c49affb8a5eab68
                                            • Instruction ID: 21ff445af1221dbbb69cae1d9252d024de0036505016ef2fb734982ae16f9328
                                            • Opcode Fuzzy Hash: 6cd17fc0088d1e9da9567c9f3a2c498fd47c6c439313ea012c49affb8a5eab68
                                            • Instruction Fuzzy Hash: 58E1C131604301DFCB54EF24C891A6ABBE6AF85314F15896DF8998B3A2CB31EC45CF56
                                            APIs
                                              • Part of subcall function 006848AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,006838D3,?), ref: 006848C7
                                              • Part of subcall function 006848AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,006838D3,?), ref: 006848E0
                                              • Part of subcall function 00684CD3: GetFileAttributesW.KERNEL32(?,00683947), ref: 00684CD4
                                            • lstrcmpiW.KERNEL32(?,?), ref: 00684FE2
                                            • _wcscmp.LIBCMT ref: 00684FFC
                                            • MoveFileW.KERNEL32(?,?), ref: 00685017
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                            • String ID:
                                            • API String ID: 793581249-0
                                            • Opcode ID: cfca336190f0b303cb5004ee5bc95784e3910056c4e07d247ae28c8a1880b50f
                                            • Instruction ID: 2df1b5b50637a9d0042202d8333cb93c7aecdfc1c891ea62d1da39456429ca3e
                                            • Opcode Fuzzy Hash: cfca336190f0b303cb5004ee5bc95784e3910056c4e07d247ae28c8a1880b50f
                                            • Instruction Fuzzy Hash: FD5177B20087859BC764EB90D8819DFB3DDAF85340F500A2EB285D3151EF74A58C8B6A
                                            APIs
                                            • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 006A896E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: InvalidateRect
                                            • String ID:
                                            • API String ID: 634782764-0
                                            • Opcode ID: fcd8d24d2055d326613bcb5332c0e897395d26d96edcf40d588eb6e05df19170
                                            • Instruction ID: 22bf4ade960ceb50c4ea94859a9a8d15fb7f97891a9283fedefbf3ca09d2e825
                                            • Opcode Fuzzy Hash: fcd8d24d2055d326613bcb5332c0e897395d26d96edcf40d588eb6e05df19170
                                            • Instruction Fuzzy Hash: 9C518330600218BFDF20BF68DC85BAA7BA7BB06350F504116F615E72A1DF75AD909F51
                                            APIs
                                            • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0065C547
                                            • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0065C569
                                            • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0065C581
                                            • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0065C59F
                                            • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0065C5C0
                                            • DestroyIcon.USER32(00000000), ref: 0065C5CF
                                            • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0065C5EC
                                            • DestroyIcon.USER32(?), ref: 0065C5FB
                                              • Part of subcall function 006AA71E: DeleteObject.GDI32(00000000), ref: 006AA757
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                            • String ID:
                                            • API String ID: 2819616528-0
                                            • Opcode ID: 152ea1db82684a8844247ca3a7f920727e1430d9caba121424dcbd31bc1b80e9
                                            • Instruction ID: cab76635ca5ee4dab313f4af0403add69b17721b1d0863eac284a3fecfbedbd1
                                            • Opcode Fuzzy Hash: 152ea1db82684a8844247ca3a7f920727e1430d9caba121424dcbd31bc1b80e9
                                            • Instruction Fuzzy Hash: B9517A7460070AAFDB20DF64DC95FAA37B6EB59362F104528F902972A0DB70ED91DF60
                                            APIs
                                              • Part of subcall function 0067AE57: GetWindowThreadProcessId.USER32(?,00000000), ref: 0067AE77
                                              • Part of subcall function 0067AE57: GetCurrentThreadId.KERNEL32 ref: 0067AE7E
                                              • Part of subcall function 0067AE57: AttachThreadInput.USER32(00000000,?,00679B65,?,00000001), ref: 0067AE85
                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00679B70
                                            • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00679B8D
                                            • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00679B90
                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00679B99
                                            • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00679BB7
                                            • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00679BBA
                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00679BC3
                                            • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00679BDA
                                            • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00679BDD
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                            • String ID:
                                            • API String ID: 2014098862-0
                                            • Opcode ID: 0a57d4dde1eea92ab340773487e36353bfe16086ae4c2227529620186b2dcf86
                                            • Instruction ID: 87b9ddc09569acc75d311263d5a73ac4fb4807be3d76d07381f233e80eb34163
                                            • Opcode Fuzzy Hash: 0a57d4dde1eea92ab340773487e36353bfe16086ae4c2227529620186b2dcf86
                                            • Instruction Fuzzy Hash: 6911E171550218BEF7106FA0DC89F6A3B2EEB4DB51F201429F248AB0A0C9F26C51DEA5
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00678A84,00000B00,?,?), ref: 00678E0C
                                            • HeapAlloc.KERNEL32(00000000,?,00678A84,00000B00,?,?), ref: 00678E13
                                            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00678A84,00000B00,?,?), ref: 00678E28
                                            • GetCurrentProcess.KERNEL32(?,00000000,?,00678A84,00000B00,?,?), ref: 00678E30
                                            • DuplicateHandle.KERNEL32(00000000,?,00678A84,00000B00,?,?), ref: 00678E33
                                            • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00678A84,00000B00,?,?), ref: 00678E43
                                            • GetCurrentProcess.KERNEL32(00678A84,00000000,?,00678A84,00000B00,?,?), ref: 00678E4B
                                            • DuplicateHandle.KERNEL32(00000000,?,00678A84,00000B00,?,?), ref: 00678E4E
                                            • CreateThread.KERNEL32(00000000,00000000,00678E74,00000000,00000000,00000000), ref: 00678E68
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                            • String ID:
                                            • API String ID: 1957940570-0
                                            • Opcode ID: 45ccc1db573119201415f9316fd4562c38a3cc34ba169bd0d1490add78a8a153
                                            • Instruction ID: 9f99f46660c671eb4257675cb3bb88e45e32aae5e6579e3b381acd928a90b1c2
                                            • Opcode Fuzzy Hash: 45ccc1db573119201415f9316fd4562c38a3cc34ba169bd0d1490add78a8a153
                                            • Instruction Fuzzy Hash: 8601A8B5240308FFE760ABA5DC4DF6B3BADEB89711F015421FA05DB1A1DA70AC008F21
                                            APIs
                                              • Part of subcall function 00677652: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0067758C,80070057,?,?,?,0067799D), ref: 0067766F
                                              • Part of subcall function 00677652: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0067758C,80070057,?,?), ref: 0067768A
                                              • Part of subcall function 00677652: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0067758C,80070057,?,?), ref: 00677698
                                              • Part of subcall function 00677652: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0067758C,80070057,?), ref: 006776A8
                                            • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00699B1B
                                            • _memset.LIBCMT ref: 00699B28
                                            • _memset.LIBCMT ref: 00699C6B
                                            • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00699C97
                                            • CoTaskMemFree.OLE32(?), ref: 00699CA2
                                            Strings
                                            • NULL Pointer assignment, xrefs: 00699CF0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                            • String ID: NULL Pointer assignment
                                            • API String ID: 1300414916-2785691316
                                            • Opcode ID: 8e285f78874ebfc9917f9084c19e6a0b0d502243b6f878611a76002d22309699
                                            • Instruction ID: aee90de3766d9805305769ba121f9acd199edd1276abe7739fabcfd7d377550a
                                            • Opcode Fuzzy Hash: 8e285f78874ebfc9917f9084c19e6a0b0d502243b6f878611a76002d22309699
                                            • Instruction Fuzzy Hash: 5B913A71D00229EBDF20DFA4DC85EDEBBBAAF08710F20415AF419A7281DB315A45CFA0
                                            APIs
                                            • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 006A7093
                                            • SendMessageW.USER32(?,00001036,00000000,?), ref: 006A70A7
                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 006A70C1
                                            • _wcscat.LIBCMT ref: 006A711C
                                            • SendMessageW.USER32(?,00001057,00000000,?), ref: 006A7133
                                            • SendMessageW.USER32(?,00001061,?,0000000F), ref: 006A7161
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window_wcscat
                                            • String ID: SysListView32
                                            • API String ID: 307300125-78025650
                                            • Opcode ID: 89ae059016c17098f388cd0d431c9f015ea758945707b28f54a6593b40c334ff
                                            • Instruction ID: 02e3b2c52613bcdaf32cfc8d5e7e4a96c8f5d227da3f62ffad4fa83595808241
                                            • Opcode Fuzzy Hash: 89ae059016c17098f388cd0d431c9f015ea758945707b28f54a6593b40c334ff
                                            • Instruction Fuzzy Hash: 6941A371A04308AFDB21AFA4CC85BEE77EAEF09350F10046AF545E7292D7719D848F64
                                            APIs
                                              • Part of subcall function 00683E91: CreateToolhelp32Snapshot.KERNEL32 ref: 00683EB6
                                              • Part of subcall function 00683E91: Process32FirstW.KERNEL32(00000000,?), ref: 00683EC4
                                              • Part of subcall function 00683E91: CloseHandle.KERNEL32(00000000), ref: 00683F8E
                                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0069ECB8
                                            • GetLastError.KERNEL32 ref: 0069ECCB
                                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0069ECFA
                                            • TerminateProcess.KERNEL32(00000000,00000000), ref: 0069ED77
                                            • GetLastError.KERNEL32(00000000), ref: 0069ED82
                                            • CloseHandle.KERNEL32(00000000), ref: 0069EDB7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                            • String ID: SeDebugPrivilege
                                            • API String ID: 2533919879-2896544425
                                            • Opcode ID: 6b81ad77954a657e24e9e2a55965c250d29b12636ee3c7db9121ff5c70363c08
                                            • Instruction ID: a49b60d5067380c1f3473542ba0da328523c8fc9a9ed4bc4a403aa645e7c193d
                                            • Opcode Fuzzy Hash: 6b81ad77954a657e24e9e2a55965c250d29b12636ee3c7db9121ff5c70363c08
                                            • Instruction Fuzzy Hash: 3241AC706002109FDB14EF24C895F6DB7A6AF81714F08841DF8469B7C2DB76A808CF9A
                                            APIs
                                            • LoadIconW.USER32(00000000,00007F03), ref: 006832C5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: IconLoad
                                            • String ID: blank$info$question$stop$warning
                                            • API String ID: 2457776203-404129466
                                            • Opcode ID: 1680286a682e0179ee8149f6db1f4ce927c1dabce04c3016ee3504b7b30018fa
                                            • Instruction ID: afac9c1fb49a93d1ee90b0d123718ee51a9bf364f8b9bcef28555908b61332a6
                                            • Opcode Fuzzy Hash: 1680286a682e0179ee8149f6db1f4ce927c1dabce04c3016ee3504b7b30018fa
                                            • Instruction Fuzzy Hash: 5D112B3160C3667AA7017B95DC62CAAB39EDF19B70F10016AF500A63C2E6659B4147A5
                                            APIs
                                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 0068454E
                                            • LoadStringW.USER32(00000000), ref: 00684555
                                            • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0068456B
                                            • LoadStringW.USER32(00000000), ref: 00684572
                                            • _wprintf.LIBCMT ref: 00684598
                                            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 006845B6
                                            Strings
                                            • %s (%d) : ==> %s: %s %s, xrefs: 00684593
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: HandleLoadModuleString$Message_wprintf
                                            • String ID: %s (%d) : ==> %s: %s %s
                                            • API String ID: 3648134473-3128320259
                                            • Opcode ID: c54428bf0827912c42d80da9fd5feb2323a59749f0cb6c96d94469e78f0a906b
                                            • Instruction ID: b128e091240459d60f7ad0f87406def8cf42b8cc819a56914aa2e7ea6b8b3f67
                                            • Opcode Fuzzy Hash: c54428bf0827912c42d80da9fd5feb2323a59749f0cb6c96d94469e78f0a906b
                                            • Instruction Fuzzy Hash: CB0144F2900208BFE750B7D09D89EEB776DDB09301F0015A5B745D2151EA746E854F76
                                            APIs
                                              • Part of subcall function 00622612: GetWindowLongW.USER32(?,000000EB), ref: 00622623
                                            • GetSystemMetrics.USER32(0000000F), ref: 006AD78A
                                            • GetSystemMetrics.USER32(0000000F), ref: 006AD7AA
                                            • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 006AD9E5
                                            • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 006ADA03
                                            • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 006ADA24
                                            • ShowWindow.USER32(00000003,00000000), ref: 006ADA43
                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 006ADA68
                                            • DefDlgProcW.USER32(?,00000005,?,?), ref: 006ADA8B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                            • String ID:
                                            • API String ID: 1211466189-0
                                            • Opcode ID: 6aed15676538e0c9ad1bbc23b683f782e9444e7e0bc6bd3671572f1def2c3a43
                                            • Instruction ID: 2d65a19d7646fcf831b2145dbf2220794515e8825d7d28fd818331544a047f58
                                            • Opcode Fuzzy Hash: 6aed15676538e0c9ad1bbc23b683f782e9444e7e0bc6bd3671572f1def2c3a43
                                            • Instruction Fuzzy Hash: 1FB17A71600215EBDF14DF68C9857EE7BB2BF06701F088069ED4A9A695DB34AD50CFA0
                                            APIs
                                            • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0065C417,00000004,00000000,00000000,00000000), ref: 00622ACF
                                            • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,0065C417,00000004,00000000,00000000,00000000,000000FF), ref: 00622B17
                                            • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,0065C417,00000004,00000000,00000000,00000000), ref: 0065C46A
                                            • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0065C417,00000004,00000000,00000000,00000000), ref: 0065C4D6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ShowWindow
                                            • String ID:
                                            • API String ID: 1268545403-0
                                            • Opcode ID: db2b311f9a385a60e5e534c16dd57ad7f2358cfec8660cd81b6d2adcab487d3e
                                            • Instruction ID: 3bca231b8f1c8351753d530b2e362db76deb08f1e7bd7a49be25bb7e686ef8ac
                                            • Opcode Fuzzy Hash: db2b311f9a385a60e5e534c16dd57ad7f2358cfec8660cd81b6d2adcab487d3e
                                            • Instruction Fuzzy Hash: C7410830204B91BEC7359B28ECB8BBB7BD3AB46315F18842DE44746A61C675A886DF11
                                            APIs
                                            • InterlockedExchange.KERNEL32(?,000001F5), ref: 0068737F
                                              • Part of subcall function 00640FF6: std::exception::exception.LIBCMT ref: 0064102C
                                              • Part of subcall function 00640FF6: __CxxThrowException@8.LIBCMT ref: 00641041
                                            • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 006873B6
                                            • EnterCriticalSection.KERNEL32(?), ref: 006873D2
                                            • _memmove.LIBCMT ref: 00687420
                                            • _memmove.LIBCMT ref: 0068743D
                                            • LeaveCriticalSection.KERNEL32(?), ref: 0068744C
                                            • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00687461
                                            • InterlockedExchange.KERNEL32(?,000001F6), ref: 00687480
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                            • String ID:
                                            • API String ID: 256516436-0
                                            • Opcode ID: df78dba7196c44ef9b88e2def1f8ee5e1ab3499c9ee25357175d0054a7bb6ce2
                                            • Instruction ID: 706533e8c2eba4b9602c0509e715a429955a844d7c7478d724c004ae960b7b3a
                                            • Opcode Fuzzy Hash: df78dba7196c44ef9b88e2def1f8ee5e1ab3499c9ee25357175d0054a7bb6ce2
                                            • Instruction Fuzzy Hash: 4831C131900205EBDF50EFA4DC85AAE7BBAEF45700B1441B9FD049B246DB30DE54CBA5
                                            APIs
                                            • DeleteObject.GDI32(00000000), ref: 006A645A
                                            • GetDC.USER32(00000000), ref: 006A6462
                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 006A646D
                                            • ReleaseDC.USER32(00000000,00000000), ref: 006A6479
                                            • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 006A64B5
                                            • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 006A64C6
                                            • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,006A9299,?,?,000000FF,00000000,?,000000FF,?), ref: 006A6500
                                            • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 006A6520
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                            • String ID:
                                            • API String ID: 3864802216-0
                                            • Opcode ID: 30ea4303404f82c335be4d1ae3659dbcee6bd8aebd802efc7d9cc023fa08d7b5
                                            • Instruction ID: a34fdfaa0f3b735fe4195ad0f02a2ce801f6232f6ecd989b00610d2aa196633a
                                            • Opcode Fuzzy Hash: 30ea4303404f82c335be4d1ae3659dbcee6bd8aebd802efc7d9cc023fa08d7b5
                                            • Instruction Fuzzy Hash: BA319F72200210BFEB109F50CC4AFEB3FAAEF0A765F085065FE089A291C675AC41CB75
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: _memcmp
                                            • String ID:
                                            • API String ID: 2931989736-0
                                            • Opcode ID: 759f86f7b186b152ec9303b3726f755bfdf45929267d9d6414aef18e036cd2bf
                                            • Instruction ID: 81e805c44590ab9fc7a3528fdf6eb11ef9b52787998cde88d7eecff66e0e5e23
                                            • Opcode Fuzzy Hash: 759f86f7b186b152ec9303b3726f755bfdf45929267d9d6414aef18e036cd2bf
                                            • Instruction Fuzzy Hash: 8321C5A1600206B7D750A6209C52FFB279FAF113B4B45802CFD0D9A383F752DD5182E9
                                            APIs
                                              • Part of subcall function 00629997: __itow.LIBCMT ref: 006299C2
                                              • Part of subcall function 00629997: __swprintf.LIBCMT ref: 00629A0C
                                              • Part of subcall function 0063FEC6: _wcscpy.LIBCMT ref: 0063FEE9
                                            • _wcstok.LIBCMT ref: 0068EEFF
                                            • _wcscpy.LIBCMT ref: 0068EF8E
                                            • _memset.LIBCMT ref: 0068EFC1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                            • String ID: X
                                            • API String ID: 774024439-3081909835
                                            • Opcode ID: 2ce43b37d7f9e53b9c60b76cb3bd9ba832b80abbc8c10c47ef7c302a50f50a96
                                            • Instruction ID: 7d921fa63fe8ce4a81eaaa7c1b518c5ec1153500dbe7a228be9eb57bc7023725
                                            • Opcode Fuzzy Hash: 2ce43b37d7f9e53b9c60b76cb3bd9ba832b80abbc8c10c47ef7c302a50f50a96
                                            • Instruction Fuzzy Hash: 01C19F316087119FC764EF24D885A9AB7E2BF84310F00496DF8999B3A2DB30EC45CF96
                                            APIs
                                            • __WSAFDIsSet.WSOCK32(00000000,?), ref: 00696F14
                                            • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00696F35
                                            • WSAGetLastError.WSOCK32(00000000), ref: 00696F48
                                            • htons.WSOCK32(?), ref: 00696FFE
                                            • inet_ntoa.WSOCK32(?), ref: 00696FBB
                                              • Part of subcall function 0067AE14: _strlen.LIBCMT ref: 0067AE1E
                                              • Part of subcall function 0067AE14: _memmove.LIBCMT ref: 0067AE40
                                            • _strlen.LIBCMT ref: 00697058
                                            • _memmove.LIBCMT ref: 006970C1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                            • String ID:
                                            • API String ID: 3619996494-0
                                            • Opcode ID: 1285bcc1e065601d5086c84c165088a56a19962a253b150782694e5a7c9418e2
                                            • Instruction ID: f7e08e671270452a573456e3f2e436e8d1fe4b2f950d6f2f99aef697e8c02214
                                            • Opcode Fuzzy Hash: 1285bcc1e065601d5086c84c165088a56a19962a253b150782694e5a7c9418e2
                                            • Instruction Fuzzy Hash: C481E171508710AFDB50EF24DC82E6BB3EFAF84714F10891DF5559B292DA70AD01CBA6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6522929d4e736f389d12bbb6d793fd1e45759a9ea296ead09cbc5e4408236ef3
                                            • Instruction ID: 5305887deaa3a9cb8b9509d5ad074c3055eee0cd9ec9ea14881c2c94386bc8ab
                                            • Opcode Fuzzy Hash: 6522929d4e736f389d12bbb6d793fd1e45759a9ea296ead09cbc5e4408236ef3
                                            • Instruction Fuzzy Hash: ED71AD30904519EFCB04DF98DC49AFEBBBAFF86310F108159F915AA251C734AA52CFA5
                                            APIs
                                            • IsWindow.USER32(012066A8), ref: 006AB6A5
                                            • IsWindowEnabled.USER32(012066A8), ref: 006AB6B1
                                            • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 006AB795
                                            • SendMessageW.USER32(012066A8,000000B0,?,?), ref: 006AB7CC
                                            • IsDlgButtonChecked.USER32(?,?), ref: 006AB809
                                            • GetWindowLongW.USER32(012066A8,000000EC), ref: 006AB82B
                                            • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 006AB843
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                            • String ID:
                                            • API String ID: 4072528602-0
                                            • Opcode ID: e84a163ea0de084822a8c150a5c6ad7bf9ff39b9e99c0dcd6463f235e6faf154
                                            • Instruction ID: 6833a94f1dd6905702c8cee84e3c8772c467e796e0002b646a1eafccb0c7a675
                                            • Opcode Fuzzy Hash: e84a163ea0de084822a8c150a5c6ad7bf9ff39b9e99c0dcd6463f235e6faf154
                                            • Instruction Fuzzy Hash: 2D718A34600204AFDB24AFA4C8A4FEA7BABFB5B340F146069F945973A2C771AD51CF50
                                            APIs
                                            • _memset.LIBCMT ref: 0069F75C
                                            • _memset.LIBCMT ref: 0069F825
                                            • ShellExecuteExW.SHELL32(?), ref: 0069F86A
                                              • Part of subcall function 00629997: __itow.LIBCMT ref: 006299C2
                                              • Part of subcall function 00629997: __swprintf.LIBCMT ref: 00629A0C
                                              • Part of subcall function 0063FEC6: _wcscpy.LIBCMT ref: 0063FEE9
                                            • GetProcessId.KERNEL32(00000000), ref: 0069F8E1
                                            • CloseHandle.KERNEL32(00000000), ref: 0069F910
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                            • String ID: @
                                            • API String ID: 3522835683-2766056989
                                            • Opcode ID: c5d68d5b34aec0769676d01f83c5a656656e091053a3d8fc20dabfcee5b26af5
                                            • Instruction ID: 89ac10ad6c94b03fd164544779698eeb5407c530cf8f789e3eb09561c10de9ca
                                            • Opcode Fuzzy Hash: c5d68d5b34aec0769676d01f83c5a656656e091053a3d8fc20dabfcee5b26af5
                                            • Instruction Fuzzy Hash: 7E619974A006299FCF04EF94D5819AEBBB6FF48310F15846DE846AB751CB30AD40CF94
                                            APIs
                                            • GetParent.USER32(?), ref: 0068149C
                                            • GetKeyboardState.USER32(?), ref: 006814B1
                                            • SetKeyboardState.USER32(?), ref: 00681512
                                            • PostMessageW.USER32(?,00000101,00000010,?), ref: 00681540
                                            • PostMessageW.USER32(?,00000101,00000011,?), ref: 0068155F
                                            • PostMessageW.USER32(?,00000101,00000012,?), ref: 006815A5
                                            • PostMessageW.USER32(?,00000101,0000005B,?), ref: 006815C8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: MessagePost$KeyboardState$Parent
                                            • String ID:
                                            • API String ID: 87235514-0
                                            • Opcode ID: cd032e79f00a207564341547131409bdbe979224b271a7e0eba7d305efee16ce
                                            • Instruction ID: 88b7cdc531b63f99c2e67246befa9dd3913141859bd73959e0b16a219f26ad53
                                            • Opcode Fuzzy Hash: cd032e79f00a207564341547131409bdbe979224b271a7e0eba7d305efee16ce
                                            • Instruction Fuzzy Hash: A651F0A0A042D53EFB3263648C45BFA7EAF5B47304F08868DE1D59A9C2D294ACC6D761
                                            APIs
                                            • GetParent.USER32(00000000), ref: 006812B5
                                            • GetKeyboardState.USER32(?), ref: 006812CA
                                            • SetKeyboardState.USER32(?), ref: 0068132B
                                            • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00681357
                                            • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00681374
                                            • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 006813B8
                                            • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 006813D9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: MessagePost$KeyboardState$Parent
                                            • String ID:
                                            • API String ID: 87235514-0
                                            • Opcode ID: 7444df41fcb8fadcbd0756b928533e0dc6748e998c934902f1481f01fc4ae5b6
                                            • Instruction ID: 8393fa6b28ecf57f4b870ed3f581259d272455d97f401cbcd40608aa9a0b606e
                                            • Opcode Fuzzy Hash: 7444df41fcb8fadcbd0756b928533e0dc6748e998c934902f1481f01fc4ae5b6
                                            • Instruction Fuzzy Hash: 8C51F3A09046D53EFB32A7248C55BBABFAF5B07300F08868DE1D49E9C2D395AC86D751
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: _wcsncpy$LocalTime
                                            • String ID:
                                            • API String ID: 2945705084-0
                                            • Opcode ID: efc83b6fc46739871e646436b6b26dc2832e4ade0c9741e1f2d096f6302d48c7
                                            • Instruction ID: ce8991f193e0070bf4e639a9c2335f6d994e0849d78b4415a4247e2022642103
                                            • Opcode Fuzzy Hash: efc83b6fc46739871e646436b6b26dc2832e4ade0c9741e1f2d096f6302d48c7
                                            • Instruction Fuzzy Hash: 76418465C2052876CB90FBB5C886ACF73AAAF05310F60855AF519E3221FB34E715C7AD
                                            APIs
                                            • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0067DAC5
                                            • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0067DAFB
                                            • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0067DB0C
                                            • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 0067DB8E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ErrorMode$AddressCreateInstanceProc
                                            • String ID: ,,k$DllGetClassObject
                                            • API String ID: 753597075-913296791
                                            • Opcode ID: 1d8bfbd24a7ba504e6871081ac83b99501cab7653230ce1ff27d10d06106bf97
                                            • Instruction ID: 2b1d8638c1d8a9604943462cfe2ea5bc5875a587ccbada547dede363979c3f12
                                            • Opcode Fuzzy Hash: 1d8bfbd24a7ba504e6871081ac83b99501cab7653230ce1ff27d10d06106bf97
                                            • Instruction Fuzzy Hash: 44418FB1600209EFDB15DF54C884A9A7BBAEF48710F15C9AEED099F205D7B1DD44CBA0
                                            APIs
                                              • Part of subcall function 006848AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,006838D3,?), ref: 006848C7
                                              • Part of subcall function 006848AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,006838D3,?), ref: 006848E0
                                            • lstrcmpiW.KERNEL32(?,?), ref: 006838F3
                                            • _wcscmp.LIBCMT ref: 0068390F
                                            • MoveFileW.KERNEL32(?,?), ref: 00683927
                                            • _wcscat.LIBCMT ref: 0068396F
                                            • SHFileOperationW.SHELL32(?), ref: 006839DB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                            • String ID: \*.*
                                            • API String ID: 1377345388-1173974218
                                            • Opcode ID: a95d83217fd2ddc8a92bd04b10c1d84e7cb3cf7916aff8eaa3cfcf0098adabae
                                            • Instruction ID: 06123211bd8c9b3bfbd60706f1a3cb76c24c9c213f586fa325d63421dddfba2e
                                            • Opcode Fuzzy Hash: a95d83217fd2ddc8a92bd04b10c1d84e7cb3cf7916aff8eaa3cfcf0098adabae
                                            • Instruction Fuzzy Hash: 034180B140C3459ACB91FF64C481AEFB7EDAF89740F401A2EF48AC3251EA74D648CB56
                                            APIs
                                            • _memset.LIBCMT ref: 006A7519
                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 006A75C0
                                            • IsMenu.USER32(?), ref: 006A75D8
                                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 006A7620
                                            • DrawMenuBar.USER32 ref: 006A7633
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Menu$Item$DrawInfoInsert_memset
                                            • String ID: 0
                                            • API String ID: 3866635326-4108050209
                                            • Opcode ID: 345672836e4ad3d1acd077a36892f0e0b1617fa0093ffeb5f4262e6416f5ed76
                                            • Instruction ID: 8959b15fa9472278e0c270be0c3777f4559bdb73d897f5d4667075fcd872d63b
                                            • Opcode Fuzzy Hash: 345672836e4ad3d1acd077a36892f0e0b1617fa0093ffeb5f4262e6416f5ed76
                                            • Instruction Fuzzy Hash: 01411575A04609AFDB20EF94D884ADABBFAFB0A350F049129F9559B350D730ED51CFA0
                                            APIs
                                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 006A125C
                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 006A1286
                                            • FreeLibrary.KERNEL32(00000000), ref: 006A133D
                                              • Part of subcall function 006A122D: RegCloseKey.ADVAPI32(?), ref: 006A12A3
                                              • Part of subcall function 006A122D: FreeLibrary.KERNEL32(?), ref: 006A12F5
                                              • Part of subcall function 006A122D: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 006A1318
                                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 006A12E0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: EnumFreeLibrary$CloseDeleteOpen
                                            • String ID:
                                            • API String ID: 395352322-0
                                            • Opcode ID: d66857ed24df0b4a4089c939feb826e65e59431f862569dcaeb26f10655cadc1
                                            • Instruction ID: 8edbabb430940d1b818e585f1da7b585a548c26e3c7825d28fd0fa1047635faa
                                            • Opcode Fuzzy Hash: d66857ed24df0b4a4089c939feb826e65e59431f862569dcaeb26f10655cadc1
                                            • Instruction Fuzzy Hash: 41311C71901109BFDB14AFD0DC89AFEB7BDEF0A300F0001AAE501E6251DA74AF859EA5
                                            APIs
                                            • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 006A655B
                                            • GetWindowLongW.USER32(012066A8,000000F0), ref: 006A658E
                                            • GetWindowLongW.USER32(012066A8,000000F0), ref: 006A65C3
                                            • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 006A65F5
                                            • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 006A661F
                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 006A6630
                                            • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 006A664A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: LongWindow$MessageSend
                                            • String ID:
                                            • API String ID: 2178440468-0
                                            • Opcode ID: 2e5e6d12374f4c93581d8b6f264a8ec067330731d391ad1039b23e0925f349d0
                                            • Instruction ID: dcea8dc9ddda82a0b2fbd12923027b93c8b4ad01454c0e13dee733224df40388
                                            • Opcode Fuzzy Hash: 2e5e6d12374f4c93581d8b6f264a8ec067330731d391ad1039b23e0925f349d0
                                            • Instruction Fuzzy Hash: A331F330A44250AFDB21EF58DC89F9537E2FB5A750F1921A8F5118F2B6CB61AC40DF62
                                            APIs
                                              • Part of subcall function 006980A0: inet_addr.WSOCK32(00000000), ref: 006980CB
                                            • socket.WSOCK32(00000002,00000001,00000006), ref: 006964D9
                                            • WSAGetLastError.WSOCK32(00000000), ref: 006964E8
                                            • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00696521
                                            • connect.WSOCK32(00000000,?,00000010), ref: 0069652A
                                            • WSAGetLastError.WSOCK32 ref: 00696534
                                            • closesocket.WSOCK32(00000000), ref: 0069655D
                                            • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00696576
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                            • String ID:
                                            • API String ID: 910771015-0
                                            • Opcode ID: 3d835ef24499890bd057cbb2c3533d18d3c0b9186c5ecf144feab519c84d7913
                                            • Instruction ID: 3aa5c502655c5177a4fdc0b52c05696bcde45333f435ed4b679f951177beca2e
                                            • Opcode Fuzzy Hash: 3d835ef24499890bd057cbb2c3533d18d3c0b9186c5ecf144feab519c84d7913
                                            • Instruction Fuzzy Hash: 69318131600218AFDF10AF64DC85BBE7BBEEB45724F048069F90997291DB74AD45CF62
                                            APIs
                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0067E0FA
                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0067E120
                                            • SysAllocString.OLEAUT32(00000000), ref: 0067E123
                                            • SysAllocString.OLEAUT32 ref: 0067E144
                                            • SysFreeString.OLEAUT32 ref: 0067E14D
                                            • StringFromGUID2.OLE32(?,?,00000028), ref: 0067E167
                                            • SysAllocString.OLEAUT32(?), ref: 0067E175
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                            • String ID:
                                            • API String ID: 3761583154-0
                                            • Opcode ID: b6c9e1e60cd16effe39bc57b3a4ef2380defff7d2b15fbf1fe2f0e798715edac
                                            • Instruction ID: 7f627a2bbd774ad760668de65dcd86ba6077292e475e15dc055800b352e62a02
                                            • Opcode Fuzzy Hash: b6c9e1e60cd16effe39bc57b3a4ef2380defff7d2b15fbf1fe2f0e798715edac
                                            • Instruction Fuzzy Hash: B9217135604108AFDB10AFB8DC89CAB77EEEB0D760B50C175F919CB261DA71EC858B64
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: __wcsnicmp
                                            • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                            • API String ID: 1038674560-2734436370
                                            • Opcode ID: c2e6445420465491251016808ee98ce6f8d06873d9bf94c9598b36bd047fd6d3
                                            • Instruction ID: 0d9e312de0b29a9eba49d5b49f57bebcf554683f62ffa7510109281bcf348e17
                                            • Opcode Fuzzy Hash: c2e6445420465491251016808ee98ce6f8d06873d9bf94c9598b36bd047fd6d3
                                            • Instruction Fuzzy Hash: 5F213772104565E6D331E734DC22EE773DBEF61740F14C439F88986281EB51A9D2D299
                                            APIs
                                              • Part of subcall function 00621D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00621D73
                                              • Part of subcall function 00621D35: GetStockObject.GDI32(00000011), ref: 00621D87
                                              • Part of subcall function 00621D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00621D91
                                            • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 006A78A1
                                            • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 006A78AE
                                            • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 006A78B9
                                            • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 006A78C8
                                            • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 006A78D4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: MessageSend$CreateObjectStockWindow
                                            • String ID: Msctls_Progress32
                                            • API String ID: 1025951953-3636473452
                                            • Opcode ID: 9e25dada237ffbd0c7aa9ab17b5a1c8f2c272753a5eb8673772a2760a6ded2ca
                                            • Instruction ID: db0e83b9409401c4026df9cf49635e3b3227478e61427cc27019eb65c8208baf
                                            • Opcode Fuzzy Hash: 9e25dada237ffbd0c7aa9ab17b5a1c8f2c272753a5eb8673772a2760a6ded2ca
                                            • Instruction Fuzzy Hash: 6C1190B2510219BFEF159F60CC85EE77F6EEF097A8F015125BA04A6190C772AC21DFA4
                                            APIs
                                            • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00644292,?), ref: 006441E3
                                            • GetProcAddress.KERNEL32(00000000), ref: 006441EA
                                            • EncodePointer.KERNEL32(00000000), ref: 006441F6
                                            • DecodePointer.KERNEL32(00000001,00644292,?), ref: 00644213
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                            • String ID: RoInitialize$combase.dll
                                            • API String ID: 3489934621-340411864
                                            • Opcode ID: 1454817ae456687d1c79af4bc3c35c625d8f96d1184b12dbe1f70ecd506275f3
                                            • Instruction ID: 7039b0d520b0cbd0b1fc51b7c5ca2e7faee75508792ed64dead99c0bcdc49e74
                                            • Opcode Fuzzy Hash: 1454817ae456687d1c79af4bc3c35c625d8f96d1184b12dbe1f70ecd506275f3
                                            • Instruction Fuzzy Hash: 27E01AB0A90341AEEF207BF0EC89BA53AE7BB62703F106824F511D91A0DFB554D59F01
                                            APIs
                                            • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,006441B8), ref: 006442B8
                                            • GetProcAddress.KERNEL32(00000000), ref: 006442BF
                                            • EncodePointer.KERNEL32(00000000), ref: 006442CA
                                            • DecodePointer.KERNEL32(006441B8), ref: 006442E5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                            • String ID: RoUninitialize$combase.dll
                                            • API String ID: 3489934621-2819208100
                                            • Opcode ID: 6f5ca48d667b281159d43157b09f39274737c48c4b88bff152e42aa3cf1fc390
                                            • Instruction ID: a55ced1fb48784c8906d0150d364aaf6e275f12a8a46773170e08b40f6bc02fe
                                            • Opcode Fuzzy Hash: 6f5ca48d667b281159d43157b09f39274737c48c4b88bff152e42aa3cf1fc390
                                            • Instruction Fuzzy Hash: 97E0B6B8691341AFEF10ABB1EC8DB963AA7BB25742F106428F001E95A0CFB45684DF15
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: _memmove$__itow__swprintf
                                            • String ID:
                                            • API String ID: 3253778849-0
                                            • Opcode ID: 93b3fe1bf09b770244ec23dce923942e0d514e4956ba1ddd2cbb217d59e0d148
                                            • Instruction ID: d0b1cb9785fa474571f9191ee5aa3de8d32b6a94bd51737f39667715d59c9254
                                            • Opcode Fuzzy Hash: 93b3fe1bf09b770244ec23dce923942e0d514e4956ba1ddd2cbb217d59e0d148
                                            • Instruction Fuzzy Hash: 0461BE30500A6A9BDF51FF20DC82EFE37A6AF45708F04461DF95A5B292DB309D85CBA4
                                            APIs
                                              • Part of subcall function 00627F41: _memmove.LIBCMT ref: 00627F82
                                              • Part of subcall function 006A10A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,006A0038,?,?), ref: 006A10BC
                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 006A0548
                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 006A0588
                                            • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 006A05AB
                                            • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 006A05D4
                                            • RegCloseKey.ADVAPI32(?,?,00000000), ref: 006A0617
                                            • RegCloseKey.ADVAPI32(00000000), ref: 006A0624
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                            • String ID:
                                            • API String ID: 4046560759-0
                                            • Opcode ID: e4548ae1ec93fb0884217c795c7cd16e7efcaccf4840016baba657f8ced11655
                                            • Instruction ID: a76d197c19b7c8126afd276d1849dee6fbd612bb126e516e19e2d0a0530ba497
                                            • Opcode Fuzzy Hash: e4548ae1ec93fb0884217c795c7cd16e7efcaccf4840016baba657f8ced11655
                                            • Instruction Fuzzy Hash: 3C515831508200AFDB54EF64D885E6BBBEAFF8A314F04891DF585872A1DB31E905CF56
                                            APIs
                                            • GetMenu.USER32(?), ref: 006A5A82
                                            • GetMenuItemCount.USER32(00000000), ref: 006A5AB9
                                            • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 006A5AE1
                                            • GetMenuItemID.USER32(?,?), ref: 006A5B50
                                            • GetSubMenu.USER32(?,?), ref: 006A5B5E
                                            • PostMessageW.USER32(?,00000111,?,00000000), ref: 006A5BAF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Menu$Item$CountMessagePostString
                                            • String ID:
                                            • API String ID: 650687236-0
                                            • Opcode ID: 5e9b1f68909333e475b01a1d3af4dcf2cea5e3c3706d08a13cae816eceea299c
                                            • Instruction ID: 9befe1ac38df43ebb7429f8fbe987a2971527de6e307af6497e4dd68a9693761
                                            • Opcode Fuzzy Hash: 5e9b1f68909333e475b01a1d3af4dcf2cea5e3c3706d08a13cae816eceea299c
                                            • Instruction Fuzzy Hash: F8518F31E00A25EFCB11EFA4C855AAEB7B6EF49310F104469F906B7351CB70AE418F95
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 0067F3F7
                                            • VariantClear.OLEAUT32(00000013), ref: 0067F469
                                            • VariantClear.OLEAUT32(00000000), ref: 0067F4C4
                                            • _memmove.LIBCMT ref: 0067F4EE
                                            • VariantClear.OLEAUT32(?), ref: 0067F53B
                                            • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 0067F569
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Variant$Clear$ChangeInitType_memmove
                                            • String ID:
                                            • API String ID: 1101466143-0
                                            • Opcode ID: 5da805b5fd1734d74b65eae3ed7a2e43f72fcf7ddfe3b1662edc14a629fa9785
                                            • Instruction ID: 4105179251578f21e1261ec39122c2e0e5c36a08f2814a323fdfc3b13cda906f
                                            • Opcode Fuzzy Hash: 5da805b5fd1734d74b65eae3ed7a2e43f72fcf7ddfe3b1662edc14a629fa9785
                                            • Instruction Fuzzy Hash: 205146B5A00209AFDB10DF68D880EAAB7F9FF4D354B158569E959DB301D730E912CFA0
                                            APIs
                                            • _memset.LIBCMT ref: 00682747
                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00682792
                                            • IsMenu.USER32(00000000), ref: 006827B2
                                            • CreatePopupMenu.USER32 ref: 006827E6
                                            • GetMenuItemCount.USER32(000000FF), ref: 00682844
                                            • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00682875
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                            • String ID:
                                            • API String ID: 3311875123-0
                                            • Opcode ID: 436edc868300fcffcbc328d12de4ec282420a528c7b703c5f126b01b9babbee5
                                            • Instruction ID: ca139d1a715e353de4df4d953e8eefeae44dd6c35ee3cefb4136350abe79ab58
                                            • Opcode Fuzzy Hash: 436edc868300fcffcbc328d12de4ec282420a528c7b703c5f126b01b9babbee5
                                            • Instruction Fuzzy Hash: 115190B0A00207EFDF24EF68D898AEEBBF6EF45314F104369E8119B291D7709949CB51
                                            APIs
                                              • Part of subcall function 00622612: GetWindowLongW.USER32(?,000000EB), ref: 00622623
                                            • BeginPaint.USER32(?,?,?,?,?,?), ref: 0062179A
                                            • GetWindowRect.USER32(?,?), ref: 006217FE
                                            • ScreenToClient.USER32(?,?), ref: 0062181B
                                            • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 0062182C
                                            • EndPaint.USER32(?,?), ref: 00621876
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                            • String ID:
                                            • API String ID: 1827037458-0
                                            • Opcode ID: 2630706b3fccf40054639406fa44a0eb0d70952b2703a4b3360f8b9e64ea8edd
                                            • Instruction ID: 9e4c26dbb09f0cceb43837e82e3caa6ed4796f84982cbdd8b93fc8afbfa3b67a
                                            • Opcode Fuzzy Hash: 2630706b3fccf40054639406fa44a0eb0d70952b2703a4b3360f8b9e64ea8edd
                                            • Instruction Fuzzy Hash: 3541B070104751AFC710DF24DCC4BBB7BEAEB66764F140668F9948A2A1C731A845DF62
                                            APIs
                                            • ShowWindow.USER32(006E67B0,00000000,012066A8,?,?,006E67B0,?,006AB862,?,?), ref: 006AB9CC
                                            • EnableWindow.USER32(00000000,00000000), ref: 006AB9F0
                                            • ShowWindow.USER32(006E67B0,00000000,012066A8,?,?,006E67B0,?,006AB862,?,?), ref: 006ABA50
                                            • ShowWindow.USER32(00000000,00000004,?,006AB862,?,?), ref: 006ABA62
                                            • EnableWindow.USER32(00000000,00000001), ref: 006ABA86
                                            • SendMessageW.USER32(?,0000130C,?,00000000), ref: 006ABAA9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Window$Show$Enable$MessageSend
                                            • String ID:
                                            • API String ID: 642888154-0
                                            • Opcode ID: efc2247b30c1d91939385ea52aff2f30b0340ab16a482a9fcade70e69ff390f5
                                            • Instruction ID: 48d64dd62509912cdb98ea7e7db43f74ce8ae806fae6c8b2fd3954c2ae5c2b5b
                                            • Opcode Fuzzy Hash: efc2247b30c1d91939385ea52aff2f30b0340ab16a482a9fcade70e69ff390f5
                                            • Instruction Fuzzy Hash: E8412931600241AFDB22EF64D499BD57BA2EF07310F1852A9FA488F6A3C731AC45CF51
                                            APIs
                                            • GetForegroundWindow.USER32(?,?,?,?,?,?,00695134,?,?,00000000,00000001), ref: 006973BF
                                              • Part of subcall function 00693C94: GetWindowRect.USER32(?,?), ref: 00693CA7
                                            • GetDesktopWindow.USER32 ref: 006973E9
                                            • GetWindowRect.USER32(00000000), ref: 006973F0
                                            • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00697422
                                              • Part of subcall function 006854E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 0068555E
                                            • GetCursorPos.USER32(?), ref: 0069744E
                                            • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 006974AC
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                            • String ID:
                                            • API String ID: 4137160315-0
                                            • Opcode ID: c8f41aab90215168100cb55d1587d673b22c5c4c8b06c86ade078cf49e74e7b1
                                            • Instruction ID: 53147c97dcea37d4b6b59015fbf46866d1aad8ef809a3bb1e66a471a6ff16a3f
                                            • Opcode Fuzzy Hash: c8f41aab90215168100cb55d1587d673b22c5c4c8b06c86ade078cf49e74e7b1
                                            • Instruction Fuzzy Hash: F331E672508305ABDB24EF54D849F9BBBEEFF89714F000919F58997192DB30E908CB92
                                            APIs
                                              • Part of subcall function 006785F1: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00678608
                                              • Part of subcall function 006785F1: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00678612
                                              • Part of subcall function 006785F1: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00678621
                                              • Part of subcall function 006785F1: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00678628
                                              • Part of subcall function 006785F1: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0067863E
                                            • GetLengthSid.ADVAPI32(?,00000000,00678977), ref: 00678DAC
                                            • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00678DB8
                                            • HeapAlloc.KERNEL32(00000000), ref: 00678DBF
                                            • CopySid.ADVAPI32(00000000,00000000,?), ref: 00678DD8
                                            • GetProcessHeap.KERNEL32(00000000,00000000,00678977), ref: 00678DEC
                                            • HeapFree.KERNEL32(00000000), ref: 00678DF3
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                            • String ID:
                                            • API String ID: 3008561057-0
                                            • Opcode ID: d07bd2e23d296dc2c15d0f4796e4a6916e41fc4a79bdad3dff747873567bab8f
                                            • Instruction ID: 5dfde0989437ca48ce94fac7e451186b15a177d592f844c0314cd589fcb9f583
                                            • Opcode Fuzzy Hash: d07bd2e23d296dc2c15d0f4796e4a6916e41fc4a79bdad3dff747873567bab8f
                                            • Instruction Fuzzy Hash: 6E119A31640605EFDB20ABA4CC0DBAEBBAAEF56315F108029E84997250CB32AD00CF60
                                            APIs
                                            • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00678B2A
                                            • OpenProcessToken.ADVAPI32(00000000), ref: 00678B31
                                            • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00678B40
                                            • CloseHandle.KERNEL32(00000004), ref: 00678B4B
                                            • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00678B7A
                                            • DestroyEnvironmentBlock.USERENV(00000000), ref: 00678B8E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                            • String ID:
                                            • API String ID: 1413079979-0
                                            • Opcode ID: 3b8057cb75608b99c534bb8ef083008e17fe207b56640a301da7e04e80f25262
                                            • Instruction ID: 3c18cc337248d3bd9bd9d4fbe85a1d2a5fc63b4857885815b29d0eebbcf64090
                                            • Opcode Fuzzy Hash: 3b8057cb75608b99c534bb8ef083008e17fe207b56640a301da7e04e80f25262
                                            • Instruction Fuzzy Hash: FD1159B2540209AFDF019FE4ED49FDA7BAAEF09704F049064FE08A2160C7729D60AB61
                                            APIs
                                              • Part of subcall function 006212F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0062134D
                                              • Part of subcall function 006212F3: SelectObject.GDI32(?,00000000), ref: 0062135C
                                              • Part of subcall function 006212F3: BeginPath.GDI32(?), ref: 00621373
                                              • Part of subcall function 006212F3: SelectObject.GDI32(?,00000000), ref: 0062139C
                                            • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 006AC1C4
                                            • LineTo.GDI32(00000000,00000003,?), ref: 006AC1D8
                                            • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 006AC1E6
                                            • LineTo.GDI32(00000000,00000000,?), ref: 006AC1F6
                                            • EndPath.GDI32(00000000), ref: 006AC206
                                            • StrokePath.GDI32(00000000), ref: 006AC216
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                            • String ID:
                                            • API String ID: 43455801-0
                                            • Opcode ID: c8a9fdc50ab8270637c83e239b5c83a9a881e33b03e2081ea71c3f90c28e981b
                                            • Instruction ID: 3739ac017f7fd7ce914bf2f595b666ec74b810902d427d1d3bd2ccc902bb2185
                                            • Opcode Fuzzy Hash: c8a9fdc50ab8270637c83e239b5c83a9a881e33b03e2081ea71c3f90c28e981b
                                            • Instruction Fuzzy Hash: B0110C7640014CBFDB11AF94DC88FDA7FAEEB05394F048021B9194A161C771AE55DFA0
                                            APIs
                                            • MapVirtualKeyW.USER32(0000005B,00000000), ref: 006403D3
                                            • MapVirtualKeyW.USER32(00000010,00000000), ref: 006403DB
                                            • MapVirtualKeyW.USER32(000000A0,00000000), ref: 006403E6
                                            • MapVirtualKeyW.USER32(000000A1,00000000), ref: 006403F1
                                            • MapVirtualKeyW.USER32(00000011,00000000), ref: 006403F9
                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00640401
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Virtual
                                            • String ID:
                                            • API String ID: 4278518827-0
                                            • Opcode ID: d7d16e1cfe0facd87f7546e9b105cad5cc9d3cc573c800b72ee1b4386cfa2dcb
                                            • Instruction ID: 9b170cead01816f48775bddff2091ed510237b8129ec6e92bc15075a8bf64a23
                                            • Opcode Fuzzy Hash: d7d16e1cfe0facd87f7546e9b105cad5cc9d3cc573c800b72ee1b4386cfa2dcb
                                            • Instruction Fuzzy Hash: 15016CB09017597DE3009F5A8C85B52FFA8FF19354F00411BA15C47941C7F5A864CFE5
                                            APIs
                                            • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 0068569B
                                            • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 006856B1
                                            • GetWindowThreadProcessId.USER32(?,?), ref: 006856C0
                                            • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 006856CF
                                            • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 006856D9
                                            • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 006856E0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                            • String ID:
                                            • API String ID: 839392675-0
                                            • Opcode ID: 939fd405aa3fe686849e6b71365c9f2e7d73dc10746b32b84c31d1626cd400bb
                                            • Instruction ID: f631f163280f8d2c734c56ea97b9753449508b149387fd9a7856c081d06a850b
                                            • Opcode Fuzzy Hash: 939fd405aa3fe686849e6b71365c9f2e7d73dc10746b32b84c31d1626cd400bb
                                            • Instruction Fuzzy Hash: 22F01D32241158BBE7216BE2DC0DEEB7A7DEBC7B11F001169FA05D10609AA12A018AB6
                                            APIs
                                            • InterlockedExchange.KERNEL32(?,?), ref: 006874E5
                                            • EnterCriticalSection.KERNEL32(?,?,00631044,?,?), ref: 006874F6
                                            • TerminateThread.KERNEL32(00000000,000001F6,?,00631044,?,?), ref: 00687503
                                            • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00631044,?,?), ref: 00687510
                                              • Part of subcall function 00686ED7: CloseHandle.KERNEL32(00000000,?,0068751D,?,00631044,?,?), ref: 00686EE1
                                            • InterlockedExchange.KERNEL32(?,000001F6), ref: 00687523
                                            • LeaveCriticalSection.KERNEL32(?,?,00631044,?,?), ref: 0068752A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                            • String ID:
                                            • API String ID: 3495660284-0
                                            • Opcode ID: 82efacc6de67814584512cc27de4b84f8d9db9da01fe4d8b1d5eefa2f78200c7
                                            • Instruction ID: c9d1e2b8f7b8b6c373021606b5c7d1d6d404052c17e4a3011edf10725a1718c2
                                            • Opcode Fuzzy Hash: 82efacc6de67814584512cc27de4b84f8d9db9da01fe4d8b1d5eefa2f78200c7
                                            • Instruction Fuzzy Hash: 03F05E3A144612EBDB613BE4FC8CAEB772BEF46302B101631F202910B0DB756A01CF52
                                            APIs
                                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00678E7F
                                            • UnloadUserProfile.USERENV(?,?), ref: 00678E8B
                                            • CloseHandle.KERNEL32(?), ref: 00678E94
                                            • CloseHandle.KERNEL32(?), ref: 00678E9C
                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 00678EA5
                                            • HeapFree.KERNEL32(00000000), ref: 00678EAC
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                            • String ID:
                                            • API String ID: 146765662-0
                                            • Opcode ID: c05b8c43f7f1217fb6d225d4daa9ea8026ff6902dc885d6fe52d05196a9ade90
                                            • Instruction ID: ff11aa5dace3475f7f71ecd2301c3ce310222860071742df050faab2bb6fd243
                                            • Opcode Fuzzy Hash: c05b8c43f7f1217fb6d225d4daa9ea8026ff6902dc885d6fe52d05196a9ade90
                                            • Instruction Fuzzy Hash: 9AE05276104505FFDB012FE5EC0C95ABB6AFB8A762B509631F21981470CB32A861DF92
                                            APIs
                                            • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,006B2C7C,?), ref: 00677C32
                                            • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,006B2C7C,?), ref: 00677C4A
                                            • CLSIDFromProgID.OLE32(?,?,00000000,006AFB80,000000FF,?,00000000,00000800,00000000,?,006B2C7C,?), ref: 00677C6F
                                            • _memcmp.LIBCMT ref: 00677C90
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: FromProg$FreeTask_memcmp
                                            • String ID: ,,k
                                            • API String ID: 314563124-759674344
                                            • Opcode ID: 0b897102bf7b59b801b3bd78249e00269e3f2c4cd4bb5c90ce092925b9ce4cd8
                                            • Instruction ID: e70d52fef702a94f8f56b98616a8165eac6db28a23e8f57dfa8294394ef005cf
                                            • Opcode Fuzzy Hash: 0b897102bf7b59b801b3bd78249e00269e3f2c4cd4bb5c90ce092925b9ce4cd8
                                            • Instruction Fuzzy Hash: 59811B75A00109EFCB04DF94C984DEEB7BAFF89715F208198E516AB250DB71AE06CB61
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 00698928
                                            • CharUpperBuffW.USER32(?,?), ref: 00698A37
                                            • VariantClear.OLEAUT32(?), ref: 00698BAF
                                              • Part of subcall function 00687804: VariantInit.OLEAUT32(00000000), ref: 00687844
                                              • Part of subcall function 00687804: VariantCopy.OLEAUT32(00000000,?), ref: 0068784D
                                              • Part of subcall function 00687804: VariantClear.OLEAUT32(00000000), ref: 00687859
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Variant$ClearInit$BuffCharCopyUpper
                                            • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                            • API String ID: 4237274167-1221869570
                                            • Opcode ID: c06a19a9c45a03d106468f230b05d00612bad830a84f0d3573f174f3b97eb845
                                            • Instruction ID: d600c82bf67cd1c5c47d5b6d45f3a0d91eff7e1a93ffd7f42431f7f4ce1c755b
                                            • Opcode Fuzzy Hash: c06a19a9c45a03d106468f230b05d00612bad830a84f0d3573f174f3b97eb845
                                            • Instruction Fuzzy Hash: AC9180716087019FCB50DF28C48195ABBEAEFC9314F14896EF89A8B361DB31E945CB52
                                            APIs
                                              • Part of subcall function 0063FEC6: _wcscpy.LIBCMT ref: 0063FEE9
                                            • _memset.LIBCMT ref: 00683077
                                            • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 006830A6
                                            • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00683159
                                            • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00683187
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ItemMenu$Info$Default_memset_wcscpy
                                            • String ID: 0
                                            • API String ID: 4152858687-4108050209
                                            • Opcode ID: 113a5393569fe9c0d37a4395adb34eb23de135bd34039ffbb6c4b5ea21795295
                                            • Instruction ID: 275e7ac173122368abaa191a1262557114efd0591c4c7f8b5341fa7d21a1fb40
                                            • Opcode Fuzzy Hash: 113a5393569fe9c0d37a4395adb34eb23de135bd34039ffbb6c4b5ea21795295
                                            • Instruction Fuzzy Hash: B951EF316083209AD765BF28C849AABBBE6AF55F50F040B2DF8C5D7390DB70CA448B56
                                            APIs
                                            • _memset.LIBCMT ref: 00682CAF
                                            • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00682CCB
                                            • DeleteMenu.USER32(?,00000007,00000000), ref: 00682D11
                                            • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,006E6890,00000000), ref: 00682D5A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Menu$Delete$InfoItem_memset
                                            • String ID: 0
                                            • API String ID: 1173514356-4108050209
                                            • Opcode ID: 6981966ae49cb01b37e546307ea74b85ad297bd88c3c96a40fb4e1fd10b49234
                                            • Instruction ID: 2c9cc931f827a3fd3ff9dde97e76860d50aee89981416e68d370b7cb5d54480d
                                            • Opcode Fuzzy Hash: 6981966ae49cb01b37e546307ea74b85ad297bd88c3c96a40fb4e1fd10b49234
                                            • Instruction Fuzzy Hash: D941A0702053029FD720EF24C855B5ABBEAFF85320F144A1DF965973A1D770E905CBA6
                                            APIs
                                            • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0069DAD9
                                              • Part of subcall function 006279AB: _memmove.LIBCMT ref: 006279F9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: BuffCharLower_memmove
                                            • String ID: cdecl$none$stdcall$winapi
                                            • API String ID: 3425801089-567219261
                                            • Opcode ID: 12b5e6712010baf69ace5c0d92e8d5a9641e928d9d574e3fb50aa0a9c1530e29
                                            • Instruction ID: cab9ba2f61e32651b49d59a3f1057e48428daaeceaf90f336370f0acfef7cec1
                                            • Opcode Fuzzy Hash: 12b5e6712010baf69ace5c0d92e8d5a9641e928d9d574e3fb50aa0a9c1530e29
                                            • Instruction Fuzzy Hash: 9531967190061AAFCF10EF94CC819EEB7BAFF05310B10862EE86597BD5DB71A905CB94
                                            APIs
                                              • Part of subcall function 00627F41: _memmove.LIBCMT ref: 00627F82
                                              • Part of subcall function 0067B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0067B0E7
                                            • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 006793F6
                                            • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00679409
                                            • SendMessageW.USER32(?,00000189,?,00000000), ref: 00679439
                                              • Part of subcall function 00627D2C: _memmove.LIBCMT ref: 00627D66
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: MessageSend$_memmove$ClassName
                                            • String ID: ComboBox$ListBox
                                            • API String ID: 365058703-1403004172
                                            • Opcode ID: 6c8e70735c04a55275087f987548875c0c2134bfa472f1fa1994cdc5dd9358c0
                                            • Instruction ID: fbaa21454e52dc2292e5ac371c1b0f2042d53ccb3b5e097b581cf930571bd008
                                            • Opcode Fuzzy Hash: 6c8e70735c04a55275087f987548875c0c2134bfa472f1fa1994cdc5dd9358c0
                                            • Instruction Fuzzy Hash: A9210471900104BADB14ABB4DC86CFFB7BBDF06320B14812DF929972E1DB340D4ADA20
                                            APIs
                                            • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00691B40
                                            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00691B66
                                            • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00691B96
                                            • InternetCloseHandle.WININET(00000000), ref: 00691BDD
                                              • Part of subcall function 00692777: GetLastError.KERNEL32(?,?,00691B0B,00000000,00000000,00000001), ref: 0069278C
                                              • Part of subcall function 00692777: SetEvent.KERNEL32(?,?,00691B0B,00000000,00000000,00000001), ref: 006927A1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                            • String ID:
                                            • API String ID: 3113390036-3916222277
                                            • Opcode ID: d764a1a0a1009bc89af790590f7f52918db10d96da0caeec730e7d7b2e4d2d53
                                            • Instruction ID: c26ebccf7657998e01f52c9fbcdd6c706c31ca1b94b9ea87eef02384228187b8
                                            • Opcode Fuzzy Hash: d764a1a0a1009bc89af790590f7f52918db10d96da0caeec730e7d7b2e4d2d53
                                            • Instruction Fuzzy Hash: EE21C2B1500209BFEF119F64DCC5EBF76EFEB4A744F20012EF405AA640EA309D059B65
                                            APIs
                                              • Part of subcall function 00621D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00621D73
                                              • Part of subcall function 00621D35: GetStockObject.GDI32(00000011), ref: 00621D87
                                              • Part of subcall function 00621D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00621D91
                                            • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 006A66D0
                                            • LoadLibraryW.KERNEL32(?), ref: 006A66D7
                                            • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 006A66EC
                                            • DestroyWindow.USER32(?), ref: 006A66F4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                            • String ID: SysAnimate32
                                            • API String ID: 4146253029-1011021900
                                            • Opcode ID: 4b6dda74b612bf2fff4f9e7c6e7b58cd25226d3997f3b4a74a3182ba35ea6022
                                            • Instruction ID: 5464bc62420d5c10ea08b73615e9c79bc2430ed5e04db141823dde7a557a54dc
                                            • Opcode Fuzzy Hash: 4b6dda74b612bf2fff4f9e7c6e7b58cd25226d3997f3b4a74a3182ba35ea6022
                                            • Instruction Fuzzy Hash: 5621C271100205ABEF106F64DC80EFB77AFEF1A368F182629F91092290D771DC419F61
                                            APIs
                                            • GetStdHandle.KERNEL32(0000000C), ref: 0068705E
                                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00687091
                                            • GetStdHandle.KERNEL32(0000000C), ref: 006870A3
                                            • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 006870DD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: CreateHandle$FilePipe
                                            • String ID: nul
                                            • API String ID: 4209266947-2873401336
                                            • Opcode ID: 5ea3471754d2c3f13ea9fc24173e20b2cb51ad9ae8de254b161b7d4655a1174b
                                            • Instruction ID: a9960267f215ef975d221352b6082c5a055abe3d5693e783f3489ed087a1d7a4
                                            • Opcode Fuzzy Hash: 5ea3471754d2c3f13ea9fc24173e20b2cb51ad9ae8de254b161b7d4655a1174b
                                            • Instruction Fuzzy Hash: 2B217FB4504209ABDB20AF68D805A9A77FAAF95720F304719F9A0D72D0D771E940CB61
                                            APIs
                                            • GetStdHandle.KERNEL32(000000F6), ref: 0068712B
                                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 0068715D
                                            • GetStdHandle.KERNEL32(000000F6), ref: 0068716E
                                            • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 006871A8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: CreateHandle$FilePipe
                                            • String ID: nul
                                            • API String ID: 4209266947-2873401336
                                            • Opcode ID: 441a145b94c93b3457ad1b4aaae9d8ba7099299a5135af87eb8ff1ceb88fc552
                                            • Instruction ID: cdc5e49e2fd8e65a27f0c38612cc51eda70f81f3213fcb0d75dd6467cedb05ae
                                            • Opcode Fuzzy Hash: 441a145b94c93b3457ad1b4aaae9d8ba7099299a5135af87eb8ff1ceb88fc552
                                            • Instruction Fuzzy Hash: 8B2190756082059BDB20AF689C08A9AB7EAAF55724F340719F9E0D73D0D770E941CB51
                                            APIs
                                            • SetErrorMode.KERNEL32(00000001), ref: 0068AEBF
                                            • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 0068AF13
                                            • __swprintf.LIBCMT ref: 0068AF2C
                                            • SetErrorMode.KERNEL32(00000000,00000001,00000000,006AF910), ref: 0068AF6A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ErrorMode$InformationVolume__swprintf
                                            • String ID: %lu
                                            • API String ID: 3164766367-685833217
                                            • Opcode ID: 7a0a3d29e8a652a2399a8cdf49a7f4600c690a1248e5ad137dc565eeed20027b
                                            • Instruction ID: 3aaed30ec3a0c252880393a0b56ab33d6999a4b0fa712bff5db96a741c2f0e08
                                            • Opcode Fuzzy Hash: 7a0a3d29e8a652a2399a8cdf49a7f4600c690a1248e5ad137dc565eeed20027b
                                            • Instruction Fuzzy Hash: AC217434A00109AFDB50EF94D985DAE77B9EF89704B104069F909DB351DB31EE45CF25
                                            APIs
                                              • Part of subcall function 00627D2C: _memmove.LIBCMT ref: 00627D66
                                              • Part of subcall function 0067A37C: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0067A399
                                              • Part of subcall function 0067A37C: GetWindowThreadProcessId.USER32(?,00000000), ref: 0067A3AC
                                              • Part of subcall function 0067A37C: GetCurrentThreadId.KERNEL32 ref: 0067A3B3
                                              • Part of subcall function 0067A37C: AttachThreadInput.USER32(00000000), ref: 0067A3BA
                                            • GetFocus.USER32 ref: 0067A554
                                              • Part of subcall function 0067A3C5: GetParent.USER32(?), ref: 0067A3D3
                                            • GetClassNameW.USER32(?,?,00000100), ref: 0067A59D
                                            • EnumChildWindows.USER32(?,0067A615), ref: 0067A5C5
                                            • __swprintf.LIBCMT ref: 0067A5DF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                                            • String ID: %s%d
                                            • API String ID: 1941087503-1110647743
                                            • Opcode ID: e8e69906e939dea8319d1fa561912997d15318bf14892a8ecf983988c10e0706
                                            • Instruction ID: e2f3c72db81a4328d7ac43d6946adb5e931db5631a24029049573e0c5e645139
                                            • Opcode Fuzzy Hash: e8e69906e939dea8319d1fa561912997d15318bf14892a8ecf983988c10e0706
                                            • Instruction Fuzzy Hash: AE11B471600208BBDF507FA4EC85FEE777E9F89710F048079B90CAA192CA7059458B7A
                                            APIs
                                            • CharUpperBuffW.USER32(?,?), ref: 00682048
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: BuffCharUpper
                                            • String ID: APPEND$EXISTS$KEYS$REMOVE
                                            • API String ID: 3964851224-769500911
                                            • Opcode ID: 2d4cffe051fafae30cc830d667bd381ea2f9aa453c148aeecf8ac949ad707c88
                                            • Instruction ID: dca717edb713ab4506fe47ac858a8e518c8e7da4cf423d4ccda3efa32f1a836f
                                            • Opcode Fuzzy Hash: 2d4cffe051fafae30cc830d667bd381ea2f9aa453c148aeecf8ac949ad707c88
                                            • Instruction Fuzzy Hash: 6A115B30D0411A8FCF40EFA4D9518EEB7B6FF16304F10856DD855A7352EB32691ACB51
                                            APIs
                                            • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0069EF1B
                                            • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0069EF4B
                                            • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 0069F07E
                                            • CloseHandle.KERNEL32(?), ref: 0069F0FF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                            • String ID:
                                            • API String ID: 2364364464-0
                                            • Opcode ID: 3f17af1d768a1972aeba47c2bf3e55a6cafb86ff041d424ccb4c2bd234abe71d
                                            • Instruction ID: 4a4a8c3ba2244899357247eec115bb76601ea9cacf152779f7b5ecf66855a75f
                                            • Opcode Fuzzy Hash: 3f17af1d768a1972aeba47c2bf3e55a6cafb86ff041d424ccb4c2bd234abe71d
                                            • Instruction Fuzzy Hash: 528182716007109FDB60EF24DC46B6AB7EAAF88720F04881DF595DB792DB71AC408F96
                                            APIs
                                              • Part of subcall function 00627F41: _memmove.LIBCMT ref: 00627F82
                                              • Part of subcall function 006A10A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,006A0038,?,?), ref: 006A10BC
                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 006A0388
                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 006A03C7
                                            • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 006A040E
                                            • RegCloseKey.ADVAPI32(?,?), ref: 006A043A
                                            • RegCloseKey.ADVAPI32(00000000), ref: 006A0447
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                            • String ID:
                                            • API String ID: 3440857362-0
                                            • Opcode ID: f4e8aa970ec4a3d25d967b34da4b9a56ad83506aa6390c097a06f5b79847894f
                                            • Instruction ID: a872cf3b05d6b7f8343387ee97df18f22361ac392e296c22721ba8ef54419bb3
                                            • Opcode Fuzzy Hash: f4e8aa970ec4a3d25d967b34da4b9a56ad83506aa6390c097a06f5b79847894f
                                            • Instruction Fuzzy Hash: A0515A31208205AFDB44EF64D891E6EB7EAFF89304F04892DB596872A1DB31ED05CF56
                                            APIs
                                            • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 0068E88A
                                            • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 0068E8B3
                                            • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0068E8F2
                                              • Part of subcall function 00629997: __itow.LIBCMT ref: 006299C2
                                              • Part of subcall function 00629997: __swprintf.LIBCMT ref: 00629A0C
                                            • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 0068E917
                                            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0068E91F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                            • String ID:
                                            • API String ID: 1389676194-0
                                            • Opcode ID: d9387aee7cffb5194ac9ed1327d819af81dc8402fec7a80339d0b3a13a34ffc4
                                            • Instruction ID: 25bac0eaf7ec536341f1ed57462a97c592b1890d4204025aadaed9058e72c98b
                                            • Opcode Fuzzy Hash: d9387aee7cffb5194ac9ed1327d819af81dc8402fec7a80339d0b3a13a34ffc4
                                            • Instruction Fuzzy Hash: A4513B35A00615DFDF40EFA4C981AADBBF6EF49310B148099E849AB361CB32ED41CF65
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e68bc1ea14f6828fc7a0f447c47e8f3d66a1783155e707fdb0f8035e97df55fc
                                            • Instruction ID: c8afc316ec46127bd50aa5e024e850bd0022fdeed9a0282346ccc7acd6fc7b19
                                            • Opcode Fuzzy Hash: e68bc1ea14f6828fc7a0f447c47e8f3d66a1783155e707fdb0f8035e97df55fc
                                            • Instruction Fuzzy Hash: 25419035900214ABDB20FFA8CC44BE9BBA6EB0B310F144166F955E72A1D770AD41DE62
                                            APIs
                                            • GetCursorPos.USER32(?), ref: 00622357
                                            • ScreenToClient.USER32(006E67B0,?), ref: 00622374
                                            • GetAsyncKeyState.USER32(00000001), ref: 00622399
                                            • GetAsyncKeyState.USER32(00000002), ref: 006223A7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: AsyncState$ClientCursorScreen
                                            • String ID:
                                            • API String ID: 4210589936-0
                                            • Opcode ID: cd31f26e537a76b26d29caac153ca8ee787263e6785caa9d9e33160172e0eef2
                                            • Instruction ID: a05ddd6b653a08bdffcc4e4248d921856556f77863c85b3830cc4849066b6a3c
                                            • Opcode Fuzzy Hash: cd31f26e537a76b26d29caac153ca8ee787263e6785caa9d9e33160172e0eef2
                                            • Instruction Fuzzy Hash: D2416F31504626FFDF159FA4D844AE9BBB6FB05321F204319F82496290C7746E54DF91
                                            APIs
                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0067695D
                                            • TranslateAcceleratorW.USER32(?,?,?), ref: 006769A9
                                            • TranslateMessage.USER32(?), ref: 006769D2
                                            • DispatchMessageW.USER32(?), ref: 006769DC
                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 006769EB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Message$PeekTranslate$AcceleratorDispatch
                                            • String ID:
                                            • API String ID: 2108273632-0
                                            • Opcode ID: 8504a22ee739316315f26cc0d3ee219433765f743d294645a792ba4e1c1b8e17
                                            • Instruction ID: 7393674eacf7a7e607e99a0d97652d1fe5b9a8f8692e371da10e6be699b1345d
                                            • Opcode Fuzzy Hash: 8504a22ee739316315f26cc0d3ee219433765f743d294645a792ba4e1c1b8e17
                                            • Instruction Fuzzy Hash: 7831F831900B47AEDB20CF74CC84FF67BAFAB12340F109169F529C62A1E7749885DB90
                                            APIs
                                            • GetWindowRect.USER32(?,?), ref: 00678F12
                                            • PostMessageW.USER32(?,00000201,00000001), ref: 00678FBC
                                            • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00678FC4
                                            • PostMessageW.USER32(?,00000202,00000000), ref: 00678FD2
                                            • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00678FDA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: MessagePostSleep$RectWindow
                                            • String ID:
                                            • API String ID: 3382505437-0
                                            • Opcode ID: 17a293e38fd30ac223c6a6362da36a2aa3a8e96900f1689e4a1fdd364143848a
                                            • Instruction ID: 53e12700a4ac5298fc03abd0981ca69d44a289dfc1246e4859ba8e4f0b4ab220
                                            • Opcode Fuzzy Hash: 17a293e38fd30ac223c6a6362da36a2aa3a8e96900f1689e4a1fdd364143848a
                                            • Instruction Fuzzy Hash: 0A31CD71500219EFDB10CFA8D94CADE7BB6EB05315F108229F928E72D0CBB49D10CB91
                                            APIs
                                            • IsWindowVisible.USER32(?), ref: 0067B6C7
                                            • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0067B6E4
                                            • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0067B71C
                                            • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0067B742
                                            • _wcsstr.LIBCMT ref: 0067B74C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                            • String ID:
                                            • API String ID: 3902887630-0
                                            • Opcode ID: 83f0d4d12310c1510fb44f44139cfb0178ef0b4a1cbe1cbd9b3739168327c31f
                                            • Instruction ID: aa1d5f57fd5ad26174877ef3452cd7700b49ef20929b68bb0dd5986c4131e0a8
                                            • Opcode Fuzzy Hash: 83f0d4d12310c1510fb44f44139cfb0178ef0b4a1cbe1cbd9b3739168327c31f
                                            • Instruction Fuzzy Hash: CB21D731204244BAEB295B799C49F7B7B9ADF4A720F10903DFD09CA2A1EF61DC4197A1
                                            APIs
                                              • Part of subcall function 00622612: GetWindowLongW.USER32(?,000000EB), ref: 00622623
                                            • GetWindowLongW.USER32(?,000000F0), ref: 006AB44C
                                            • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 006AB471
                                            • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 006AB489
                                            • GetSystemMetrics.USER32(00000004), ref: 006AB4B2
                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00691184,00000000), ref: 006AB4D0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Window$Long$MetricsSystem
                                            • String ID:
                                            • API String ID: 2294984445-0
                                            • Opcode ID: c4e110bd0230e06be9b42587b44f5847c15eb29c0459a0a497cf26ae5a88f01d
                                            • Instruction ID: 839b4904dffebc5f5da06424363184f51719e4f2926487b7a648526592ddd349
                                            • Opcode Fuzzy Hash: c4e110bd0230e06be9b42587b44f5847c15eb29c0459a0a497cf26ae5a88f01d
                                            • Instruction Fuzzy Hash: 80218231910265AFCB10AF78DC44AA63BE6EB1A720F105728F925C62E7E7309C11DF50
                                            APIs
                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00679802
                                              • Part of subcall function 00627D2C: _memmove.LIBCMT ref: 00627D66
                                            • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00679834
                                            • __itow.LIBCMT ref: 0067984C
                                            • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00679874
                                            • __itow.LIBCMT ref: 00679885
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: MessageSend$__itow$_memmove
                                            • String ID:
                                            • API String ID: 2983881199-0
                                            • Opcode ID: 6a0c282b6725c54164dfba97ddaf3b03c81b5db587a54de729d9a56f064d6ae8
                                            • Instruction ID: 5af47d1574233f60b92119ea1b40d11c65e4b335d4c5e56cf3517f548df0780e
                                            • Opcode Fuzzy Hash: 6a0c282b6725c54164dfba97ddaf3b03c81b5db587a54de729d9a56f064d6ae8
                                            • Instruction Fuzzy Hash: EC21B831600214ABDB10AB659C86EEE7BFADF4A710F084429F90897351D6709D418BE6
                                            APIs
                                            • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0062134D
                                            • SelectObject.GDI32(?,00000000), ref: 0062135C
                                            • BeginPath.GDI32(?), ref: 00621373
                                            • SelectObject.GDI32(?,00000000), ref: 0062139C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ObjectSelect$BeginCreatePath
                                            • String ID:
                                            • API String ID: 3225163088-0
                                            • Opcode ID: c4a3d6ac9b80cd59b702eb96233a1b43c8448d055739128947067fa63b035eb3
                                            • Instruction ID: fdd5fc9133ab3a86141efaad8b3931c2b6f0e7e6b006e9883f421d16f7098aa5
                                            • Opcode Fuzzy Hash: c4a3d6ac9b80cd59b702eb96233a1b43c8448d055739128947067fa63b035eb3
                                            • Instruction Fuzzy Hash: DE219270914754EFDB10DF65EC447AE3BBBFB223A1F145225F8109A2A0D371A895CFA1
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: _memcmp
                                            • String ID:
                                            • API String ID: 2931989736-0
                                            • Opcode ID: 9f03bee70e9744d0f445d08dd6ef3562c72f35333905c8cc43e072d7c024e06a
                                            • Instruction ID: 829c46f05f72cce28126b14ac829471c6d45085b433251fdf3a34ca9e6945484
                                            • Opcode Fuzzy Hash: 9f03bee70e9744d0f445d08dd6ef3562c72f35333905c8cc43e072d7c024e06a
                                            • Instruction Fuzzy Hash: 1E0192A16041067BE604A6209C52EEB67DF9B223B4B85813DFD089A383FB50DE5183A4
                                            APIs
                                            • GetCurrentThreadId.KERNEL32 ref: 00684D5C
                                            • __beginthreadex.LIBCMT ref: 00684D7A
                                            • MessageBoxW.USER32(?,?,?,?), ref: 00684D8F
                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00684DA5
                                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00684DAC
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                            • String ID:
                                            • API String ID: 3824534824-0
                                            • Opcode ID: 733efb23067e2cd772aff96af623a510f0eed786cf46d956f206bf31718b013a
                                            • Instruction ID: c70a85762ae1226e229930eb0c1e979c43ae8b79ec178dee6f9536f36424d369
                                            • Opcode Fuzzy Hash: 733efb23067e2cd772aff96af623a510f0eed786cf46d956f206bf31718b013a
                                            • Instruction Fuzzy Hash: 36110872904245BFCB01ABA8DC44ADA7FAEEB45320F144365F914D7351DA719D048BA1
                                            APIs
                                            • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00678766
                                            • GetLastError.KERNEL32(?,0067822A,?,?,?), ref: 00678770
                                            • GetProcessHeap.KERNEL32(00000008,?,?,0067822A,?,?,?), ref: 0067877F
                                            • HeapAlloc.KERNEL32(00000000,?,0067822A,?,?,?), ref: 00678786
                                            • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0067879D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                            • String ID:
                                            • API String ID: 842720411-0
                                            • Opcode ID: 31808fea3b78362568ac7b059de5521957c93b88936778102e073ebb0362e9bc
                                            • Instruction ID: 9223df865bccf2f27ef51b5fb088b9cedad43861f10bd797c0576a5293c748c6
                                            • Opcode Fuzzy Hash: 31808fea3b78362568ac7b059de5521957c93b88936778102e073ebb0362e9bc
                                            • Instruction Fuzzy Hash: 34014F71240204EFDB245FAADC4CDAB7B6EEF863557204429F84AC3260DA31DC00CEA1
                                            APIs
                                            • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00685502
                                            • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00685510
                                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00685518
                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00685522
                                            • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 0068555E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: PerformanceQuery$CounterSleep$Frequency
                                            • String ID:
                                            • API String ID: 2833360925-0
                                            • Opcode ID: 530b6509b0628d62e5734b6fe2e8eee0644dc76fdea662f5e7e929626095bbcb
                                            • Instruction ID: 54303e06c4f88ab7d6b53bbc80bd29787b044e94ef5b5ba25f83cf827786c10d
                                            • Opcode Fuzzy Hash: 530b6509b0628d62e5734b6fe2e8eee0644dc76fdea662f5e7e929626095bbcb
                                            • Instruction Fuzzy Hash: 82012135D00A1DDBCF00FFE5E8495EDBB7AFB09711F400596E942B2240DB305A55CBA2
                                            APIs
                                            • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0067758C,80070057,?,?,?,0067799D), ref: 0067766F
                                            • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0067758C,80070057,?,?), ref: 0067768A
                                            • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0067758C,80070057,?,?), ref: 00677698
                                            • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0067758C,80070057,?), ref: 006776A8
                                            • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0067758C,80070057,?,?), ref: 006776B4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: From$Prog$FreeStringTasklstrcmpi
                                            • String ID:
                                            • API String ID: 3897988419-0
                                            • Opcode ID: cc4c0562b9586d1c964ae1b56e87bdb6aba9b853e925eff5326da773e24f5c80
                                            • Instruction ID: 4ead645a5596e807462867a8b59ad4f9e3cee1670d05add9dcc2ba52ae5b3c48
                                            • Opcode Fuzzy Hash: cc4c0562b9586d1c964ae1b56e87bdb6aba9b853e925eff5326da773e24f5c80
                                            • Instruction Fuzzy Hash: E901D476600604FBDB106F58DC04BAABBBEEB45751F204128FD08D2225E735EE008BA0
                                            APIs
                                            • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00678608
                                            • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00678612
                                            • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00678621
                                            • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00678628
                                            • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0067863E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: HeapInformationToken$AllocErrorLastProcess
                                            • String ID:
                                            • API String ID: 44706859-0
                                            • Opcode ID: 0a4d714d98111095989e475b630a1c351074ec31852dc77e19cf99b9786094bf
                                            • Instruction ID: cb7b283c840fff3b7739493594f3b34f3fb27e72fbfa2dd1ac6048c9e80a6241
                                            • Opcode Fuzzy Hash: 0a4d714d98111095989e475b630a1c351074ec31852dc77e19cf99b9786094bf
                                            • Instruction Fuzzy Hash: A1F04F31241204BFEB101FE5DC9DEAB3BAEEF8A755B004425F94DC7250CBA1AD41DE61
                                            APIs
                                            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00678669
                                            • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00678673
                                            • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00678682
                                            • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00678689
                                            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0067869F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: HeapInformationToken$AllocErrorLastProcess
                                            • String ID:
                                            • API String ID: 44706859-0
                                            • Opcode ID: 1311948796382c99daebec635f2b2eb278ceea4c7b9aa43289895e135ca3f999
                                            • Instruction ID: bf37762ba86a9b73aafe8b80663c3330a6bbacadf7ae8accc2b7393cc113ce0b
                                            • Opcode Fuzzy Hash: 1311948796382c99daebec635f2b2eb278ceea4c7b9aa43289895e135ca3f999
                                            • Instruction Fuzzy Hash: CAF04471240214BFDB112FA5DC8CEA73BAEEF46755B100025F549C7250DB61AD41DE62
                                            APIs
                                            • GetDlgItem.USER32(?,000003E9), ref: 0067C6BA
                                            • GetWindowTextW.USER32(00000000,?,00000100), ref: 0067C6D1
                                            • MessageBeep.USER32(00000000), ref: 0067C6E9
                                            • KillTimer.USER32(?,0000040A), ref: 0067C705
                                            • EndDialog.USER32(?,00000001), ref: 0067C71F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: BeepDialogItemKillMessageTextTimerWindow
                                            • String ID:
                                            • API String ID: 3741023627-0
                                            • Opcode ID: 897c9abfd1412139dab84a25ba7e2e95cec7801f60fba90523687c7e9bb284e3
                                            • Instruction ID: c3225701957b4ae5ba0a837fddc39bdf99e8aa93fa5ffa7b86eab8756ad20a16
                                            • Opcode Fuzzy Hash: 897c9abfd1412139dab84a25ba7e2e95cec7801f60fba90523687c7e9bb284e3
                                            • Instruction Fuzzy Hash: F401A230400704ABEB24AF60EC8EF9677BAFF01701F00566DF586A14E1DBE0A9548F91
                                            APIs
                                            • EndPath.GDI32(?), ref: 006213BF
                                            • StrokeAndFillPath.GDI32(?,?,0065BAD8,00000000,?), ref: 006213DB
                                            • SelectObject.GDI32(?,00000000), ref: 006213EE
                                            • DeleteObject.GDI32 ref: 00621401
                                            • StrokePath.GDI32(?), ref: 0062141C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Path$ObjectStroke$DeleteFillSelect
                                            • String ID:
                                            • API String ID: 2625713937-0
                                            • Opcode ID: 27470ae03fe91ab82aadab38dc203df77460206c513cf32db7594e2e94a01fe6
                                            • Instruction ID: b76607bef88cd3aefcf17c1a17adb11b3d54bce4284ee6c0d70eb92c9aab70e0
                                            • Opcode Fuzzy Hash: 27470ae03fe91ab82aadab38dc203df77460206c513cf32db7594e2e94a01fe6
                                            • Instruction Fuzzy Hash: F2F01D30024748DBDB156F56EC4C7593BA7AB22366F04A224F4694C1F1C73159A5DF21
                                            APIs
                                              • Part of subcall function 00640FF6: std::exception::exception.LIBCMT ref: 0064102C
                                              • Part of subcall function 00640FF6: __CxxThrowException@8.LIBCMT ref: 00641041
                                              • Part of subcall function 00627F41: _memmove.LIBCMT ref: 00627F82
                                              • Part of subcall function 00627BB1: _memmove.LIBCMT ref: 00627C0B
                                            • __swprintf.LIBCMT ref: 0063302D
                                            Strings
                                            • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00632EC6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                            • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                            • API String ID: 1943609520-557222456
                                            • Opcode ID: b4d1bf774bde50a54594cff225b01c0d68d3fcef24630ea3d2292448f67eea4a
                                            • Instruction ID: 104a6c344b3462095c67a848db9af60b83255ab775f9b50b59df329d21a4646c
                                            • Opcode Fuzzy Hash: b4d1bf774bde50a54594cff225b01c0d68d3fcef24630ea3d2292448f67eea4a
                                            • Instruction Fuzzy Hash: F1918D71108721AFC768EF24E885CAFB7A6EF85750F00491DF4429B2A1DB30EE44CB96
                                            APIs
                                            • OleSetContainedObject.OLE32(?,00000001), ref: 0067B981
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ContainedObject
                                            • String ID: AutoIt3GUI$Container$%k
                                            • API String ID: 3565006973-671182982
                                            • Opcode ID: 5a02d9230dea435bef12e31a87429e665f6bf27cb6562d2e87545783f2d180de
                                            • Instruction ID: f59cb6cfc6a86f009ab36f9c9eac74112fab3feddd0ff1e96d15f2f7c9d5bcfc
                                            • Opcode Fuzzy Hash: 5a02d9230dea435bef12e31a87429e665f6bf27cb6562d2e87545783f2d180de
                                            • Instruction Fuzzy Hash: 86913A706006019FDB64DF64C884BAABBFAFF49710F14956EE949CB791DB70E841CB60
                                            APIs
                                            • __startOneArgErrorHandling.LIBCMT ref: 006452DD
                                              • Part of subcall function 00650340: __87except.LIBCMT ref: 0065037B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ErrorHandling__87except__start
                                            • String ID: pow
                                            • API String ID: 2905807303-2276729525
                                            • Opcode ID: 6fc491e90d28f24ac1c6242890a7d3244ceb60f9e9d5f39dc9902ae81b18bb7a
                                            • Instruction ID: c40364e4cc3a80d9dffdb64bffca4338110927bbb9192b5343c0ad6742971439
                                            • Opcode Fuzzy Hash: 6fc491e90d28f24ac1c6242890a7d3244ceb60f9e9d5f39dc9902ae81b18bb7a
                                            • Instruction Fuzzy Hash: 15515A61A0D602C7EB126B24C9413FE2BD39B40751F20895DE896863E7EF74CDDC9A46
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: #$+
                                            • API String ID: 0-2552117581
                                            • Opcode ID: 57b6780227f3cdd532fbdaca9a56abf60a80b56d0b18fe4aabf0efacda039930
                                            • Instruction ID: 92e34a07a04d948e9136ea495a5ec54abdd34ee5ed12c07391d8f66c76519484
                                            • Opcode Fuzzy Hash: 57b6780227f3cdd532fbdaca9a56abf60a80b56d0b18fe4aabf0efacda039930
                                            • Instruction Fuzzy Hash: 40515735504656DFDF25DF28C488AFA7BA6EF1A310F148099FC969B3A0D7B09C42CB64
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: _memmove$_free
                                            • String ID: Oac
                                            • API String ID: 2620147621-752515563
                                            • Opcode ID: a6d51b5f05cd1505be735699eefa0328394512011fa593cb590bc913a70fee1e
                                            • Instruction ID: 8aa7564288e0c0e382cc11168094ceb5d0d100e3d52b27914e0f3c18f7cf1649
                                            • Opcode Fuzzy Hash: a6d51b5f05cd1505be735699eefa0328394512011fa593cb590bc913a70fee1e
                                            • Instruction Fuzzy Hash: C5515A71A083519FDB64CF28C891B6BBBE6BF85314F04492DE989C7351DB31EA41CB92
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: _memset$_memmove
                                            • String ID: ERCP
                                            • API String ID: 2532777613-1384759551
                                            • Opcode ID: 981d4e2e997f1b81b6f954fc3e80f10b5c81d8d9af810993e1444560540156a1
                                            • Instruction ID: 5d54b0ce08c3aef74b617b636084185bdc84df39b5b7617738d3074f257da368
                                            • Opcode Fuzzy Hash: 981d4e2e997f1b81b6f954fc3e80f10b5c81d8d9af810993e1444560540156a1
                                            • Instruction Fuzzy Hash: C1519E71900319EBDB24CF65C881BEABBF6EF04714F20C56EE64ACA341E7719585CB84
                                            APIs
                                            • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 006A76D0
                                            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 006A76E4
                                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 006A7708
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window
                                            • String ID: SysMonthCal32
                                            • API String ID: 2326795674-1439706946
                                            • Opcode ID: 42223f82a27a3128eb1bb228dafae16afde976230236f35fef155ca7d3dfb134
                                            • Instruction ID: d875d1d18da2c57982a42b1054777f9ec921948c30e52f73483793fd5c9a435d
                                            • Opcode Fuzzy Hash: 42223f82a27a3128eb1bb228dafae16afde976230236f35fef155ca7d3dfb134
                                            • Instruction Fuzzy Hash: 4521D332500218BBDF11DF94CC42FEA3B6AEF49714F111214FE156B1D0D6B1AC518FA0
                                            APIs
                                            • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 006A6FAA
                                            • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 006A6FBA
                                            • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 006A6FDF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: MessageSend$MoveWindow
                                            • String ID: Listbox
                                            • API String ID: 3315199576-2633736733
                                            • Opcode ID: 9f96ffb5b596894394bd26627b6e49efa1bdcbca3e08733232b93170026e3a64
                                            • Instruction ID: 733c3dfcd5635093ef3c241447764abd7b329acfda0fb5e519e8a397dcb9886f
                                            • Opcode Fuzzy Hash: 9f96ffb5b596894394bd26627b6e49efa1bdcbca3e08733232b93170026e3a64
                                            • Instruction Fuzzy Hash: A6216232610118BFDF11AF54EC85EFB37ABEF8A764F158128F9159B290C671AC518FA0
                                            APIs
                                            • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 006A79E1
                                            • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 006A79F6
                                            • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 006A7A03
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID: msctls_trackbar32
                                            • API String ID: 3850602802-1010561917
                                            • Opcode ID: bdd89fcad17f50b2c064134b3bb4845567a711e2f9594da2241bb69602e14130
                                            • Instruction ID: cd83a99445b81b35309e63678f836804cee8c1c2ce5c001f8bcf6fee52ad991c
                                            • Opcode Fuzzy Hash: bdd89fcad17f50b2c064134b3bb4845567a711e2f9594da2241bb69602e14130
                                            • Instruction Fuzzy Hash: 2511C132244208BAEF10AF64CC05FEB77AAEF8A764F020529FA41A6191D271A811CF60
                                            APIs
                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,00624C2E), ref: 00624CA3
                                            • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00624CB5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: GetNativeSystemInfo$kernel32.dll
                                            • API String ID: 2574300362-192647395
                                            • Opcode ID: 507309feb58cc85d65f1614859f6098a098d94e013c9649f78789e26ace82255
                                            • Instruction ID: 036a1a6e7a8d5df0a7509f2037b53fca6b7fe573698dbba228911cdd578dacb9
                                            • Opcode Fuzzy Hash: 507309feb58cc85d65f1614859f6098a098d94e013c9649f78789e26ace82255
                                            • Instruction Fuzzy Hash: 0ED01270610723CFD7206FB5DA58646B6E7AF06751B118839D886D6250DA70DC80CE61
                                            APIs
                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,00624D2E,?,00624F4F,?,006E62F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00624D6F
                                            • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00624D81
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                            • API String ID: 2574300362-3689287502
                                            • Opcode ID: 759da8abdfcca06438a02f04b2822610b8e62fc8ff8c67beed15debae626de3a
                                            • Instruction ID: 9c3e0df2402d4bf54f13a1c9689b30989ebbef1943ba93f56c1f7a442b177091
                                            • Opcode Fuzzy Hash: 759da8abdfcca06438a02f04b2822610b8e62fc8ff8c67beed15debae626de3a
                                            • Instruction Fuzzy Hash: D1D01270510723CFD7206F71D84865676EAAF16391B11DC3AD486D6350EA70D880CE61
                                            APIs
                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,00624CE1,?), ref: 00624DA2
                                            • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00624DB4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                            • API String ID: 2574300362-1355242751
                                            • Opcode ID: 5762a3b56abe619b611d1cf063ee8d384e1c201dddb6427ab20a58d00f9fcc24
                                            • Instruction ID: 967aca19f3765d82ec1037469b22d1828f81fc4e7c96a11cafb3c229f92fad34
                                            • Opcode Fuzzy Hash: 5762a3b56abe619b611d1cf063ee8d384e1c201dddb6427ab20a58d00f9fcc24
                                            • Instruction Fuzzy Hash: 5ED01271550723CFD7306F71D84868676E6AF06355B11CC3AD8C5D6250EB70D880CE61
                                            APIs
                                            • LoadLibraryA.KERNEL32(advapi32.dll,?,006A12C1), ref: 006A1080
                                            • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 006A1092
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: RegDeleteKeyExW$advapi32.dll
                                            • API String ID: 2574300362-4033151799
                                            • Opcode ID: d9a4bff79280023152304a6b17cd4c069f5093bb8e3a183e6068a5119176a6c5
                                            • Instruction ID: b864369abc370ff02e4f45efd2cf951612ea78f0af0d9a55437250754e29dd7a
                                            • Opcode Fuzzy Hash: d9a4bff79280023152304a6b17cd4c069f5093bb8e3a183e6068a5119176a6c5
                                            • Instruction Fuzzy Hash: 06D0EC31910712CFD7206B75D96856A76E6AF06351B129C2AA4C5DA250DB70D8808A51
                                            APIs
                                            • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00699009,?,006AF910), ref: 00699403
                                            • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00699415
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: GetModuleHandleExW$kernel32.dll
                                            • API String ID: 2574300362-199464113
                                            • Opcode ID: a1dda171b4b13f891372c024076208e7b9bc569f238d5ee85fefdbb12fafa37b
                                            • Instruction ID: 477feada0314e17f04c34af51768cc23373a6528397fbffcba720f51605d2761
                                            • Opcode Fuzzy Hash: a1dda171b4b13f891372c024076208e7b9bc569f238d5ee85fefdbb12fafa37b
                                            • Instruction Fuzzy Hash: A5D01234514713CFDB306FB5D94854676EBAF26751B11C83ED485D6A50D670D880CB61
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: LocalTime__swprintf
                                            • String ID: %.3d$WIN_XPe
                                            • API String ID: 2070861257-2409531811
                                            • Opcode ID: 26128cce35bd17bc56c1367ed955ef08aacb0d8a18932b0d0b899d75a952558d
                                            • Instruction ID: aa7a2594e731fc3aacab195335ea842bf31335514be0cbb072eebc472ed03a73
                                            • Opcode Fuzzy Hash: 26128cce35bd17bc56c1367ed955ef08aacb0d8a18932b0d0b899d75a952558d
                                            • Instruction Fuzzy Hash: 39D01271C0411CEACB449BE0DC449F9737FAB0A311F180593B50295000F2349B86DF25
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7ddc295d04edc00465aad524984119eca507cecd738de7c2aa9c8277b3c5e1d1
                                            • Instruction ID: a4fc8eaaa4c46c73d0365caaf851a8c74bf2b73d9d11cc28f78c2a010dc579df
                                            • Opcode Fuzzy Hash: 7ddc295d04edc00465aad524984119eca507cecd738de7c2aa9c8277b3c5e1d1
                                            • Instruction Fuzzy Hash: 4CC16E75A04216EFDB14CFA4C884EAEB7B6FF48714B1185A9E909EB351D730ED81CB90
                                            APIs
                                            • CharLowerBuffW.USER32(?,?), ref: 0069E3D2
                                            • CharLowerBuffW.USER32(?,?), ref: 0069E415
                                              • Part of subcall function 0069DAB9: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0069DAD9
                                            • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 0069E615
                                            • _memmove.LIBCMT ref: 0069E628
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: BuffCharLower$AllocVirtual_memmove
                                            • String ID:
                                            • API String ID: 3659485706-0
                                            • Opcode ID: 76a222f0c6cc4e2af40766396faccba3a3fe541522413bec65b78186dd2dbe90
                                            • Instruction ID: b097295a26e853b58eaa8e1e9530256ff7866e5045f9f69dfed93818e03a6060
                                            • Opcode Fuzzy Hash: 76a222f0c6cc4e2af40766396faccba3a3fe541522413bec65b78186dd2dbe90
                                            • Instruction Fuzzy Hash: 78C18E71A083118FCB54DF28C48095ABBE6FF88714F14896EF8999B751D732E946CF82
                                            APIs
                                            • CoInitialize.OLE32(00000000), ref: 006983D8
                                            • CoUninitialize.OLE32 ref: 006983E3
                                              • Part of subcall function 0067DA5D: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0067DAC5
                                            • VariantInit.OLEAUT32(?), ref: 006983EE
                                            • VariantClear.OLEAUT32(?), ref: 006986BF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                            • String ID:
                                            • API String ID: 780911581-0
                                            • Opcode ID: ed8dc226591f7daa3b3a762abb4e81db0d9c5e04af35167151542b42f5d5fdb3
                                            • Instruction ID: 37350d2769d0a60d61a1a9163388cc968a6160c2cc414d7ec2cc760e499e8214
                                            • Opcode Fuzzy Hash: ed8dc226591f7daa3b3a762abb4e81db0d9c5e04af35167151542b42f5d5fdb3
                                            • Instruction Fuzzy Hash: 75A16B75604B119FDB50DF14C481A2AB7EABF89324F08884DF99A9B7A1CB30EC44CF56
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Variant$AllocClearCopyInitString
                                            • String ID:
                                            • API String ID: 2808897238-0
                                            • Opcode ID: 2e30312899f9ccac44d863f70d037bfea5439acfcc4d68902ef930cd659ab4a5
                                            • Instruction ID: 6c216d8c7302e9e6fb39d5248d276d6b4cdce77eef8e167b3a5053edef2657f5
                                            • Opcode Fuzzy Hash: 2e30312899f9ccac44d863f70d037bfea5439acfcc4d68902ef930cd659ab4a5
                                            • Instruction Fuzzy Hash: DD51C8706087019ADB70AF75D891A6EB3E7AF49310F20D81FF59ECB292DB749880DB15
                                            APIs
                                            • GetWindowRect.USER32(0120EDF0,?), ref: 006A9AD2
                                            • ScreenToClient.USER32(00000002,00000002), ref: 006A9B05
                                            • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 006A9B72
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Window$ClientMoveRectScreen
                                            • String ID:
                                            • API String ID: 3880355969-0
                                            • Opcode ID: 2ecd416cb72034e2b1e6f580af8d5b5ff62bab3619cb8fdf2198fc4bb06e27f5
                                            • Instruction ID: d4aedc0e8d8409c035a863306756ec34341bd4c57dedfd9860edf1de5d945436
                                            • Opcode Fuzzy Hash: 2ecd416cb72034e2b1e6f580af8d5b5ff62bab3619cb8fdf2198fc4bb06e27f5
                                            • Instruction Fuzzy Hash: D351FB34A00649AFCF14EF58D8819EE7BB7EB56360F248559F9159B3A0D730AD41CFA0
                                            APIs
                                            • socket.WSOCK32(00000002,00000002,00000011), ref: 00696CE4
                                            • WSAGetLastError.WSOCK32(00000000), ref: 00696CF4
                                              • Part of subcall function 00629997: __itow.LIBCMT ref: 006299C2
                                              • Part of subcall function 00629997: __swprintf.LIBCMT ref: 00629A0C
                                            • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00696D58
                                            • WSAGetLastError.WSOCK32(00000000), ref: 00696D64
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ErrorLast$__itow__swprintfsocket
                                            • String ID:
                                            • API String ID: 2214342067-0
                                            • Opcode ID: 932d3564bb92f67bcc4f3bf8532b15661b28e9d2d4695d7bc24a93d23d0f0a7a
                                            • Instruction ID: d2fa416fb39036a206056c8c06a84a8055f3ba63618914f0f1acac02efc4d38d
                                            • Opcode Fuzzy Hash: 932d3564bb92f67bcc4f3bf8532b15661b28e9d2d4695d7bc24a93d23d0f0a7a
                                            • Instruction Fuzzy Hash: 1841A574740710AFEB60AF24EC86F7A77EA9F48B10F44841CFA599B2D2DA719C018F55
                                            APIs
                                            • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,006AF910), ref: 006967BA
                                            • _strlen.LIBCMT ref: 006967EC
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: _strlen
                                            • String ID:
                                            • API String ID: 4218353326-0
                                            • Opcode ID: fa620fa70de28ef34c6d3845e74e1ba3f31a7b58aadeb165c9ce3515a6576329
                                            • Instruction ID: 14488602eb2f9ee2a6c9fe15077bfa8b9e50176bf8ee17f6adc9331c50e62795
                                            • Opcode Fuzzy Hash: fa620fa70de28ef34c6d3845e74e1ba3f31a7b58aadeb165c9ce3515a6576329
                                            • Instruction Fuzzy Hash: 6341B531A00614ABCF54EBA4DDC5EBEB3AFAF44314F148169F81A9B291DB30AD01CB65
                                            APIs
                                            • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 0068BB09
                                            • GetLastError.KERNEL32(?,00000000), ref: 0068BB2F
                                            • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 0068BB54
                                            • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 0068BB80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: CreateHardLink$DeleteErrorFileLast
                                            • String ID:
                                            • API String ID: 3321077145-0
                                            • Opcode ID: 712f6fe2acf00d363a065d1a805c62dc246ca27ff4ea6aa61df6e9123ec18309
                                            • Instruction ID: 82f08568a7c939f296be7ff8d4d7fdf459354ad35d19ed819ae3e499ff46f093
                                            • Opcode Fuzzy Hash: 712f6fe2acf00d363a065d1a805c62dc246ca27ff4ea6aa61df6e9123ec18309
                                            • Instruction Fuzzy Hash: 63412B35600A20DFDB10EF15D585A59BBE2EF89320F09C488E84A9B762CB31FD41CFA5
                                            APIs
                                            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 006A8B4D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: InvalidateRect
                                            • String ID:
                                            • API String ID: 634782764-0
                                            • Opcode ID: 5ace80a9a586b18c99fc8ef3996eb1af19776d56a959b1d42a9cf3dd506abf2b
                                            • Instruction ID: ede7c012b079e4358d14ba940e5e57a31a875e0e462de7e7e392a3bdd703ddd5
                                            • Opcode Fuzzy Hash: 5ace80a9a586b18c99fc8ef3996eb1af19776d56a959b1d42a9cf3dd506abf2b
                                            • Instruction Fuzzy Hash: D031ADB4600214BEEB24BE58CC85BE937A7EB17310F244916FA51D73A1DF30AD408F61
                                            APIs
                                            • ClientToScreen.USER32(?,?), ref: 006AAE1A
                                            • GetWindowRect.USER32(?,?), ref: 006AAE90
                                            • PtInRect.USER32(?,?,006AC304), ref: 006AAEA0
                                            • MessageBeep.USER32(00000000), ref: 006AAF11
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Rect$BeepClientMessageScreenWindow
                                            • String ID:
                                            • API String ID: 1352109105-0
                                            • Opcode ID: 4be7d7e8288940f754526821b563de76ea5234be82112842c01b81acad368f4d
                                            • Instruction ID: dffb5a15512ae02fd936a39f52f12c17c123b8460b93c8a096f0e840d10e7649
                                            • Opcode Fuzzy Hash: 4be7d7e8288940f754526821b563de76ea5234be82112842c01b81acad368f4d
                                            • Instruction Fuzzy Hash: 3A418070600215DFCB11EF98C884AA9BBF7FB8A340F1481AAE4148B351D731AC02DF62
                                            APIs
                                            • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00681037
                                            • SetKeyboardState.USER32(00000080,?,00000001), ref: 00681053
                                            • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 006810B9
                                            • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 0068110B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: KeyboardState$InputMessagePostSend
                                            • String ID:
                                            • API String ID: 432972143-0
                                            • Opcode ID: d35ef69e6d9b873211720b2d399e57e51e95bc0ed4139fd0f01043d5ea0837eb
                                            • Instruction ID: 1c03d8ea19fc99cba6dd95861883cc15e0ee8bf8566133d83b5a49857ea6a80a
                                            • Opcode Fuzzy Hash: d35ef69e6d9b873211720b2d399e57e51e95bc0ed4139fd0f01043d5ea0837eb
                                            • Instruction Fuzzy Hash: 93315E30E40688AEFF30AB658C05BF9BBAFAF47310F04431AE5845A2D1CB7549C79765
                                            APIs
                                            • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 00681176
                                            • SetKeyboardState.USER32(00000080,?,00008000), ref: 00681192
                                            • PostMessageW.USER32(00000000,00000101,00000000), ref: 006811F1
                                            • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 00681243
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: KeyboardState$InputMessagePostSend
                                            • String ID:
                                            • API String ID: 432972143-0
                                            • Opcode ID: 82280112bbcd50b9b61a3cdfc4e0c505c7f54c82ddb0a02b42ab5f679a62c1ae
                                            • Instruction ID: 92faf007fa7fc917c839955b6d6f57f39ee8fce2469739da2b6aeaa019f4ab6f
                                            • Opcode Fuzzy Hash: 82280112bbcd50b9b61a3cdfc4e0c505c7f54c82ddb0a02b42ab5f679a62c1ae
                                            • Instruction Fuzzy Hash: C3314870D402089AFF30ABA58C187FA7BAFAB4B310F04431EE5D09A6D1C3755A868751
                                            APIs
                                            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0065644B
                                            • __isleadbyte_l.LIBCMT ref: 00656479
                                            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 006564A7
                                            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 006564DD
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                            • String ID:
                                            • API String ID: 3058430110-0
                                            • Opcode ID: 87f3898fd5a902eddace41062cbf5f1e29fa7defa3d3275de0ef06de65df38c2
                                            • Instruction ID: fb0761a4bb430b6307bf01819bfea225728339cec3aededf24c1913b8fcf876e
                                            • Opcode Fuzzy Hash: 87f3898fd5a902eddace41062cbf5f1e29fa7defa3d3275de0ef06de65df38c2
                                            • Instruction Fuzzy Hash: 8C31D031600246AFDB218F74C844BAA7BE7FF41312F558129FC54872A0E731EC99DB90
                                            APIs
                                            • GetForegroundWindow.USER32 ref: 006A5189
                                              • Part of subcall function 0068387D: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00683897
                                              • Part of subcall function 0068387D: GetCurrentThreadId.KERNEL32 ref: 0068389E
                                              • Part of subcall function 0068387D: AttachThreadInput.USER32(00000000,?,006852A7), ref: 006838A5
                                            • GetCaretPos.USER32(?), ref: 006A519A
                                            • ClientToScreen.USER32(00000000,?), ref: 006A51D5
                                            • GetForegroundWindow.USER32 ref: 006A51DB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                            • String ID:
                                            • API String ID: 2759813231-0
                                            • Opcode ID: 069aab16567c087a0a53b46120172a4e8c90a7fa8168075ef9e0b9879b2df045
                                            • Instruction ID: 7f4b307768031b5562030ac1a3bcafa29e158da21400b116b8ce4b9a732f0710
                                            • Opcode Fuzzy Hash: 069aab16567c087a0a53b46120172a4e8c90a7fa8168075ef9e0b9879b2df045
                                            • Instruction Fuzzy Hash: CA314C71D00218AFCB40EFA5D8859EFB7FAEF98300F10406AE405E7201EA75AE01CFA4
                                            APIs
                                              • Part of subcall function 00622612: GetWindowLongW.USER32(?,000000EB), ref: 00622623
                                            • GetCursorPos.USER32(?), ref: 006AC7C2
                                            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0065BBFB,?,?,?,?,?), ref: 006AC7D7
                                            • GetCursorPos.USER32(?), ref: 006AC824
                                            • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0065BBFB,?,?,?), ref: 006AC85E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Cursor$LongMenuPopupProcTrackWindow
                                            • String ID:
                                            • API String ID: 2864067406-0
                                            • Opcode ID: 27dbed04f96ac29366413c853c9e084061cb33e6f42c5f9e34551fdd18fc4f9a
                                            • Instruction ID: 0146f77baef73142ca382f0ff72ae4fa91ac148408e21a489bd1d737cf2153c3
                                            • Opcode Fuzzy Hash: 27dbed04f96ac29366413c853c9e084061cb33e6f42c5f9e34551fdd18fc4f9a
                                            • Instruction Fuzzy Hash: 84317335500118AFCB15DF58C898EEA7FBBFB4A720F044069F9058B261D7359D51DF60
                                            APIs
                                            • __setmode.LIBCMT ref: 00640BF2
                                              • Part of subcall function 00625B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00687B20,?,?,00000000), ref: 00625B8C
                                              • Part of subcall function 00625B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00687B20,?,?,00000000,?,?), ref: 00625BB0
                                            • _fprintf.LIBCMT ref: 00640C29
                                            • OutputDebugStringW.KERNEL32(?), ref: 00676331
                                              • Part of subcall function 00644CDA: _flsall.LIBCMT ref: 00644CF3
                                            • __setmode.LIBCMT ref: 00640C5E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                            • String ID:
                                            • API String ID: 521402451-0
                                            • Opcode ID: 54c08c2c2704a24f1a6343ba353ab67e16cddc92d22aed27ae06ec50fb912533
                                            • Instruction ID: 864caf31ed017a411041d2e8d84255fa1243e1c6f270b5b4f1f604e2a57b724c
                                            • Opcode Fuzzy Hash: 54c08c2c2704a24f1a6343ba353ab67e16cddc92d22aed27ae06ec50fb912533
                                            • Instruction Fuzzy Hash: 73113632A04614BEEB44B3B4AC83AFE7B6B9F41320F14411EF20457192DE315D8297A9
                                            APIs
                                              • Part of subcall function 00678652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00678669
                                              • Part of subcall function 00678652: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00678673
                                              • Part of subcall function 00678652: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00678682
                                              • Part of subcall function 00678652: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00678689
                                              • Part of subcall function 00678652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0067869F
                                            • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00678BEB
                                            • _memcmp.LIBCMT ref: 00678C0E
                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00678C44
                                            • HeapFree.KERNEL32(00000000), ref: 00678C4B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                            • String ID:
                                            • API String ID: 1592001646-0
                                            • Opcode ID: 4ebf5dc70de62a0e60365196ef555fc1c246b0ac8ecbfd4c0ea01ade1e1daa93
                                            • Instruction ID: a17f5b103341faca6717fb756171c59c48e2a760143937bb50b3bba4bc2c481c
                                            • Opcode Fuzzy Hash: 4ebf5dc70de62a0e60365196ef555fc1c246b0ac8ecbfd4c0ea01ade1e1daa93
                                            • Instruction Fuzzy Hash: D1219071E81208EFDB10DFA4C949BEEB7BAEF44354F158099E458A7240DB31AE46CF61
                                            APIs
                                            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00691A97
                                              • Part of subcall function 00691B21: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00691B40
                                              • Part of subcall function 00691B21: InternetCloseHandle.WININET(00000000), ref: 00691BDD
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Internet$CloseConnectHandleOpen
                                            • String ID:
                                            • API String ID: 1463438336-0
                                            • Opcode ID: a2e8b67f0ac1252791dd254a04fe36224603c993fe1627e133e63c66c56381e3
                                            • Instruction ID: 5822ac217d6c1971665624877c0f31be43c916fdc219ef5a962f1419bcaf4593
                                            • Opcode Fuzzy Hash: a2e8b67f0ac1252791dd254a04fe36224603c993fe1627e133e63c66c56381e3
                                            • Instruction Fuzzy Hash: EA21A435200606BFDF119FA0DC01FBAB7AFFF46701F20401AF9119AA55E771E8119B94
                                            APIs
                                              • Part of subcall function 0067F5AD: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,0067E1C4,?,?,?,0067EFB7,00000000,000000EF,00000119,?,?), ref: 0067F5BC
                                              • Part of subcall function 0067F5AD: lstrcpyW.KERNEL32(00000000,?), ref: 0067F5E2
                                              • Part of subcall function 0067F5AD: lstrcmpiW.KERNEL32(00000000,?,0067E1C4,?,?,?,0067EFB7,00000000,000000EF,00000119,?,?), ref: 0067F613
                                            • lstrlenW.KERNEL32(?,00000002,?,?,?,?,0067EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 0067E1DD
                                            • lstrcpyW.KERNEL32(00000000,?), ref: 0067E203
                                            • lstrcmpiW.KERNEL32(00000002,cdecl,?,0067EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 0067E237
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: lstrcmpilstrcpylstrlen
                                            • String ID: cdecl
                                            • API String ID: 4031866154-3896280584
                                            • Opcode ID: f9717a7bbd114c8e31d18c174d869877a59352c1df65a419afe94bf83823b2e0
                                            • Instruction ID: ad3d7be27a1f815bcb8f68b0fa5cc2649ad23048c0c9ce3d7f6afba41b8f0025
                                            • Opcode Fuzzy Hash: f9717a7bbd114c8e31d18c174d869877a59352c1df65a419afe94bf83823b2e0
                                            • Instruction Fuzzy Hash: 72110336200301EFCB24AF74DC05D7A77AAFF49310B40806AF81ACB251EB72A954C7A1
                                            APIs
                                            • _free.LIBCMT ref: 00655351
                                              • Part of subcall function 0064594C: __FF_MSGBANNER.LIBCMT ref: 00645963
                                              • Part of subcall function 0064594C: __NMSG_WRITE.LIBCMT ref: 0064596A
                                              • Part of subcall function 0064594C: RtlAllocateHeap.NTDLL(011F0000,00000000,00000001,00000000,?,?,?,00641013,?), ref: 0064598F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: AllocateHeap_free
                                            • String ID:
                                            • API String ID: 614378929-0
                                            • Opcode ID: d18c45af114609219458a5276d54bbdb6946093e6181dd852e7cc859a9abe3bb
                                            • Instruction ID: 0acdd2b7644313420c53923fcf384620ecb8031a725e153a6455407125ff8fb3
                                            • Opcode Fuzzy Hash: d18c45af114609219458a5276d54bbdb6946093e6181dd852e7cc859a9abe3bb
                                            • Instruction Fuzzy Hash: 7F110432805B15AFCF203F70E86969D37975F013E2F10042DFD0A9A291EE7189459694
                                            APIs
                                            • _memset.LIBCMT ref: 00624560
                                              • Part of subcall function 0062410D: _memset.LIBCMT ref: 0062418D
                                              • Part of subcall function 0062410D: _wcscpy.LIBCMT ref: 006241E1
                                              • Part of subcall function 0062410D: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 006241F1
                                            • KillTimer.USER32(?,00000001,?,?), ref: 006245B5
                                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 006245C4
                                            • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0065D6CE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                            • String ID:
                                            • API String ID: 1378193009-0
                                            • Opcode ID: 971bb85744f873078909ba79025d06c78eb5e6416dee3cbf43252733ecfda3bc
                                            • Instruction ID: 326e0e20724f3ce98e5fc227e296a185d6ca2a8d07e832e381db4c5840f6180f
                                            • Opcode Fuzzy Hash: 971bb85744f873078909ba79025d06c78eb5e6416dee3cbf43252733ecfda3bc
                                            • Instruction Fuzzy Hash: C5212970904794AFEB328B24DC45BE7BBEE9F01305F00009DE6DE66291C7B45A89CF51
                                            APIs
                                            • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 006840D1
                                            • _memset.LIBCMT ref: 006840F2
                                            • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00684144
                                            • CloseHandle.KERNEL32(00000000), ref: 0068414D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: CloseControlCreateDeviceFileHandle_memset
                                            • String ID:
                                            • API String ID: 1157408455-0
                                            • Opcode ID: 75e32246b09361c2af7867710aa6ed59c7fbe4bcd5961043b1d62e3abe6d7e1b
                                            • Instruction ID: 699e8da8a94ddedb1d08d23ba9227935619d2b7c6b3865821660db9edb14834c
                                            • Opcode Fuzzy Hash: 75e32246b09361c2af7867710aa6ed59c7fbe4bcd5961043b1d62e3abe6d7e1b
                                            • Instruction Fuzzy Hash: 85110D759012287AD7306BA59C4DFEBBB7DEF45760F10429AF908D7280D6744F80CBA4
                                            APIs
                                              • Part of subcall function 00625B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00687B20,?,?,00000000), ref: 00625B8C
                                              • Part of subcall function 00625B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00687B20,?,?,00000000,?,?), ref: 00625BB0
                                            • gethostbyname.WSOCK32(?), ref: 006966AC
                                            • WSAGetLastError.WSOCK32(00000000), ref: 006966B7
                                            • _memmove.LIBCMT ref: 006966E4
                                            • inet_ntoa.WSOCK32(?), ref: 006966EF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                            • String ID:
                                            • API String ID: 1504782959-0
                                            • Opcode ID: 594db7521bc34ae83a2e7496e8eda0f9ed7e5a07537cd9461919206ba4ba1f4a
                                            • Instruction ID: 01124a8545b04b42100e989801820a682705ee267660b5dd575d545c063769de
                                            • Opcode Fuzzy Hash: 594db7521bc34ae83a2e7496e8eda0f9ed7e5a07537cd9461919206ba4ba1f4a
                                            • Instruction Fuzzy Hash: B9115135500505AFCF40FBA4ED96DEEB7BAAF45311B144069F506A7161DF30AE04CF65
                                            APIs
                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 00679043
                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00679055
                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0067906B
                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00679086
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID:
                                            • API String ID: 3850602802-0
                                            • Opcode ID: 4ab21975033981825207686894a728092c408b234f743c87b844e45771c01233
                                            • Instruction ID: 1706a5f795ff0c07b093743bb1edd3ec63129a0afc46aed3dcab940213cf933b
                                            • Opcode Fuzzy Hash: 4ab21975033981825207686894a728092c408b234f743c87b844e45771c01233
                                            • Instruction Fuzzy Hash: ED115E79900218FFDB10DFA5CC85EDDBBB9FB48310F204095E904B7250D6716E10DBA4
                                            APIs
                                              • Part of subcall function 00622612: GetWindowLongW.USER32(?,000000EB), ref: 00622623
                                            • DefDlgProcW.USER32(?,00000020,?), ref: 006212D8
                                            • GetClientRect.USER32(?,?), ref: 0065B84B
                                            • GetCursorPos.USER32(?), ref: 0065B855
                                            • ScreenToClient.USER32(?,?), ref: 0065B860
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Client$CursorLongProcRectScreenWindow
                                            • String ID:
                                            • API String ID: 4127811313-0
                                            • Opcode ID: 8e51bd4cc5522cfee8d5d3a26685e2b52caada002ce431f5957fd3b46a8d156b
                                            • Instruction ID: 1332c17e4bcb6b64e9c8bd1b44f565744b6d9ed152ff8acbbcc929eb795199b0
                                            • Opcode Fuzzy Hash: 8e51bd4cc5522cfee8d5d3a26685e2b52caada002ce431f5957fd3b46a8d156b
                                            • Instruction Fuzzy Hash: DD116A35905429EFCB10EFA4E8859EE77BAEB16300F000456F901EB241C730BA918FAA
                                            APIs
                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,006801FD,?,00681250,?,00008000), ref: 0068166F
                                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,006801FD,?,00681250,?,00008000), ref: 00681694
                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,006801FD,?,00681250,?,00008000), ref: 0068169E
                                            • Sleep.KERNEL32(?,?,?,?,?,?,?,006801FD,?,00681250,?,00008000), ref: 006816D1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: CounterPerformanceQuerySleep
                                            • String ID:
                                            • API String ID: 2875609808-0
                                            • Opcode ID: 655e36c6e5b244a1cdd8497cf2000e4f867185068e99ea3afc9a4c48aa662e2b
                                            • Instruction ID: eaf35876294f091c5a51978bcd761afa5aea70da90c6d8a38e952af35a57bc32
                                            • Opcode Fuzzy Hash: 655e36c6e5b244a1cdd8497cf2000e4f867185068e99ea3afc9a4c48aa662e2b
                                            • Instruction Fuzzy Hash: EE118E31C0052CD7CF00AFE5D848AEEBB7EFF0A711F154159E980BA240DB3169A28B96
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                            • String ID:
                                            • API String ID: 3016257755-0
                                            • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                            • Instruction ID: 302a784b98241f02aed2a0fe89107141c5ba1a2f1e6b7ebd87b4d150909a83da
                                            • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                            • Instruction Fuzzy Hash: 7D01803204414ABBCF525E84EC01CEE3F23BF19342F088515FE1858131C237CAB9AB81
                                            APIs
                                            • GetWindowRect.USER32(?,?), ref: 006AB59E
                                            • ScreenToClient.USER32(?,?), ref: 006AB5B6
                                            • ScreenToClient.USER32(?,?), ref: 006AB5DA
                                            • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 006AB5F5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ClientRectScreen$InvalidateWindow
                                            • String ID:
                                            • API String ID: 357397906-0
                                            • Opcode ID: 377ae6a9cd6164012e9225653ef7b8da3f302aea6ca82c2d5c2d033628dcdce8
                                            • Instruction ID: cac8ec3ad3c7753f55ef0923589985c990d86fc7ee1ca3b705f31ddd924023ca
                                            • Opcode Fuzzy Hash: 377ae6a9cd6164012e9225653ef7b8da3f302aea6ca82c2d5c2d033628dcdce8
                                            • Instruction Fuzzy Hash: 821143B9D00209EFDB41DFA9C8849EEFBB9FF09310F109166E914E3220D735AA558F91
                                            APIs
                                            • _memset.LIBCMT ref: 006AB8FE
                                            • _memset.LIBCMT ref: 006AB90D
                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,006E7F20,006E7F64), ref: 006AB93C
                                            • CloseHandle.KERNEL32 ref: 006AB94E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: _memset$CloseCreateHandleProcess
                                            • String ID:
                                            • API String ID: 3277943733-0
                                            • Opcode ID: 07457b1e8d205de205993c3c663b6cb2b938b322c5dcb4cc67d2ba4dcd039f21
                                            • Instruction ID: 809195307a431a75c64112ca344fc0b36d161dbe92eaf8888e1924de25553eca
                                            • Opcode Fuzzy Hash: 07457b1e8d205de205993c3c663b6cb2b938b322c5dcb4cc67d2ba4dcd039f21
                                            • Instruction Fuzzy Hash: C5F05EB25443907BE7102BA1AC45FBB3A5EEB09754F006020BA08DA292D7715D008BA9
                                            APIs
                                            • EnterCriticalSection.KERNEL32(?), ref: 00686E88
                                              • Part of subcall function 0068794E: _memset.LIBCMT ref: 00687983
                                            • _memmove.LIBCMT ref: 00686EAB
                                            • _memset.LIBCMT ref: 00686EB8
                                            • LeaveCriticalSection.KERNEL32(?), ref: 00686EC8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: CriticalSection_memset$EnterLeave_memmove
                                            • String ID:
                                            • API String ID: 48991266-0
                                            • Opcode ID: 46405992f5784488ae63f365d759d781fb5c6ec20802cf392a64b7dea0342c52
                                            • Instruction ID: bf447460e7ab74d6fd53df3e8ceb13e7c7b0e2b34e2518b6206a69fdc64d397b
                                            • Opcode Fuzzy Hash: 46405992f5784488ae63f365d759d781fb5c6ec20802cf392a64b7dea0342c52
                                            • Instruction Fuzzy Hash: FAF0543A100210ABCF517F95DC85B89BB2BEF45320B048165FE085F226C731E951DBB5
                                            APIs
                                              • Part of subcall function 006212F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0062134D
                                              • Part of subcall function 006212F3: SelectObject.GDI32(?,00000000), ref: 0062135C
                                              • Part of subcall function 006212F3: BeginPath.GDI32(?), ref: 00621373
                                              • Part of subcall function 006212F3: SelectObject.GDI32(?,00000000), ref: 0062139C
                                            • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 006AC030
                                            • LineTo.GDI32(00000000,?,?), ref: 006AC03D
                                            • EndPath.GDI32(00000000), ref: 006AC04D
                                            • StrokePath.GDI32(00000000), ref: 006AC05B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                            • String ID:
                                            • API String ID: 1539411459-0
                                            • Opcode ID: 658d52f9987636d031b168cf7cbc930042e26ffd06a85dab85851e78c899c216
                                            • Instruction ID: 01c240460ac288ce74352cef50c5ec0a27b7a166f2f8eb39a675125dc5623ba7
                                            • Opcode Fuzzy Hash: 658d52f9987636d031b168cf7cbc930042e26ffd06a85dab85851e78c899c216
                                            • Instruction Fuzzy Hash: FAF03A31005659BADB226F94AC09FCE3B9AAF16321F044000FA11651E287A56A61CFAA
                                            APIs
                                            • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0067A399
                                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 0067A3AC
                                            • GetCurrentThreadId.KERNEL32 ref: 0067A3B3
                                            • AttachThreadInput.USER32(00000000), ref: 0067A3BA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                            • String ID:
                                            • API String ID: 2710830443-0
                                            • Opcode ID: d25a1f70bd8462a6dc5a27365134b68e3022f2ca0070e27cd824a3763fcc6c42
                                            • Instruction ID: adb5c4bd7943dbf9f0297533f764b0668149523ff7cb94be4289d3f1afe278e4
                                            • Opcode Fuzzy Hash: d25a1f70bd8462a6dc5a27365134b68e3022f2ca0070e27cd824a3763fcc6c42
                                            • Instruction Fuzzy Hash: DEE0C931545228BADB206FE2DC0DEDB7F5EEF167A2F009025F509D50A0C6719941DBA2
                                            APIs
                                            • GetSysColor.USER32(00000008), ref: 00622231
                                            • SetTextColor.GDI32(?,000000FF), ref: 0062223B
                                            • SetBkMode.GDI32(?,00000001), ref: 00622250
                                            • GetStockObject.GDI32(00000005), ref: 00622258
                                            • GetWindowDC.USER32(?,00000000), ref: 0065C0D3
                                            • GetPixel.GDI32(00000000,00000000,00000000), ref: 0065C0E0
                                            • GetPixel.GDI32(00000000,?,00000000), ref: 0065C0F9
                                            • GetPixel.GDI32(00000000,00000000,?), ref: 0065C112
                                            • GetPixel.GDI32(00000000,?,?), ref: 0065C132
                                            • ReleaseDC.USER32(?,00000000), ref: 0065C13D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                            • String ID:
                                            • API String ID: 1946975507-0
                                            • Opcode ID: 66adb9021bda08a95de25b2a6e7f92d3b9ea7bbdecc4ba7db1583ef78306338f
                                            • Instruction ID: 13a27fad79b204a8258249d911650b339c04d6ec3270033407eb517f3f72bc6f
                                            • Opcode Fuzzy Hash: 66adb9021bda08a95de25b2a6e7f92d3b9ea7bbdecc4ba7db1583ef78306338f
                                            • Instruction Fuzzy Hash: 21E06D32600244EEDB216FA4FC0D7D87B12EB16332F0083B6FA69480E1C7724984DF22
                                            APIs
                                            • GetCurrentThread.KERNEL32 ref: 00678C63
                                            • OpenThreadToken.ADVAPI32(00000000,?,?,?,0067882E), ref: 00678C6A
                                            • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,0067882E), ref: 00678C77
                                            • OpenProcessToken.ADVAPI32(00000000,?,?,?,0067882E), ref: 00678C7E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: CurrentOpenProcessThreadToken
                                            • String ID:
                                            • API String ID: 3974789173-0
                                            • Opcode ID: 599a1aa206e2877b6037641aae3f964d641e13cb3709255089491b179a54bb0c
                                            • Instruction ID: 178f6e439774b97e511e9118b5ba7de829e0134bfb976f277101de4bf0c9e435
                                            • Opcode Fuzzy Hash: 599a1aa206e2877b6037641aae3f964d641e13cb3709255089491b179a54bb0c
                                            • Instruction Fuzzy Hash: 96E08636642211DFD7206FF16D0CF977BAEEF52792F089828B245CA040DA349841CF62
                                            APIs
                                            • GetDesktopWindow.USER32 ref: 00662187
                                            • GetDC.USER32(00000000), ref: 00662191
                                            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 006621B1
                                            • ReleaseDC.USER32(?), ref: 006621D2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: CapsDesktopDeviceReleaseWindow
                                            • String ID:
                                            • API String ID: 2889604237-0
                                            • Opcode ID: 887c410e605a6b00e5389a9ed37f08bcc670214824c49b1eae8e9166d3badec6
                                            • Instruction ID: fb15ce37bb346f20c0c07abf9c36f52699f3e24fef7d337cb577a2afb511482c
                                            • Opcode Fuzzy Hash: 887c410e605a6b00e5389a9ed37f08bcc670214824c49b1eae8e9166d3badec6
                                            • Instruction Fuzzy Hash: 72E01A75800614EFDB11AFA0D808A9D7BF3EB4D351F109429FD5A97220CB39A1429F41
                                            APIs
                                            • GetDesktopWindow.USER32 ref: 0066219B
                                            • GetDC.USER32(00000000), ref: 006621A5
                                            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 006621B1
                                            • ReleaseDC.USER32(?), ref: 006621D2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: CapsDesktopDeviceReleaseWindow
                                            • String ID:
                                            • API String ID: 2889604237-0
                                            • Opcode ID: da11444b882f8c5af480efb3250e73150b8ed80173e6e588279b86cb3464e5fd
                                            • Instruction ID: 7e0f188788198677d11365366ed846d01b7318dfa3bf28374623bafcfd7ac8d6
                                            • Opcode Fuzzy Hash: da11444b882f8c5af480efb3250e73150b8ed80173e6e588279b86cb3464e5fd
                                            • Instruction Fuzzy Hash: 90E01A75C00614AFCB11AFB0D80869D7BF2EB4D311F109029F95A97220CB39A1419F41
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: %k
                                            • API String ID: 0-3601005739
                                            • Opcode ID: f3f86727d95771bf9a923ee5ac8f74f12963b9ed1034d39dde34a92729345fa2
                                            • Instruction ID: 6da8a1d4ac3de5a4fd98a6a03ee79ed2a4268b73f7116b6ea1e9b16e36443add
                                            • Opcode Fuzzy Hash: f3f86727d95771bf9a923ee5ac8f74f12963b9ed1034d39dde34a92729345fa2
                                            • Instruction Fuzzy Hash: ACB1B27180092A9BCF24EF94E4819FDB7B6FF04310F50812AF942A7295DB349E86CF65
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: __itow_s
                                            • String ID: xrn$xrn
                                            • API String ID: 3653519197-3769791102
                                            • Opcode ID: ebd166328db3868b131c77359b307938b8286fa39036ad756cdb93f8a7528262
                                            • Instruction ID: 1f181e99ffbc4de068c55fd43ded68fb9bfd421e7f5a554b3157d44fe28c68e1
                                            • Opcode Fuzzy Hash: ebd166328db3868b131c77359b307938b8286fa39036ad756cdb93f8a7528262
                                            • Instruction Fuzzy Hash: 6DB17C70A00209AFDF14DF54E990EBEB7BAEF58300F149159F9459B292DB70EA41CB64
                                            APIs
                                              • Part of subcall function 0063FEC6: _wcscpy.LIBCMT ref: 0063FEE9
                                              • Part of subcall function 00629997: __itow.LIBCMT ref: 006299C2
                                              • Part of subcall function 00629997: __swprintf.LIBCMT ref: 00629A0C
                                            • __wcsnicmp.LIBCMT ref: 0068B298
                                            • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 0068B361
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                            • String ID: LPT
                                            • API String ID: 3222508074-1350329615
                                            • Opcode ID: 7a0de78f72cee9b829ce7b8321b84e70b49b0778321db35c76c41c286e4e3c32
                                            • Instruction ID: 18dfe33db56ca644d23aa05027dfe221b2ef9d7a809e66d3f96204d6fb7f27eb
                                            • Opcode Fuzzy Hash: 7a0de78f72cee9b829ce7b8321b84e70b49b0778321db35c76c41c286e4e3c32
                                            • Instruction Fuzzy Hash: 0A61A275E00215AFCB14EF94D891EEEB7B6AF08310F15915DF506AB351DB70AE80CB94
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: _memmove
                                            • String ID: Oac
                                            • API String ID: 4104443479-752515563
                                            • Opcode ID: 4ff7708eaa290a61569ff269f946033c7988c456347a61d48ae920c10b2a3504
                                            • Instruction ID: 01aa788b4907fd3fb88a0e2583c1a7687164a21ba5b9c07121daf9123ba57662
                                            • Opcode Fuzzy Hash: 4ff7708eaa290a61569ff269f946033c7988c456347a61d48ae920c10b2a3504
                                            • Instruction Fuzzy Hash: 205120749006099FCF64CFA8C884AAEB7B2FF44314F14455AE85AD7350DB31A995CB51
                                            APIs
                                            • Sleep.KERNEL32(00000000), ref: 00632AC8
                                            • GlobalMemoryStatusEx.KERNEL32(?), ref: 00632AE1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: GlobalMemorySleepStatus
                                            • String ID: @
                                            • API String ID: 2783356886-2766056989
                                            • Opcode ID: 4ece3ce8ce129f2286f2213516cfbc6d29cbf4cafca8cbc93423224e75914c85
                                            • Instruction ID: 28d8021b566ed1961685997d469f8357f7f8230436e23bfe95738d978ec3c6da
                                            • Opcode Fuzzy Hash: 4ece3ce8ce129f2286f2213516cfbc6d29cbf4cafca8cbc93423224e75914c85
                                            • Instruction Fuzzy Hash: 03514871418B549BD360AF10E886BABBBE8FFC4314F42485DF1D9411A5DB309929CB6A
                                            APIs
                                              • Part of subcall function 0062506B: __fread_nolock.LIBCMT ref: 00625089
                                            • _wcscmp.LIBCMT ref: 00689AAE
                                            • _wcscmp.LIBCMT ref: 00689AC1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: _wcscmp$__fread_nolock
                                            • String ID: FILE
                                            • API String ID: 4029003684-3121273764
                                            • Opcode ID: 82a1c39cd0337545f19ee48860c09506e8502bf6455eb9604b9842e3dc0f143a
                                            • Instruction ID: 4c3fa4543b21a351c3798e657b383dd758c08271cecba6a051be839d3209eab6
                                            • Opcode Fuzzy Hash: 82a1c39cd0337545f19ee48860c09506e8502bf6455eb9604b9842e3dc0f143a
                                            • Instruction Fuzzy Hash: 0141D671A0061ABADF20AAA0DC45FEFBBBEDF45710F04006DF901A7281DA759A048BB5
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ClearVariant
                                            • String ID: Dtn$Dtn
                                            • API String ID: 1473721057-570680631
                                            • Opcode ID: 978813565cbd15c74b638ef9fb6964213b9e1030bff12de1662504827b4c8411
                                            • Instruction ID: 96346b28f33d02202041bc27e4660aaa83b4336bab918051cf38a1412e6903f3
                                            • Opcode Fuzzy Hash: 978813565cbd15c74b638ef9fb6964213b9e1030bff12de1662504827b4c8411
                                            • Instruction Fuzzy Hash: 90510278608752CFD754CF59D480A6ABBE2BB99344F54885CE9818B361E372EC81CF82
                                            APIs
                                            • _memset.LIBCMT ref: 00692892
                                            • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 006928C8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: CrackInternet_memset
                                            • String ID: |
                                            • API String ID: 1413715105-2343686810
                                            • Opcode ID: 77d91c5660e88e2a30ba0671e7a06a3e0630456430dc6a335d19d7d3e75ce0e2
                                            • Instruction ID: 31efa768d7c38be9ce24ee9bf7eaa9709e71421c72249b35972c5e2d8000c632
                                            • Opcode Fuzzy Hash: 77d91c5660e88e2a30ba0671e7a06a3e0630456430dc6a335d19d7d3e75ce0e2
                                            • Instruction Fuzzy Hash: D8311C7180011AAFCF41DFA1DC85EEEBFBAFF08300F104029F815A6265EA355956DB61
                                            APIs
                                            • DestroyWindow.USER32(?,?,?,?), ref: 006A6D86
                                            • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 006A6DC2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Window$DestroyMove
                                            • String ID: static
                                            • API String ID: 2139405536-2160076837
                                            • Opcode ID: c44edaddbfba3398d2e5ebd2715c0933b154f6155e4b1e9c8b1663fc38b1090f
                                            • Instruction ID: 3b4775a907744276cf47c0a31490230f7c0536a1e7299d1eddd9a39bcafb3bd0
                                            • Opcode Fuzzy Hash: c44edaddbfba3398d2e5ebd2715c0933b154f6155e4b1e9c8b1663fc38b1090f
                                            • Instruction Fuzzy Hash: 2431A171200604AEDB10AF74DC81AFB77BAFF49760F14961DF99697190CA31AC51CF64
                                            APIs
                                            • _memset.LIBCMT ref: 00682E00
                                            • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00682E3B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: InfoItemMenu_memset
                                            • String ID: 0
                                            • API String ID: 2223754486-4108050209
                                            • Opcode ID: 566a89e7aa4dd59a74965064ae730cb7419b14f0dbaa35c7a05e9590de85564b
                                            • Instruction ID: a0de3f89ceb5b585f1cb24337e91f6227e79fe2eafb495264a7bae53159f80d0
                                            • Opcode Fuzzy Hash: 566a89e7aa4dd59a74965064ae730cb7419b14f0dbaa35c7a05e9590de85564b
                                            • Instruction Fuzzy Hash: E731E931A0030AABEB24EF58C9897DEBBFBFF05350F14022DED85962A1D7709944CB58
                                            APIs
                                            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 006A69D0
                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 006A69DB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID: Combobox
                                            • API String ID: 3850602802-2096851135
                                            • Opcode ID: 4d4f303e4f1c1850efd60a0bdfa5876b7d089073cdb9c596f2b330f55eaa9c26
                                            • Instruction ID: f8129e200220669c9230d23aa746a7bdc5678dc4c89c0348f0781c1ac0159f5b
                                            • Opcode Fuzzy Hash: 4d4f303e4f1c1850efd60a0bdfa5876b7d089073cdb9c596f2b330f55eaa9c26
                                            • Instruction Fuzzy Hash: 3A11B27160020AAFEF11AF14CC80EEB376FEB9A3A4F150129F9589B391D6719C518FA0
                                            APIs
                                              • Part of subcall function 00621D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00621D73
                                              • Part of subcall function 00621D35: GetStockObject.GDI32(00000011), ref: 00621D87
                                              • Part of subcall function 00621D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00621D91
                                            • GetWindowRect.USER32(00000000,?), ref: 006A6EE0
                                            • GetSysColor.USER32(00000012), ref: 006A6EFA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Window$ColorCreateMessageObjectRectSendStock
                                            • String ID: static
                                            • API String ID: 1983116058-2160076837
                                            • Opcode ID: 463c1e92f7c9cbae4ffe1a9defa44a763e5abea9aac1c81ab52ac30233b9e674
                                            • Instruction ID: 0f3c3df6511ca592e44fe6f16ef431c03f6779d6d11fb2b3d18f49a97f491f47
                                            • Opcode Fuzzy Hash: 463c1e92f7c9cbae4ffe1a9defa44a763e5abea9aac1c81ab52ac30233b9e674
                                            • Instruction Fuzzy Hash: 73215972610209AFDF04EFA8DC45AEA7BBAFB09314F045628FA55D3250D634E8619F60
                                            APIs
                                            • GetWindowTextLengthW.USER32(00000000), ref: 006A6C11
                                            • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 006A6C20
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: LengthMessageSendTextWindow
                                            • String ID: edit
                                            • API String ID: 2978978980-2167791130
                                            • Opcode ID: 9b718eef7169bd0588549ede74f8807d4bdbd09a88363033f2693ed297772e09
                                            • Instruction ID: 98bebeba47fd117476cfc6e97c9476b22acce9c2d6ba449ca303256e197d90fe
                                            • Opcode Fuzzy Hash: 9b718eef7169bd0588549ede74f8807d4bdbd09a88363033f2693ed297772e09
                                            • Instruction Fuzzy Hash: FF116D71500208ABEB106F64DC41AEA376BEB16378F144724F961D72E0C775ECA19F60
                                            APIs
                                            • _memset.LIBCMT ref: 00682F11
                                            • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00682F30
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: InfoItemMenu_memset
                                            • String ID: 0
                                            • API String ID: 2223754486-4108050209
                                            • Opcode ID: 23724a5fbc143dddd1c4cbb1f88148aaedf201ad76c3308ae2b02fc2d38b625a
                                            • Instruction ID: 84c64a857e4ba09ee159348fe3c82041cf69e93c3038f7855c0539685589a1ce
                                            • Opcode Fuzzy Hash: 23724a5fbc143dddd1c4cbb1f88148aaedf201ad76c3308ae2b02fc2d38b625a
                                            • Instruction Fuzzy Hash: 5911D031901216ABCB30FB58DD58BDA77BBEB11350F0402B6F944A73A0D7B0AD05C795
                                            APIs
                                            • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00692520
                                            • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00692549
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Internet$OpenOption
                                            • String ID: <local>
                                            • API String ID: 942729171-4266983199
                                            • Opcode ID: fb69392b2e6201e0685e6374fee28d5b6d5f68961aee9e0e86ee66c98086fbb6
                                            • Instruction ID: ef4c0ca1367912e094ec4babd23bb96a897cadb3528e1b5032dad545361cdfc0
                                            • Opcode Fuzzy Hash: fb69392b2e6201e0685e6374fee28d5b6d5f68961aee9e0e86ee66c98086fbb6
                                            • Instruction Fuzzy Hash: 01110670500226BADF248F51CCA4EFBFFAEFF06751F10812AF90582540D270A981DAF0
                                            APIs
                                              • Part of subcall function 0069830B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,006980C8,?,00000000,?,?), ref: 00698322
                                            • inet_addr.WSOCK32(00000000), ref: 006980CB
                                            • htons.WSOCK32(00000000), ref: 00698108
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWidehtonsinet_addr
                                            • String ID: 255.255.255.255
                                            • API String ID: 2496851823-2422070025
                                            • Opcode ID: 21d864e78ac17c8dfd8c7ddaab3f01ccb00a0315304dd41f848c62d60f5c084f
                                            • Instruction ID: c621ea7dbd90d0c4639318380f3345e2321d60cb2e53870975ae41acac4c1860
                                            • Opcode Fuzzy Hash: 21d864e78ac17c8dfd8c7ddaab3f01ccb00a0315304dd41f848c62d60f5c084f
                                            • Instruction Fuzzy Hash: 8D11E534600205AFCF20AFA4DC46FFDB32AFF16320F10851BF91297791DA31A811CA59
                                            APIs
                                            • GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00623C26,006E62F8,?,?,?), ref: 00630ACE
                                              • Part of subcall function 00627D2C: _memmove.LIBCMT ref: 00627D66
                                            • _wcscat.LIBCMT ref: 006650E1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: FullNamePath_memmove_wcscat
                                            • String ID: cn
                                            • API String ID: 257928180-15458471
                                            • Opcode ID: c8d59bfcc21607afbf917c94513c9c5a20dfa95f6832072e4bbcce1a68313d96
                                            • Instruction ID: efa514d7dfcdbf1ad7e5a8ef1d7067b35589702e0fdf450253140452c4aa2290
                                            • Opcode Fuzzy Hash: c8d59bfcc21607afbf917c94513c9c5a20dfa95f6832072e4bbcce1a68313d96
                                            • Instruction Fuzzy Hash: BB11A534A052189B8B80EBA4DC11ED9B7BFEF08350F0004A9B949D7241EA70EB888B65
                                            APIs
                                              • Part of subcall function 00627F41: _memmove.LIBCMT ref: 00627F82
                                              • Part of subcall function 0067B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0067B0E7
                                            • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00679355
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ClassMessageNameSend_memmove
                                            • String ID: ComboBox$ListBox
                                            • API String ID: 372448540-1403004172
                                            • Opcode ID: 71938d5377f55abe8301d12a7f774f7f72e124e63fd5813ae42bb40044f9630d
                                            • Instruction ID: 878e9193ffefbd6092803286b79c87e7ae52a50bfe6c6b6a2c339269a52594de
                                            • Opcode Fuzzy Hash: 71938d5377f55abe8301d12a7f774f7f72e124e63fd5813ae42bb40044f9630d
                                            • Instruction Fuzzy Hash: 9001F171A05224ABCB04EBA4CC92CFE73ABBF06320B14461DF936673D1EB315808CA60
                                            APIs
                                              • Part of subcall function 00627F41: _memmove.LIBCMT ref: 00627F82
                                              • Part of subcall function 0067B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0067B0E7
                                            • SendMessageW.USER32(?,00000180,00000000,?), ref: 0067924D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ClassMessageNameSend_memmove
                                            • String ID: ComboBox$ListBox
                                            • API String ID: 372448540-1403004172
                                            • Opcode ID: f86482486824569cba101f63cbdfb549bd9d868a3096341f38aece7532bc10a2
                                            • Instruction ID: 53052079aa67f9bba4e355733f89e6e195ec92a302bac275f08cf81c1c6eeda0
                                            • Opcode Fuzzy Hash: f86482486824569cba101f63cbdfb549bd9d868a3096341f38aece7532bc10a2
                                            • Instruction Fuzzy Hash: 2D01D471E452047BCB14FBA0D992EFF73AA9F05300F144169B91663292EA216F089AB5
                                            APIs
                                              • Part of subcall function 00627F41: _memmove.LIBCMT ref: 00627F82
                                              • Part of subcall function 0067B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0067B0E7
                                            • SendMessageW.USER32(?,00000182,?,00000000), ref: 006792D0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ClassMessageNameSend_memmove
                                            • String ID: ComboBox$ListBox
                                            • API String ID: 372448540-1403004172
                                            • Opcode ID: 282d161bf0bbe8606265603f752c669569e9f6b34b9044bc817af0a26168e168
                                            • Instruction ID: 286c3041ba3fd766219329b1465866df4b919a4a4ae2c4e2eea7fb012c41c117
                                            • Opcode Fuzzy Hash: 282d161bf0bbe8606265603f752c669569e9f6b34b9044bc817af0a26168e168
                                            • Instruction Fuzzy Hash: 2301F271E4121877CF00FBA4D982EFF73AE9F01300F244129B91673282DA215F089AB5
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: __calloc_crt
                                            • String ID: @Rn
                                            • API String ID: 3494438863-2908497755
                                            • Opcode ID: c2423edff8039807a386f5a2e84c0a68739c2ddc10c09bfb294542689cdd94d6
                                            • Instruction ID: 2ee1def983d388ab60a4ea0eea586093b02874484657838661131fea926d02c1
                                            • Opcode Fuzzy Hash: c2423edff8039807a386f5a2e84c0a68739c2ddc10c09bfb294542689cdd94d6
                                            • Instruction Fuzzy Hash: F0F04471B087169FF7648F14FD516952B97EB12760B14442BF201CF290EBB089824685
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: ClassName_wcscmp
                                            • String ID: #32770
                                            • API String ID: 2292705959-463685578
                                            • Opcode ID: c1d761e8e13d49403701023759e7bb9abd315207e1d06ca571cce66f9931d434
                                            • Instruction ID: bc51ba605c3df9ccbd571e062235070bcbfa1f5240f262a67f02fc26d6364f26
                                            • Opcode Fuzzy Hash: c1d761e8e13d49403701023759e7bb9abd315207e1d06ca571cce66f9931d434
                                            • Instruction Fuzzy Hash: DCE0613290432C17D310ABD5AC45FA7F7ADEB41731F00015BFD10D3140D5609A058BD1
                                            APIs
                                            • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 006781CA
                                              • Part of subcall function 00643598: _doexit.LIBCMT ref: 006435A2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: Message_doexit
                                            • String ID: AutoIt$Error allocating memory.
                                            • API String ID: 1993061046-4017498283
                                            • Opcode ID: 6d8496b5a654ec909e6fd2e2784fa93790148b5e895bb4196f733050a9d4cef5
                                            • Instruction ID: ebf968ae41a45a6630adf87748f8e6ab84845966768ad836944335ae87a8b2f9
                                            • Opcode Fuzzy Hash: 6d8496b5a654ec909e6fd2e2784fa93790148b5e895bb4196f733050a9d4cef5
                                            • Instruction Fuzzy Hash: 1DD012322C532836D35433A46C0ABC56A8A4B16B51F44441ABB08596D38ED559C146AD
                                            APIs
                                              • Part of subcall function 0065B564: _memset.LIBCMT ref: 0065B571
                                              • Part of subcall function 00640B84: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,0065B540,?,?,?,0062100A), ref: 00640B89
                                            • IsDebuggerPresent.KERNEL32(?,?,?,0062100A), ref: 0065B544
                                            • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0062100A), ref: 0065B553
                                            Strings
                                            • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0065B54E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2002722252.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                            • Associated: 00000000.00000002.2002709168.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002790246.00000000006D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002827023.00000000006DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2002839398.00000000006E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_620000_ss.jbxd
                                            Similarity
                                            • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                            • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                            • API String ID: 3158253471-631824599
                                            • Opcode ID: b12423e2e1e7069373a479546714f367d8dfd7134ba0998c0809b78ce7ef1126
                                            • Instruction ID: 04ec2422c40944d96c4a666b6c2b74b1dff8d34cc453ef286fabc9e0aeff7606
                                            • Opcode Fuzzy Hash: b12423e2e1e7069373a479546714f367d8dfd7134ba0998c0809b78ce7ef1126
                                            • Instruction Fuzzy Hash: 89E092B02007128FE765EF68E4047427BE2EF04745F00992CE846C7351E7B4E548CFA1